★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
70-659 Product Description:
Exam Number/Code: 70-659 vce
Exam name: TS: Windows Server 2008 R2, Server Virtualization
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing
Exam Code: 70-659 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS: Windows Server 2008 R2, Server Virtualization
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-659 Exam.
2016 Apr 70-659 Study Guide Questions:
Q17. You have a Windows Server 2008 R2 Hyper-V failover cluster with a single iSCSI logical unit number (LUN) and one highly available virtual machine (HAVM). You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
You monitor the environment by using Microsoft System Center Operations Manager 2007 R2.
You configure a new virtual machine (VM) by deploying a VHD from the VMM library and placing the VHD on the existing iSCSI LUN. You create an HAVM configuration, and you attach the VHD to the configuration.
VMM reports the status of the VMs as Unsupported Cluster Configuration.
You need to be able to manage the VMs by using VMM.
What should you do?
A. Configure Windows System Resource Manager (WSRM) on the Windows Server 2008 R2 cluster nodes.
B. Configure Performance and Resource Optimization (PRO) on the Windows Server 2008 R2 cluster nodes.
C. Move the VHD of one HAVM to the system volume of a cluster node.
D. Move the VHD of one HAVM to a new iSCSI LUN.
The next step for proper network planning and utilization involves iSCSI. Will the VMs be using iSCSI, or will the host be using iSCSI? Regardless of whether it’s a host or a guest, you should set aside a separate interface for each instance of iSCSI traffic. If the host is using iSCSI (for failover clustering, for example), then it should have a separate adapter port that is different from any adapter port being used for guest VMs using iSCSI.
iSCSI can be used in a VM—in fact, it’s the only way to set up a cluster Note of VMs. It’s recommended that if a VM is using iSCSI, you should create a separate virtual network to ensure sufficient bandwidth.
Creating Highly Available Virtual Machines
Last but not least, one of the most important provisioning options is the ability to make a VM highly available.
Doing so provides availability in the event that the virtualization host experiences planned or unplanned downtime. Planned downtime can occur when you perform maintenance on a host; unplanned downtime can occur when a virtualization host goes down completely for any reason.
In the event of planned downtime, the VM state is saved and migrated to another virtualization host in a Hyper-V Quick Migration cluster. If a virtualization host crashes that is a part of a Quick Migration cluster, the VM and associated resources are restarted on another Hyper-V host in the Quick Migration cluster.
To provision highly available VMs, you first must have set up a Quick Migration cluster Then, you’re almost ready to use SCVMM to create highly available VMs. You have to make SCVMM aware of the host cluster the same way you add any host to SCVMM for management. Let’s walk through the steps for making a VM highly available:
1. Add the Quick Migration cluster to SCVMM via the SCVMM administrator console using the Add Host option.
SCVMM detects that you’re adding a node to the Quick Migration cluster and adds SCVMM agents to each host in the cluster. A cluster object is created and available in the SCVMM console.
See Figure for a view of the new cluster object.
Q18. A company has a Windows Server 2008 R2 Hyper-V environment. The environment is managed with Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
A virtual machine (VM) is a node in a Windows failover cluster.
You need to add a new disk drive to the VM. The disk drive will be shared with all other nodes m the failover cluster.
What should you do?
A. Add a disk drive to the VM by using the Add-ClusterSharedVolume PowerShell cmdlet.
B. Assign 1 GB of startup RAM and 8 GB of maximum RAM to the VM.
C. Install the server application in a VM with the latest supported integration components.
D. Add a disk drive to the VM by using the New-VirtualDiskDrive PowerShell cmdlet.
E. Assign 4 GB of static memory to the VM.
F. Add a synthetic network adapter to the VM and select the Enable virtual network optimizations option.
G. Assign 1 GB of startup RAM and 4 GB of maximum RAM to the VM.
H. Add an emulated network adapter to the VM and select the Enable spoofing of MAC addresses option.
I. Install the server application on a physical server.
J. Add a disk drive to the VM by using the iscsicli.exe command line tool.
K. Add an emulated network adapter to the VM and select the Enable virtual network optimizations option.
L. Add a synthetic network adapter to the VM and select the Enable spoofing of MAC addresses option.
Q19. You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
Testers are members of an AD security group named Test.
You need to ensure that members of the Test group can create VMs on a specific host server by using the VMM Self-Service Portal.
What should you do?
A. In VMM, specify a template for new VMs created by members of the Test group.
B. In VMM, create a Delegated Administrator user role and add the Test group to this role.
C. In VMM, assign the Test group the Local Administrator permission for the specific host server.
D. Install Hyper-V Manager on the client computer of each member of the Test group, and grant the Test group administrative privileges on the specific host server.
Q20. A company uses an iSCSI storage area network (SAN). A 6-terabyte logical unit number (LUN) is presented to a Windows Server 2008 R2 Datacenter host server.
You open Disk Management on the host server and find that the LUN contains only a fully allocated 2-terabyte partition.
You need to configure the environment to ensure that the partition can be extended to 6 terabytes.
What should you do?
A. Change the disk to a Master Boot Record (MBR) disk.
B. Change the disk to a dynamic disk.
C. Change the disk to a GUID Partitioning Table (GPT) disk.
D. Create a disk mirror.
MBR max out at 2Tb GPT disk starts at 2Tb to 9.4 zettabytes GUID Partition Table In computer hardware, GUID Partition Table (GPT) is a standard for the layout of the partition table on a physical hard disk. It forms a part of the Extensible Firmware Interface (EFI) standard, which is Intel's proposed replacement for the PC BIOS. It is also used on some BIOS systems because of the limitations of MBR partition tables. GPT allows for a maximum disk and partition size of 9.4 zettabytes (9.4 × 1021 bytes). As of 2010, most current operating systems support GPT, although some operating systems (including Mac OS X and Windows) require systems with EFI hardware to support booting from GPT partitions.
Diagram illustrating the layout of the GUID Partition Table scheme. In this example, each logical block (LBA) is 512 bytes in size, and each partition entry is 128 bytes. LBA addresses that are negative indicate position from the end of the volume, with 1 as the last addressable block. http://en.wikipedia.org/wiki/GUID_Partition_Table
Q21. You are using Microsoft System Center virtual Machine Manager (VMM) 2008 R2 to perform physical-to-virtual (P2V) conversions.
Your company's network includes computers that each run one of the following operating systems:
-Windows NT 4.0 Server with NTFS volumes -Windows Server 2003 Standard Edition with FAT volumes -Windows Server 2003 Enterprise Edition x64 with NTFS volumes -Windows Server 2003 Enterprise Edition for Itanium-based Systems with FAT volumes
You need to choose the operating system that can be reliably converted only by using the offline P2V method.
Which operating system should you choose?
A. Windows NT 4.0 Server with NTFS volumes
B. Windows Server 2003 Enterprise x64 with NTFS volumes
C. Windows Server 2003 Enterprise for Itanium-based Systems with FAT volumes
D. Windows Server 2003 Standard with FAT volumes
Down to date 70-659 test preparation:
Q22. All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services (RDS).
You are configuring the Remote Desktop Session Host (RD Session Host) role service. You install an application on all of the RD Session Host servers. The application communicates with a server that allows only one connection per IP address.
You need to configure the Remote Desktop IP Visualization settings for this application.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Enable Remote Desktop IP Visualization,
B. Set the IP Visualization mode to Per session,
C. Set the IP Visualization mode to Per program.
D. Disable Remote Desktop IP Visualization.
12/06/2012 Changed answer from BC to AC, because it states in the question "The application communicates with a server that allows only one connection per IP address." there is no need to set Set the IP Visualization mode to Per session, http://blogs.msdn.com/b/rds/archive/2009/07/09/configuring-remote-desktop-ip-virtualization-part-1.aspx Remote Desktop IP Virtualization allows IP addresses to be assigned to remote desktop connections on a per session or per program basis. This can be useful if a program communicates with a server that only allows one connection per IP address. Prior to Windows Server 2008 R2, every session on an RD Session Host server was assigned the same IP address. With Windows Server 2008 R2, you can use Remote Desktop IP Virtualization to assign IP addresses on a per session or per program basis. If you assign IP addresses for multiple programs, they will share a per session IP address. If you have more than one network adapter on the server, you must also choose one network adapter for Remote Desktop IP Virtualization. Remote Desktop IP Virtualization is configured by using the Remote Desktop Session Host Configuration tool. On the RD IP Virtualization tab of Remote Desktop Session Host Configuration, you can do the following:
Enable or disable Remote Desktop IP Virtualization.
Select the network adapter to be used for Remote Desktop IP Virtualization.
Configure whether the Remote Desktop IP Virtualization mode is per session or per program.
If Remote Desktop IP Virtualization is configured per program, you can add a list of programs that
Remote Desktop IP Virtualization can use.
Membership in the local Administrators group, or equivalent, on the RD Session Host server that
you plan to configure, is the minimum required to complete this procedure. Review details about
using the appropriate accounts and group memberships at
To configure Remote Desktop IP Virtualization settings
On the RD Session Host server, open Remote Desktop Session Host Configuration. To open
Remote Desktop Session Host Configuration, click Start, point to Administrative Tools, point to
Remote Desktop Services, and then click Remote Desktop Session Host Configuration.
