Microsoft 70-745 ExamImplementing a Software-Defined Datacenter (beta)

Total Question: 72 Last Updated: Oct 16,2020
  • Updated 70-745 Dumps
  • Based on Real 70-745 Exams Scenarios
  • Free 70-745 pdf Demo Available
  • Check out our 70-745 Dumps in a new PDF format
  • Instant 70-745 download
  • Guarantee 70-745 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $85.95 $39.99

Buy Now Free Trial

Abreast Of The Times Implementing A Software-Defined Datacenter (beta) 70-745 Free Exam Questions

Pass4sure 70-745 Questions are updated and all 70-745 answers are verified by experts. Once you have completely prepared with our 70-745 exam prep kits you will be ready for the real 70-745 exam without a problem. We have Renew Microsoft 70-745 dumps study guide. PASSED 70-745 First attempt! Here What I Did.

Online 70-745 free questions and answers of New Version:

NEW QUESTION 1

You need to deploy the production SCVMM instance.
Which values should you supply for each installation option? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
70-745 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
70-745 dumps exhibit
References:
https://docs.microsoft.com/en-us/system-center/vmm/plan-install?view=sc-vmm-1801#account-and-domainrequ

NEW QUESTION 2

You install Microsoft System Center Operations Manager (SCOM) and download a sealed management pack. You receive notifications from a monitor that a critical resource experiences an overload situation. When you check the resource, it is not in an overloaded condition.
You need to add a new threshold value for the resource. What should you create?

  • A. an override in an existing management pack
  • B. an override in a new management pack
  • C. a monitor in a new management pack
  • D. a monitor in an existing management pack

Answer: B

NEW QUESTION 3

You deploy Microsoft System Center Virtual Machine Manager (SCVMM). You configure shielded virtual machines (VMs) by using virtual Trusted Platform Modules (vTPM). The shielded VMs are in the existing guarded fabric.
You deploy System Center Data Protection Manager (DPM).
You need to identify the scenarios for which you can use DPM to back up the VMs.
For which two scenarios can you use DPM? Each correct answer presents a complete solution.

  • A. shielded VMs not protected with vTPM
  • B. Item Level Recovery and Alternate Location Recovery outside of the guarded fabric
  • C. Item Level Recovery and Alternate Location Recovery in the guarded fabric
  • D. shielded VMs protected with vTPM

Answer: CD

Explanation:
References:
https://docs.microsoft.com/en-us/system-center/dpm/what-s-new-in-dpm-2016?view=sc-dpm-1801

NEW QUESTION 4

You need to ensure that the existing VMs meet the requirements. What should you do?

  • A. Modify the VM disks to Differencing.
  • B. Upgrade the VM operating system to Windows Server 2016 Standard edition.
  • C. Modify the VM configuration to Generation 2.
  • D. Upgrade the VM operating system to Windows Server 2016 Datacenter edition.

Answer: D

NEW QUESTION 5

You manage Microsoft system virtual Machine Manager (SCVMM). You need to secure network traffic.
Which two protocols can you secure by using port access control lists (ACLs)? Each correct answer presents a complete solution.

  • A. SCTP
  • B. DTP
  • C. DCCP
  • D. UDP
  • E. TCP

Answer: DE

Explanation:
General guidelines for what an access control list consist of are as follows:
Access control list name (depending on the router it could be numeric or combination of letters and numbers)
A sequence number or term name for each entry A statement of permission or denial for that entry
A network protocol and associated function or ports
- Examples include IP, IPX, ICMP, TCP, UDP, NETBIOS and many others
Destination and Source targets
- These are typically addresses and can be defined as a single discrete address, a range or subnet, or all addresses Additional flags or identifiers
These additional statements request additional functions when a match is found for the statement. These flags vary for each protocol but a common flag added to statements is the log feature that records any match to the statement into the router log
References:
https://www.pluralsight.com/blog/it-ops/access-control-list-concepts

NEW QUESTION 6

Your company has two datacenters. You have Windows servers in both locations. The network that connects the datacenters has high bandwidth and low latency.
You are designing a new virtual machine (VM) and storage environment based on servers that run Windows Server 2016. You need to implement a solution that meets the following storage requirements:
*Tolerates the failure of a single datacenter.
*Ensures zero data loss in the event of a file system failure.
Solution: You implement a storage replica with synchronous replication. Does the solution meet the goal?

