Volume 4 of the Q test prep dissection

Volume 4, here we go 31-40, only three more from our first donor candidate Q.

31. Server1 is a 2012R2 server hosting Hyper-V machines. You configure VM1 to support an
in-house application. You configure a legacy network adapter for VM1. You need to ensure that VM1 uses only
50% of the available bandwidth. How should you do this?

A. Add a second legacy network adapter to increase throughput.

B. Remove the legacy network adapter and add an “up to date” network adapter.

C. Configure a NIC team

D. Reinstall Hyper-V integration services.

Answer:B, the wording to all of these answers is nonsensical and confusing. Could we please get on a standard system
for jargonization of ideas? “up to date” network adapter is not on option in Hyper-V nor can you “reinstall” integration services
in any kind of traditional understanding of what it means to install a piece of software. Perhaps in the future software will just be
check boxes but why are we talking about the future while nubz are trying to learn about the now?[/endrant]

32. You are the administrator for Server1 a two-node Windows Server 2012 R2 Hyper-V cluster. You configure two new virtual
machines: VM1 and VM2. You need to ensure that these virtual machines are not able to communicate with rogue DHCP servers. What should you
configure?

A. MAC Address Spoofing (need to Ctrl+F get to the info on link)

B. Router Gaurd

C. Port mirroring

D. DHCP Guard

Answer:B, D is the right concept but the label is incorrect.

33. You are the Hyper-V administrator for StevieBsChickenALaKingALaCarte.com.. You manage a Hyper-V
host named HyperV1. HyperV1 contains three 2008 VMs and 6 2012R2 machines. You have configured an external virtual switch within Hyper-V management console.
You need to ensure that the VMs are only able to communicate with hosted local VMs. What do you need to do?

A. Upgrade all 08 VMs to 2012 R2.

B. Add a second virtual switch. Move all 08 VMs to virtual switch 1 and all 2012 R2 VMs to the new switch labled
virtual switch 2.

C. Remove the virtual switch and re-create it using the private switch type.

D. Remove the virtual switch and re-create it using the public switch type (see previous link).

Answer:Based on the scenario Q gives we need to create a internal switch and delete the other switch but thats not one of the options. Again, I find
this confusing. Probably to newcomers and old hats a like. However, the answer is C per Q.

34. You are designing a multitenant Hyper-V infrastructure. You need to ensure that tenants are
unable to see each others resources. What should you configure?

A. Hyper-V virtual grid

B. Virtual Cloud Partitions (VCP)

C. Port Virtual Local Area Network (PVLAN)

D. MAC Address Isolation

Answer:C, not a whole lot of public facing information on this topic but network virtualization allows you to to specify port local per machine to
drill down to the specific level of security required for this scenario.

35.Amanda is configuring IP addressing for a company that has a head office in
midtown Manhattan and 11 branch offices in various locations through the New York metropolitan area. She
has decided that each office will correspond to a single subnet on the company’s WAN. The company itself
can use a single Class C network for this purpose. Which of the following subnet masks would provide the
most addresses for each host?

A. 255.255.255.192

B. 255.255.255.224

C. 255.255.255.240

D. 255.255.255.248

Answer: Logically you would think it would be A. C

36.Jim Goldberg functions as an admin for a single domain implementation of ADDS for his frim
He is assigned the task of maintaining his company’s DNS and DHCP servers. He decides that DHCP
clients running Win 8.1 should be configured to automatically select their primary DNS server.
Jim configures a 2012 R2 machine named Sever4 as a DNS server. In the DHCP server’s scope options for a subnet
containing 25 client computers, Neil configures Server4s IP address in the 006 DNS servers option.
He also ensure that DHCP reservation exists for Server4. Next, he restarts all the client machines on the
subnet. He discovers a client machine is still configured to use a DNS server that was taken off line before
Jim started making changes to the network. How can Jim correct this problem?

A. Execute the ipconfig /release and ipconfig /renew commands on each workstation

B. Configure both the 006 and the 015 options for the DNS server in DHCP Scope.

C. Use ipconfig /setclassid at each client computer to set DHCP class ID information.

D. Manually edit the TCP/IP properties on each client computer.

E. Isolate the subnet to eliminate the possibility that clients are receiving scope information from a
remote subnet.

Answer:D, this seems like too much work and like there should be another way around manual updates to a client but its what Q says. Are we
still in the early days of DNS on this?

37. Your Company uses Class B network ranges. You plan to configure the subnet mask for a branch site
containing 450 Win 8.1 client computers. Your company policy requires you to use 1 subnet per branch site.
You plan to add another 150 computers in the next year. You need to select a subnet mask that
satisfies the requirements for today and also the future growth. You want to limit
the amount of wasted addresses. Which subnet mask should you select?

A. 255.255.254.0

B. 255.255.252.0

C. 255.255.255.240

D. 255.255.255.0

Answer: I would say B but im not great with IPv4 but im going to hold my self accountable so even if im wrong
after checking Ill leave my wrong answer posted. Ok it is B after reading the whole question and the answer. For more information watch
Subnetting demystified as mentioned in a previous post.

38. You need to plan an IPv6 addressing scheme. You need to identify the addresses in the answers below
as one of the following 1:Global Unicast, 2:Link-Local unicast,
3: unique local IPv6 unicast, or 4: Multicast

A. Fe::

B. 2000::/3

C. Fc00::/7

D. Ff

E. Fe80::/64

Answer:Im terrible with Ipv6 so we for sure have to consult the answer column in
Q for this one or you could check the links and learn the ranges and perhaps an understanding of the ranges. Any way the answer is 1,B; 2,E; 3,C; 4,D.

39. Stevie B’s Chicken A La King A La Carte consists of a main site and two branch sites (we rae really
much larger but this is just a theoretical scenario). Each branch site is connected to the main via a WAN link. You need to configure a new
server for the main site. You need to configure an IPv6 address for the new server. You plan to use an IPv6 address clas
that is private to the organization but unique across all the organization’s sites. Which address meets this requirement?

A. Foo:3fff:64df:155c:dca7::81a4

B. Fe80::cc33:456a:3719:1234

C. 2003:414:ab86:741f::230:1:a5ab

D. fd12:cd36:1208:9::f92b

Answer:D, as im horrible with IPv6 I had no clue. I honestly havent put much stock into learning this technology yet as
it seems it would be immensely time consuming for some one such as my self and I have a lot of other stuff to learn.

40. You are the network engineer for a consulting firm. You have been tasked with desiging a subnet mask for a network that
will support up to 20,046 client computers. You must minimize the number of wasted addresses. Which subnet mask should you select?

A. 255.255.252.0

B. 255.255.248.0

C. 255.255.240.0

D. 255.255.128.0

Answer: D This requires a lot of math (at least a lot to me) but if you memorize the tables or at least the patterns of the tables and
write them out while testing its possibly faster than doing the round about math of 255-128=x X*255. I think thats a slightly less than
accurate but not completly failsauce way to calculate addresses in this case. Please correct me if your reading this and im wrong.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Powered by WordPress.com.

Up ↑

%d bloggers like this: