MCSA 70-740: WINDOWS SERVER QUESTIONS
You have a failover cluster comprised of 6 servers running Windows Server 2016. You
need to add additional storage from an iSCSI SAN to the failover cluster. You have
already changed the LUN masking to expose the storage to each cluster node. Which
Windows PowerShell cmdlet should you run?
a. Add-ClusterResourceType
b. Add-ClusterDisk
c. Add-ClusterResource
d. Add-ClusterResourceDependency - Answers -b. Add-ClusterDisk, Used to make a
disk available to be added to a failover cluster. Requires that the disk already be
exposed to all cluster nodes by changing the LUN masking. Any disks being added to a
failover cluster should be configured as basic disks, and should not be accessible to any
other servers outside of the failover cluster.
Your organization contains a Hyper-V host Failover Cluster named VMCluster1. You
need to create a copy of a VM and move it to a new cluster node.
Solution: With the virtual machine still running you use the Move-VM Windows
PowerShell cmdlet.
Does this meet the goal?
a. Yes
b. No - Answers -b. No, the 'Move-VM' cmdlet allows you to move a VM and all its
associated files to a new Hyper-V host. This command would not create a copy of a VM,
it simply places the VM on a new host and removes it from the previous host. 'Export-
VM' and 'Import-VM' will create a copy of a VM
You have a server running Windows Server 2016 with the Multipath I/O feature
installed. This server has four seperate paths to an iSCSI SAN. You need to configure
load balancing between these paths and ensure that one path is reserved and only
used if all other paths become unavailable. Which Microsoft DSM policy setting would
you use?
a. Least Queue Depth
b. Failover Only
c. Round Robin with Subset
d. Least Blocks - Answers -c. Round Robin with Subset, provides load balancing
between active paths, while creating one or more standby paths. These paths are only
used if all active paths become unavailable. Once one or more acive paths become
available, DSM will stop using the standby paths
You are monitoring the workloads for a Windows Server 2016 in Performance Monitor.
The display shows a large number of counters making it difficult to see what is being
displayed.
,Solution: You change the view to the histogram bar graph to fix this issue.
Does this meet the goal?
a. Yes
b. No - Answers -a. Yes, The "Change Graph Type" toolbar button in Performance
monitor allows you to change the display to a view that helps meet your goals.
Your organization contains several servers running Windows Server 2016 that are
configured in a failover cluster. Several cluster networks have been automatically
created between cluster nodes. You need to remove the second cluster network.
Solution: You disable each NIC that is connected to the second cluster network.
Does this meet the goal?
a. Yes
b. No - Answers -a. Yes, Cluster networks are automatically created by the Cluster
Service for any subnets that it detects are configured on cluster node NICs. A cluster
network can only be removed by disabling or removing all NICs from that cluster
network. Once the Cluster Service discovers the change, the cluster network will be
removed.
You have been tasked with monitoring the performance of a newly added Windows
2016 Server. You need to be notified when % Processor Time in the Processor(_Total)
counter group exceeds the counter value of 60. Based on the following partial
command, choose the correct command that will meet this goal.
________create______new_notification -th "\Processor(_Total)\%Processor Time>60"
a. perfmon create alert new_notification -th "\Processor(_Total)\%Processor Time>60"
b. perfmon create counter new_notification -th "\Processor(_Total)\% Processor
Time>60"
c. logman create trace new_notification -th "\Processor( Total)\% Processor Time>60"
d. logman create alert new_notification -th "\Processor(_Total)\% Processor Time>60"
e. logman create counter new_notification -th "\Processor (_Total)\% Processor
Time>60" - Answers -d. logman create alert new_notification -th "\Processor(_Total)\%
Processor Time>60"
Perfmon is used to launch the Performance Monitor GUI, but is not used to send an
alert based on the partial command provided. Logman is a command line tool that
supports the many of the Performance Monitor tasks including notifications by creating
a new alert.
Your organization contains a Hyper-V host cluster with six cluster nodes. You are asked
to configure monitoring for the virtualized workloads on each cluster node. You need to
ensure virtual machines are automatically restarted if a specific event ID is generated.
