Question
You plan to use a Hyper-v host server to host virtual desktops for external customers.
You have the following requirements:
Individual virtual machines (VMs) must be isolated from one another.
VMs must have access to the Internet.
IP addresses should be used in the most efficient manner possible.
The configuration must minimize administrative effort and management complexity.
You need to configure the virtual environment.
What should you do?
A. Configure a port virtual local area network (PVLAN). Connect all new VMs to the PVLAN.
B. Configure virtual networking with network isolation. Create a unique VM network for each VM.
C. Deploy VMs to the same VM network. Enable DHCP Guard and Router Guard network extensions.
D. Configure a virtual network with no isolation. Deploy VMs to the same VM network. Configure Windows firewall on each VM to prevent the VM from communicating with other VMs on the same VM network.
Correct Answer: A
Question
A company has Hyper-v host servers that run Windows Server 2012. The company also has virtual machines
that run Windows Server 2008 R2 or Windows Server 2012.
You upgrade the Hyper-V host servers to Windows Server 2012 R2.
You need to ensure that all virtual machines can PXE boot by using a standard network adapter.
What should you do?
A. Create Generation 2 virtual machines.
B. Upgrade all existing virtual machines to Windows Server 2012 R2.
C. Upgrade the existing virtual machines that run Windows Server 2008 R2 to Windows Server 2012 R2.
D. Create Generation 1 virtual machines.
Correct Answer: A
Question
You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. The server hosts three
virtual machines (VMs).
One of the VMs is managed by a security engineer. The security engineer must capture traffic on another VM
that is running on the same server.
You need to ensure that the security engineer can access the network traffic information from the target VM.
Which networking feature should you enable?
A. port mirroring
B. NIC teaming
C. protected network
D. MAC address spoofing
Correct Answer: A