  • A. Yes
  • B. No

Answer: A

NEW QUESTION 7

You manage a Microsoft System Center Virtual Machine Manager (SCVMM) environment. You plan to create
virtual machine (VM) networks and IP address pools. You need to ensure that VM networks are segmented.
Solution: You create a VM network with the No Isolation option.
Does the solution meet the goal?

  • A. Yes
  • B. No

Answer: B

NEW QUESTION 8

You use Microsoft System Center Virtual Machine Manager (SCVMM) to manage your company's virtual infrastructure.
You need to install a host server that can run the full version of the .NET framework. Solution: Install the host server using the Desktop Experience installation option. Does the solution meet the goal?

  • A. Yes
  • B. No

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/administration/server-core/what-is-server-core

NEW QUESTION 9

A company has a Microsoft System center virtual machine manager (SCVMM) environment. The company also uses System center operations manager (SCOM). You integrate SCVMM with SCOM.
You need to ensure that alerts, notifications and monitoring is synchronizing between SCVMM and SCOM. What should you do?

  • A. Enable performance and resource optimization (PRO)
  • B. Install the SCOM agent on the SCVMM management server
  • C. Install the SCOM console on the SCVMM management server
  • D. Enable maintenance and mode integration

Answer: A

Explanation:
PRO information is provided by Operations Manager, and can be VMM to optimize performance. You can map specific Operations Manager alerts to remedial actions in VMM. For example, you could migrate VMs to a different host after a hardware issue. In addition, with PRO enabled, Operations Managers can detect resource issues or hardware failures in the virtualization infrastructure.
References:
https://docs.microsoft.com/en-us/system-center/vmm/monitors-ops-manager?view=sc-vmm-1807

NEW QUESTION 10

You need to ensure that Network1 can communicate with other virtual networks. What should you do?

  • A. Configure logical switches for the VMs on Network1.
  • B. Create an IP address pool for Network1.
  • C. Create port profiles for the VMs on Network1.
  • D. Configure a gateway in SCVMM.

Answer: D

NEW QUESTION 11

A company has a Microsoft System Center virtual machine manager (SCVMM) environment. The environment includes a software load balancer (SLB) and virtual machine (VMs) that run Network controller.
You need to create a guest cluster. What should you do?

  • A. Create a service template
  • B. Create a logical network
  • C. Deploy a RAS gateway
  • D. Create an internal load-balancer virtual IP address

Answer: D

Explanation:
VMM 1801 and later supports guest clustering in SDN through an Internal Load Balancer(ILB) Virtual IP(VIP).
The ILB uses probe ports which are created on the guest cluster VMs to identify the active node. At any given time, the probe port of only the active node responds to the ILB and all the traffic directed to the VIP is routed to the active node. References:
https://docs.microsoft.com/en-us/system-center/vmm/sdn-guest-clusters?view=sc-vmm-1801

NEW QUESTION 12

You deploy Microsoft System Center Virtual Machine Manager (SCVMM) and System Center Operations Manager (SCOM). You integrate SCVMM with SCOM.
You need to view the reports for SCVMM.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.

  • A. Launch the SCOM console.
  • B. Launch the SCVMM console.
  • C. Run the Windows PowerShell cmdlet Get-SCOMMonitor.
  • D. Run the Windows PowerShell cmdlet Get-SCOMReportingSetting.
  • E. View the Reporting server website for SCOM.

Answer: AE

Explanation:
References:
https://docs.microsoft.com/en-us/system-center/vmm/monitor?view=sc-vmm-1801

NEW QUESTION 13

You must upgrade all Hyper-V clusters that support an upgrade. Which 2 clusters can you upgrade?

  • A. Atl-cluster
  • B. Det-cluster
  • C. Tor-cluster
  • D. Dal-cluster

Answer: BD

Explanation:
References:
https://docs.microsoft.com/en-us/system-center/vmm/hyper-v-rolling-upgrade?view=sc-vmm-1807

NEW QUESTION 14

You need to configure an SDN network controller for the SCVMM test environment. What should you do first?

  • A. In SCVMM, create a dedicated host group for Det-Server3, Det-Server4, and Det-Server5.
  • B. In AD DS, create a security group and add Det-Server3, Det-Server4, and Det-Server5.
  • C. In AD DS, create a security group and add Det-Server6, Det-Server7, and Det-Server8.
  • D. In SCVMM, create a dedicated host group for Det-Server6, Det-Server7, and Det-Server8.

Answer: D

Explanation:
References:
https://docs.microsoft.com/en-us/system-center/vmm/sdn-controller?view=sc-vmm-1801

NEW QUESTION 15

You administer the virtualization environment for an organization. You manage all Microsoft Hyper-V hosts locally. You plan to deploy Microsoft system center virtual machine manager (SCVMM).
(SCVMM) administrators must have full administrative permissions over the SCVMM fabric but no permission to other organizational fabrics. Administrators in the domain environment must not have any permission to the SCVMM infrastructure.
You need to deploy the SCVMM environment. What should you include?

  • A. Local installation of the SCVMM agent
  • B. Bit locker encrypted VHDX file
  • C. Host guardian service a trusted domain
  • D. Host guardian service in an isolated forest

Answer: D

Explanation:
When setting up HGS, you are given the option of creating an isolated Active Directory forest just for HGS or to join HGS to an existing, trusted domain. This decision, as well as the roles you assign the admins in your organization, determine the trust boundary for HGS. Whoever has access to HGS, whether directly as an admin or indirectly as an admin of something else (e.g. Active Directory) that can influence HGS, has control over your guarded fabric. HGS admins choose which Hyper-V hosts are authorized to run shielded VMs and manage the certificates necessary to start up shielded VMs. An attacker or malicious admin who has access to HGS can use this power to authorize compromised hosts to run shielded VMs, initiate a denial-of-service attack by removing key material, and more.
To avoid this risk, it is strongly recommended that you limit the overlap between the admins of your HGS (including the domain to which HGS is joined) and Hyper-V environments. By ensuring no one admin has access to both systems, an attacker would need to compromise 2 different accounts from 2 individuals to complete his mission to change the HGS policies. This also means that the domain and enterprise admins for the two Active Directory environments should not be the same person, nor should HGS use the same Active Directory forest as your Hyper-V hosts. Anyone who can grant themselves access to more resources poses a security risk.
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-manageh

NEW QUESTION 16

You plan to deploy Windows Server Gateway (WSG) with Microsoft System Center Virtual Machine Manager (SCVMM).
You need to configure the send and receive buffers for the Hyper-V hosts.
Solution: You run the Windows PowerShell cmdlet Set-NetAdapterAdvancedProperty. Does the solution meet the goal?

  • A. Yes
  • B. No

Answer: A

Explanation:
You can use the following Windows PowerShell command to set the Send Buffers size:
Set-NetAdapterAdvancedProperty "NIC1" –DisplayName "Transmit Buffers" –DisplayValue 3000
You can use the following Windows PowerShell command to set the Receive Buffers size:
Set-NetAdapterAdvancedProperty "NIC1" –DisplayName "Receive Buffers" –DisplayValue 3000
References:
https://docs.microsoft.com/en-us/windows-server/administration/performance-tuning/subsystem/software-define

NEW QUESTION 17

You deploy Microsoft system virtual machine manager (SCVMM)
You need to implement software defined networking (SDN) for the environment. You must create the fewest objects possible and must not implement subnet isolation.
Which three objects should you create in sequence? Move the appropriate actions from the list of actions and arrange them in the correct order.
70-745 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
Here's what you need to do to set up a SDN network controller
1. Configure hosts and physical network infrastructure: You need access to your physical network devices
to configure VLANs, routing etc. You also need Hyper-V hosts to host the SDN infrastructure and tenant VMs.
2. Prepare a virtual hard disk: You can prepare a virtual hard disk for the network controller service template in VHD or VHDX format, as appropriate for the service template generation you choose.
3. Download the service templates: Download the network controller service templates and import them to the VMM library.
4. Set up Active Directory security groups: You'll need an Active Directory security group for network controller management, and another security group for network controller clients. Each group will need at least one user account in it.
5. Set up a VMM library share. You can have an optional library file share for keeping diagnostic logs. This library share will be accessed by the network controller to store diagnostics information throughout its lifetime.
6. Set up a VMM host group: Set up a dedicated host group for all of the SDN Hyper-V hosts.
Note:
Hosts must be running Windows Server 2016 with latest patches installed, and have the Hyper-V role enabled.
7. Create the management logical network: Create a logical network to mirror management network connectivity for the VMM host, network controller hosts, and tenant VM hosts. If you want to allocate static IP addresses from a pool, create a pool on this logical network.
8. Create and deploy a management logical switch: You create the logical switch, and deploy it on network controller hosts, to provide connectivity to the management network for network controller VMs.
9. Set up a certificate: You need an SSL certificate for secure/HTTPS communication with the network controller.
10. Import the template: Import and customize the network controller service template.
11. Deploy the service: Deploy the network controller service using the service template. Then add it as a VMM service.
References:
https://docs.microsoft.com/en-us/system-center/vmm/sdn-controller?view=sc-vmm-1807

NEW QUESTION 18

You are configuring network adapters within a Microsoft system center virtual machine (SCVMM) network fabric. You deploy switch extensions.
The switch must filter packets and choose the appropriate destination port. You need to select a virtual switch extension to include in the logical switch. Which type of virtual extension switch should you include?

  • A. Forwarding
  • B. Monitoring
  • C. Capturing
  • D. filtering

Answer: A

NEW QUESTION 19

You administer Microsoft system center Virtual machine manager (SCVMM). You create a virtual network adapter that connects a virtual machine (VM) named VM1 to a virtual switch called SW1.
You need to configure the maximum and minimum bandwidths for the virtual network adapter. Which object should you create in SCVMM?

  • A. Virtual port profile
  • B. Uplink port profile
  • C. Port classification
  • D. Logical switch

Answer: A

Explanation:
You apply virtual network adapter port profiles to virtual network adapters. These profiles define specific capabilities, such as bandwidth limitations, and priority.
References:
https://docs.microsoft.com/en-us/system-center/vmm/network-port-profile?view=sc-vmm-1807

NEW QUESTION 20

You need to install SCOM.
Which SCOM component should you install first?

  • A. Reporting server
  • B. Web console
  • C. Management server
  • D. Operations console

Answer: C

NEW QUESTION 21

You manage a System Center Virtual Machine Manager (SCVMM) environment. You plan to create virtual machine (VM) networks and IP address pools.
You need to ensure that VM networks are segmented. Solution: You create Windows Firewall rules on the VMs. Does the solution meet the goal?

  • A. Yes
  • B. No

Answer: B

Explanation:
The type of VM network you set up depends on the isolation settings for the logical network:
Network virtualization: If the logical network is isolated using network virtualization you can create multiple VM networks for a logical network. Within a VM network tenants can use any IP addresses they want for their VMs regardless of the IP addresses used on other VM networks. Tenants can also configure some network settings.
VLAN: If the logical network is isolated using VLAN or PVLAN you'll create on VM network for each network site and VLAN in the logical network.
No isolation: If the logical network is configured without isolation you'll create a single VM network linked to a logical network.
References:
https://docs.microsoft.com/en-us/system-center/vmm/network-virtual?view=sc-vmm-1807#create-a-vm-network

NEW QUESTION 22
......

P.S. Easily pass 70-745 Exam with 72 Q&As Allfreedumps.com Dumps & pdf Version, Welcome to Download the Newest Allfreedumps.com 70-745 Dumps: https://www.allfreedumps.com/70-745-dumps.html (72 New Questions)