What is resource monitoring in windows server 2012

Assignment Help Management Information Sys
Reference no: EM13813983

PART :1

1. What happens if you attempt to add workgroup servers to Server Manager?

a. Server Manager allows only servers that are members of an Active Directory Domain Services (AD DS) domain to be managed.

b. Server Manager adds and allows management of any computer, whether a member of an AD DS domain or workgroup.

c. Server Manager will not permit workgroup servers to be added and managed.

d. Server Manager usually allows you to add workgroup servers, but attempts to access the remote server fail with a "Credentials not valid" error.

2. Once a server is added to Server Manager, what actions are taken to permit remote server management?

a. No further action is needed. For example, you may immediately use the Add Roles and Features Wizard.

b. No further action is needed, because Windows Remote Management (WinRM) is enabled on the source Windows Server 2012.

c. No further action is needed because WS-Management Protocol is already running.

d. No further action is needed thanks to Windows Management Instrumentation (WMI) and Windows PowerShell.

3. What is the primary difference between the Windows Server 2012 Server Manager and previous versions?

a. Windows Server 2012 Server Manager allows management of multiple remote servers at once.

b. Windows Server 2012 Server Manager allows management of remote servers, categorized in role groups.

c. Windows Server 2012 Server Manager allows remote management of other servers, including down-level Windows servers.

d. Windows Server 2012 Server Manager has been tested with nearly 100 servers added to the interface.

4. What functional benefit is derived from creating server groups?

a. Server groups allow administrators to add roles to several servers at once.

b. Server groups allow administrators to navigate and organize several servers at once.

c. Server groups allow administrators to navigate several servers at once.

d. Server groups allow administrators to organize several servers at once.

5. The security configuration of the Windows PowerShell Web Access Gateway server iscrucial, employing a security certificate from a trusted certification authority and userspecific

authorization rules. Why are these security measures so crucial?

a. There is often both client and server side security, but only server end measures are controlled.

b. There is no mandatory security on the client side of the application, relying more on server side security.

c. There is no security on the client side of the application, instead relying on robust server side security.

d. There is often both client and server side security, but only client end measures are controlled.

PART :2

1. Hyper-V in Windows Server 2012 is a Type I virtualization architecture. What isthe fundamental difference between Hyper-V and older, Type II virtualization  architectures?

a. Hyper-V creates environments called partitions, each with its own operating system installed.

b. Its hypervisor designates the first partition as the parent partition and all subsequent partitions as child partitions.

c. Its hypervisor is an abstraction layer and interacts directly with computer hardware, rather than as a host OS application.

d. Computer subsystems such as Plug and Play and power management are managed by Hyper-V's parent partition.

2. Windows Server 2012 includes Hyper-V in which edition(s)?

a. All editions

b. The Datacenter edition

c. The Standard and Datacenter editions

d. The Essentials, Standard, and Datacenter editions

3. After installing the Hyper-V role, what is the startup procedure for Windows Server

2012?

a. The newly installed hypervisor starts first, and then loads the operating system as the primary or parent partition.

b. The actual startup procedure is not altered.

c. The newly installed hypervisor starts first, and then loads the operating system as a child partition.

d. The newly installed hypervisor starts second, after the operating system loads as a partition.

4. What is the primary purpose of the software package offered by Hyper-V called guestintegration services?

a. Guest integration services improves communications between the parent partition and child partitions.

b. Guest integration services resolves compatibility issues of certain guest operating systems experiencing non-functioning features.

c. Guest integration services improves data exchange between the parent partition and child partitions.

d. Guest integration services improves time synchronization between the parent partition and child partitions.

5. What is Resource Monitoring in Windows Server 2012?

a. Resource Monitoring is a PowerShell-based feature that enables you to document virtual machine usage.

b. Resource Monitoring is a Server Manager feature that enables you to monitor virtual machine resources.

c. Resource Monitoring is a PowerShell-based feature that enables you to redistribute virtual machine resources.

d. Resource Monitoring is a Server Manager feature that enables you to document virtual machine communications.

PART :3

1. Deciding between two virtual disk formats (VHD and VHDX), you need one to accommodateimage sizes up to 2 TB (terabytes) and be compatible with both Windows Server  2012's Hyper-V and Microsoft's older product, Virtual PC. Which format do you choose

and why?

a. VHD, because it supports up to 2 TB image files.

b. VHDX, because it supports file sizes far beyond 2 TB-up to 64 TB.

c. VHD, because it supports both new and old hypervisor products.

d. VHDX, because it supports larger block sizes for tuning storage performance.

2. You need to connect a virtual hard disk with a virtual machine (VM). What disk formatdo you choose and why?

a. VHDX, because it's the only one available when creating a new disk.

b. VHD or VHDX if using an existing virtual hard disk.

c. VHD with an existing hard disk and a Type II hypervisor product.

d. Either one is possible and applicable.

3. You intend to create a new virtual hard disk, specifying a 700 GB VHDX image file witha logical sector size of 4 KB. How do you proceed?

a. With Server Manager, using Hyper-V Manager's New Disk feature.

b. With the utilities included in Hyper-V's guest integration services.

c. Those exact specifications are not possible in Hyper-V Manager.

d. With PowerShell, using the New-VHD cmdlet with appropriate parameters.

4. Is it possible for a VM to access a hard disk directly?

a. No. VMs access virtual hard disks, areas of space on the physical hard disk.

b. Yes. VMs can have "pass-through disks," a special virtual disk that directly accesses

the physical disk if made exclusively available to the VM.

c. No. VMs can never access physical hardware, but only through the hypervisor.

d. Yes. VMs use virtual hard disks, which are essentially the physical hard disks.

5. What is a key benefit of using differencing disks?

a. They enable you to use baseline images.

b. They enable you to keep a fixed image in its original state.

c. They allow you to experiment without repercussions.

d. They let you create parent and child-differencing disks.

Reference no: EM13813983

Questions Cloud

Write court opinion on this case : Write a three to four (3-4) page court opinion in which you rule on this case. In preparing this opinion, you must: Decide whether this court should hear this case or dismiss the case and direct the parties to binding arbitration in accordance with ..
Question regarding the variety of ethical issues : Health care providers, managers, and administrators are faced with a variety of ethical issues. These issues range from right to life and abortion to right to die and physician assisted suicide.
Tour operator agency database : Tour Operator Agency Database
Define business-level strategy : For the corporation that operates internationally, briefly evaluate its international business-level strategy and international corporate-level strategy and make recommendations for improvement.
What is resource monitoring in windows server 2012 : What is Resource Monitoring in Windows Server 2012
Evolution of cybercrime and vulnerability of united states : This film was made in 2008. Based on the film, the readings and your own gut feelings, prepare a 3 minute presentation on the evolution of Cybercrime and the vulnerability of the United States
Briefly evaluate its international business-level strategy : briefly evaluate its international business-level strategy and international corporate-level strategy and make recommendations for improvement.
What an officer would do : What an officer would do if there was an unethical situation going on in there department and how they would deal with it
Cost estimation in software development projects : Cost Estimation in Software Development Projects

Reviews

Write a Review

Management Information Sys Questions & Answers

  How to protect an organization

From the e-Activity, explain, in your own words, each security compliance measure and how each, in general, is designed to protect an organization

  Computing problems digipos faced with system upgrades

Examine and assess the main computing problems Digipos faced with regard to system upgrades. Evaluate the solutions that Digipos used to resolve the problem. Propose an alternative solution that you believe could resolve the problem

  Information politicsone of the most critical problems faced

information politicsone of the most critical problems faced by the information technology department in virtually every

  Describe right to privacy for workers

Right to privacy for workers - Where do you draw the line between internal computer monitoring and the right to privacy for workers?

  Manufacturing resource planningcan you please describe in a

manufacturing resource planningcan you please describe in a paragraph or two why mandatory requirements is necessary in

  Write the your company it planning

Write the Your Company's IT Planning and Analysis Processes section of your term paper

  Need of application system like sapwhy corporation need 21

need of application system like sapwhy corporation need 21 century application system like sap oracle people soft or jd

  Prepare a three page memorandum

Prepare a three page memorandum that examines an opt-in vs opt-out startegy for an online buiness to daopt. 3 external reference must be cited.

  What are some of the shifters and potential substitutes

What are some of the shifters and potential substitutes and complements for the smaller rural hospitals.

  Eliminate an operating segment with net loss

Operational Information for investors - what circumstances would it be disadvantageous to eliminate an operating segment with net loss?

  Benefits of automating the business

Advantages of Automating the Business - How would you estimate the benefits of automating the business versus the investment cost? Give a specific example.

  Show the supply chain integration

If you were the new CEO of the second largest supermarket chain, how could you use supply chain integration to be more efficient and profitable

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd