Online Access Free 74-409 Exam Questions
Exam Code: | 74-409 |
Exam Name: | Server Virtualization with Windows Server Hyper-V and System Center |
Certification Provider: | Microsoft |
Free Question Number: | 99 |
Posted: | Sep 05, 2025 |
You administer two Windows 2012 R2 servers that have the Hyper-V role installed. You plan to deploy a new Hyper-V cluster. The cluster instance must NOT be added to Active Directory. You need to deploy the cluster. What should you do?
A company has a highly-secure network infrastructure environment. All servers in the environment run Windows Server 2012 R2.
You must create a new virtual machine (VM) that meets the following requirements:
- The VM must minimize the risk that unauthorized firmware will run when the VM starts.
- The VM must load the operating system only if all operating system files have a valid signature.
You need to create the new VM. What should you do?
DRAG DROP
A company uses System Center 2012 R2 Virtual Machine Manager (VMM).
You need to create and assign a self-service user role in VMM.
You have the following requirements:
- All role members must share ownership of all virtual machines (VMs) that any role
member creates.
- Role members must be able to deploy VMs.
- Role members must NOT have authoring rights.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
UESTION NO: 23
You are the virtualization administrator for an organization that manages private and public cloud-based resources. The organization uses Windows Server 2008 R2 SP1 Hyper-V. All Hyper-V host servers are configured as nodes in a four-node cluster. The organization also uses System Center 2012 R2.
Operating system updates to each host server require a system reboot.
You need to ensure that the virtual machines remain online during any reboots required by the updates.
What should you do?
You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. The server hosts three virtual machines (VMs).
One of the VMs is managed by a security engineer. The security engineer must capture traffic on another VM that is running on the same server.
You need to ensure that the security engineer can access the network traffic information from the target VM.
Which networking feature should you enable?