,Solution: You run the Reset-ClusterVMMonitoredState Windows PowerShell cmdlet.
Does this meet the goal?
a. No
b. Yes - Answers -a. No, The Reset-Cluster VMMonitoredState cmdlet is used to reset
the status of a virtual machine when it is in an Application Critical state.
You would use the 'Add-ClusterVMMonitoredItem' to configure monitoring for a service
or event on a virtual machine.
You have a SMB share named FinanceDocs on a file server. You want to remove
access for the Everyone group to this SMB share. The Finance group also has Full
Control permissions to this SMB share, and must retain access.
Solution: You run the Block-SmbShareAccess -Name FinanceDocs -AccountName
"Everyone" Windows PowerShell cmdlet.
Does this meet the goal?
a. Yes
b. No - Answers -b. No, The "Block-SmbShareAccess" Windows PowerShell cmdlet
places a deny Access Control Entry (ACE) in the Discretionary Access Control List
(DACL) for the specified SMB share. This would deny access to all of the users in the
Everyone group. Since the members of the Finance group are also members of the
Everyone group, Deny permissions override Allow permissions, which would also deny
access to the Finance group.To remove access to the Everyone group while not
affecting the Finance group, you can run the Revoke-SmbShareAccess -Name
FinanceDocs - AccountName "Everyone" cmdlet. This would simply remove any ACEs
for the Everyones group, while maintaining access for the Finance group.
You have a file server running Windows Server 2016 that contains a folder in
D:\Policies. Members of the HR group currently have read access to this folder and all
its contents. You need to prevent the HR group from accessing one of the folders within
D:\Policies.
Solution: You disable inheritance for D:\Policies
Does this meet the goal?
a. Yes
b. No - Answers -b. No, Disabling inheritance for D:\Policies would prevent the HR
group from having read access to any subfolders within the D:\Policies folder. As this
scenario only requires you to prevent the HR group from accessing on of the folders
within D:\Policies, this would not be an acceptable solution.
To prevent access to a single folder within D:\Policies, you can explicitly configure deny
priveleges for the HR group to that single folder. As an explicit deny will override an
, inherited allow, this will prevent the HR group from accessing the folder, while still
allowing other files and subfolders within D:\Policies to be accessed.
Your network contains several iSCSI devices. You need to provide a way for iSCSI
initiators to automatically detect iSCSI targets in the network.
Solution: You run the Install-WindowsFeature -name isns Windows PowerShell cmdlet.
Does this meet your goal?
a. Yes
b. No - Answers -a. Yes, An Internet Storage Name Service (iSNS) server allows iSCSI
initiators to automatically detect iSCSI targets on their network. You can run the Install-
WindowsFeature -name isns cmdlet to install the iSNS server feature on Windows
Server 2016.
Once the iSNS server feature is installed, you would need to specify the iSNS server's
IP address on each iSCSI device, and register each iSCSI initiator with the iSNS server.
iSCSI initiator registration can be performed from the Discovery tab of the iSCSI Initiator
Properties window.
You need to configure Windows Update clients to receive updates from specific WSUS
groups. When a client computer initially connects to the WSUS server, to which groups
will the client computer be added by default? (Choose all that apply.)
a. Administrators
b. Workstations
c. Servers
d. Unassigned Computers
e. All Computers - Answers -d. Unassigned Computers
e. All Computers
These are the two default groups created when you deploy a WSUS server.
You are using the Event Viewer to track CPU usage on your server. You need to see
the program threads waiting to be executed by the processor.
Solution: You add the "System: Processor Queue Length" counter to Event Viewer.
Does this meet the goal?
a. Yes
b. No - Answers -a. Yes, The counter "System: Processor Queue Length" will show you
the number of program threads waiting to be executed by the processor.
Your network contains an Active Directory-detached cluster that is configured to use
DNS for cluster network name and cluster role name registration. You are asked to
recommend which workloads should be placed on the Active Directory-detached
cluster. Which cluster workload should you recommend?
You have a failover cluster comprised of 6 servers running Windows Server 2016. You
need to add additional storage from an iSCSI SAN to the failover cluster. You have
already changed the LUN masking to expose the storage to each cluster node. Which
Windows PowerShell cmdlet should you run?
a. Add-ClusterResourceType
b. Add-ClusterDisk
c. Add-ClusterResource
d. Add-ClusterResourceDependency - Answers -b. Add-ClusterDisk, Used to make a
disk available to be added to a failover cluster. Requires that the disk already be
exposed to all cluster nodes by changing the LUN masking. Any disks being added to a
failover cluster should be configured as basic disks, and should not be accessible to any
other servers outside of the failover cluster.
Your organization contains a Hyper-V host Failover Cluster named VMCluster1. You
need to create a copy of a VM and move it to a new cluster node.
Solution: With the virtual machine still running you use the Move-VM Windows
PowerShell cmdlet.
Does this meet the goal?
a. Yes
b. No - Answers -b. No, the 'Move-VM' cmdlet allows you to move a VM and all its
associated files to a new Hyper-V host. This command would not create a copy of a VM,
it simply places the VM on a new host and removes it from the previous host. 'Export-
VM' and 'Import-VM' will create a copy of a VM
You have a server running Windows Server 2016 with the Multipath I/O feature
installed. This server has four seperate paths to an iSCSI SAN. You need to configure
load balancing between these paths and ensure that one path is reserved and only
used if all other paths become unavailable. Which Microsoft DSM policy setting would
you use?
a. Least Queue Depth
b. Failover Only
c. Round Robin with Subset
d. Least Blocks - Answers -c. Round Robin with Subset, provides load balancing
between active paths, while creating one or more standby paths. These paths are only
used if all active paths become unavailable. Once one or more acive paths become
available, DSM will stop using the standby paths
You are monitoring the workloads for a Windows Server 2016 in Performance Monitor.
The display shows a large number of counters making it difficult to see what is being
displayed.
,Solution: You change the view to the histogram bar graph to fix this issue.
Does this meet the goal?
a. Yes
b. No - Answers -a. Yes, The "Change Graph Type" toolbar button in Performance
monitor allows you to change the display to a view that helps meet your goals.
Your organization contains several servers running Windows Server 2016 that are
configured in a failover cluster. Several cluster networks have been automatically
created between cluster nodes. You need to remove the second cluster network.
Solution: You disable each NIC that is connected to the second cluster network.
Does this meet the goal?
a. Yes
b. No - Answers -a. Yes, Cluster networks are automatically created by the Cluster
Service for any subnets that it detects are configured on cluster node NICs. A cluster
network can only be removed by disabling or removing all NICs from that cluster
network. Once the Cluster Service discovers the change, the cluster network will be
removed.
You have been tasked with monitoring the performance of a newly added Windows
2016 Server. You need to be notified when % Processor Time in the Processor(_Total)
counter group exceeds the counter value of 60. Based on the following partial
command, choose the correct command that will meet this goal.
________create______new_notification -th "\Processor(_Total)\%Processor Time>60"
a. perfmon create alert new_notification -th "\Processor(_Total)\%Processor Time>60"
b. perfmon create counter new_notification -th "\Processor(_Total)\% Processor
Time>60"
c. logman create trace new_notification -th "\Processor( Total)\% Processor Time>60"
d. logman create alert new_notification -th "\Processor(_Total)\% Processor Time>60"
e. logman create counter new_notification -th "\Processor (_Total)\% Processor
Time>60" - Answers -d. logman create alert new_notification -th "\Processor(_Total)\%
Processor Time>60"
Perfmon is used to launch the Performance Monitor GUI, but is not used to send an
alert based on the partial command provided. Logman is a command line tool that
supports the many of the Performance Monitor tasks including notifications by creating
a new alert.
Your organization contains a Hyper-V host cluster with six cluster nodes. You are asked
to configure monitoring for the virtualized workloads on each cluster node. You need to
ensure virtual machines are automatically restarted if a specific event ID is generated.
,Solution: You run the Reset-ClusterVMMonitoredState Windows PowerShell cmdlet.
Does this meet the goal?
a. No
b. Yes - Answers -a. No, The Reset-Cluster VMMonitoredState cmdlet is used to reset
the status of a virtual machine when it is in an Application Critical state.
You would use the 'Add-ClusterVMMonitoredItem' to configure monitoring for a service
or event on a virtual machine.
You have a SMB share named FinanceDocs on a file server. You want to remove
access for the Everyone group to this SMB share. The Finance group also has Full
Control permissions to this SMB share, and must retain access.
Solution: You run the Block-SmbShareAccess -Name FinanceDocs -AccountName
"Everyone" Windows PowerShell cmdlet.
Does this meet the goal?
a. Yes
b. No - Answers -b. No, The "Block-SmbShareAccess" Windows PowerShell cmdlet
places a deny Access Control Entry (ACE) in the Discretionary Access Control List
(DACL) for the specified SMB share. This would deny access to all of the users in the
Everyone group. Since the members of the Finance group are also members of the
Everyone group, Deny permissions override Allow permissions, which would also deny
access to the Finance group.To remove access to the Everyone group while not
affecting the Finance group, you can run the Revoke-SmbShareAccess -Name
FinanceDocs - AccountName "Everyone" cmdlet. This would simply remove any ACEs
for the Everyones group, while maintaining access for the Finance group.
You have a file server running Windows Server 2016 that contains a folder in
D:\Policies. Members of the HR group currently have read access to this folder and all
its contents. You need to prevent the HR group from accessing one of the folders within
D:\Policies.
Solution: You disable inheritance for D:\Policies
Does this meet the goal?
a. Yes
b. No - Answers -b. No, Disabling inheritance for D:\Policies would prevent the HR
group from having read access to any subfolders within the D:\Policies folder. As this
scenario only requires you to prevent the HR group from accessing on of the folders
within D:\Policies, this would not be an acceptable solution.
To prevent access to a single folder within D:\Policies, you can explicitly configure deny
priveleges for the HR group to that single folder. As an explicit deny will override an
, inherited allow, this will prevent the HR group from accessing the folder, while still
allowing other files and subfolders within D:\Policies to be accessed.
Your network contains several iSCSI devices. You need to provide a way for iSCSI
initiators to automatically detect iSCSI targets in the network.
Solution: You run the Install-WindowsFeature -name isns Windows PowerShell cmdlet.
Does this meet your goal?
a. Yes
b. No - Answers -a. Yes, An Internet Storage Name Service (iSNS) server allows iSCSI
initiators to automatically detect iSCSI targets on their network. You can run the Install-
WindowsFeature -name isns cmdlet to install the iSNS server feature on Windows
Server 2016.
Once the iSNS server feature is installed, you would need to specify the iSNS server's
IP address on each iSCSI device, and register each iSCSI initiator with the iSNS server.
iSCSI initiator registration can be performed from the Discovery tab of the iSCSI Initiator
Properties window.
You need to configure Windows Update clients to receive updates from specific WSUS
groups. When a client computer initially connects to the WSUS server, to which groups
will the client computer be added by default? (Choose all that apply.)
a. Administrators
b. Workstations
c. Servers
d. Unassigned Computers
e. All Computers - Answers -d. Unassigned Computers
e. All Computers
These are the two default groups created when you deploy a WSUS server.
You are using the Event Viewer to track CPU usage on your server. You need to see
the program threads waiting to be executed by the processor.
Solution: You add the "System: Processor Queue Length" counter to Event Viewer.
Does this meet the goal?
a. Yes
b. No - Answers -a. Yes, The counter "System: Processor Queue Length" will show you
the number of program threads waiting to be executed by the processor.
Your network contains an Active Directory-detached cluster that is configured to use
DNS for cluster network name and cluster role name registration. You are asked to
recommend which workloads should be placed on the Active Directory-detached
cluster. Which cluster workload should you recommend?