In the Edit settings area, under RD IP Virtualization, double-click IP Virtualization.
In the Properties dialog box, click the RD IP Virtualization tab.
To enable or disable Remote Desktop IP Virtualization, do one of the following:
Select the Enable IP virtualization check box to enable Remote Desktop IP Virtualization.
Clear the Enable IP virtualization check box to disable Remote Desktop IP Virtualization.
To select the network adapter to be used for Remote Desktop IP Virtualization, in the Select the network adapter to be used for IP virtualization list, select the appropriate network adapter.
To select the Remote Desktop IP Virtualization mode, under IP virtualization mode:
Click Per session to configure Remote Desktop IP Virtualization to run in per session mode.
Click Per program to configure Remote Desktop IP Virtualization to run in per program mode.
To assign which programs use Remote Desktop IP Virtualization, under Assign virtual IP addresses to these programs, click Add Program.
Q23. Your company has a single active Directory Domain Services (AD DS) domain that includes AD Security group named test and development.
You are configuring a Windows server 2008 R2 Hyper-V server. The server hosts five virtual machines (VMs) that are used by test group members can manage only the Development VMs.
You need to ensure that Test group members can manage only the Test VMs and that development group members can manage only the Development VMs.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)
A. In the authorization manager, create a group named AzManTest and group named AzmanDev. Add the test group members to the AzManTest group, and add the development group members to the AzmanDev group. Assign the AzManTest and AzManDev group to the administrator role in the default scope.
B. Add the Test VM computer accounts to the Test group, and add the Development VM computer accounts to the development group.
C. Create and run a script that uses windows management instrument (VMI) to assign each VM to the appropriate scope.
D. In Authorization Manager, create a scope named Test and a scope named Development. In each scope, create an Administrator role, and add all the Hyper-V operations to the role. Assign the Test group to the Test scope Administrator role, and assign the Development group to the Development scope Administrator role.
Q24. You have a Windows Server 2008 R2 Hyper-V server.
Hyper-V Manager shows a state of Paused and a status of Disk(s) running out of space for one of the virtual machines (VMs).
You delete several unneeded snapshots from the VM snapshot tree, and you resume the VM.
After less than one minute, the state of the VM reverts to Paused.
You need to enable the VM to return to a state of Running.
What should you do first?
A. Turn off the VM.
B. Export the VM.
C. Reset the VM.
D. Save the VM.
CORRECT - you will recognize that when you delete an snaphot when a VM is running, it goes very fast and no further actions are taken (merge, delete...). Cause the merge can "only" be done when the VM is powered off. after this process is completed all *.AVHD files should be gone (when no more snapshot are available)! "....To make it simple the current status (“NOW”) will be kept and all other snapshot will be gone? Is it right?...." CORRECT - When you delete an snapshot (tree) and power off the VM, your latest "NOW" status will then be merged First of all, you can create a snapshot (wow, amazing stuff). This creates a differencing disk that reverences your base VHD, thus you always have that base VHD to return to, and saves your current memory status (if your VM was running). Second, you can Apply a snapshot. This takes me back to the point in time that is represented by the snapshot I selected. It does this by the same process as above, it creates a differencing disk and attaches it to the VHD that is referenced by the snapshot. Okay, if I am losing you – you need to back up and read the posts I referenced above. For the next couple you need to think about trees and the branching of a tree structure. The simplest way to show this is a single picture of an expanded tree (visual aids are always good).
Third, I can delete a single snapshot. This deletes the moment in time that a snapshot represents, its differencing disk and any saved memory state. If a snapshot is ‘below’ this one on the sub tree, then its reference pointers are modified to reference the proper snapshot ‘above’ it.
In this example I deleted Snapshot B.1
There are other things happening here as well. To maintain integrity of the snapshot timeline the differencing disks need to be merged. This happens in the background when a VM is powered off and I will save the gritty details for another post.
Fourth, I can delete a snapshot sub tree. This deletes the moment in time that a snapshot represents and any other snapshots that are ‘below’ it in the tree. Thus it does what a delete does, but without selecting individual snapshots, it takes an entire branch. Yes, we get a merge, not a revert as I mistakenly put in my graphic.
Now, to get started on the really complicated post..what happens under the hood.
I have alluded to this before with the instructions about how to manually merge VHDs. Maybe I need to back up even more and talk about differencing disks...hmm..
Q25. DRAG DROP
A company has a server that runs Microsoft System Center Virtual Machine Manager (VMM) 2008
R2 with Service Pack (SP) 1 and Windows Server 2008 R2 Enterprise with Hyper-V.
The company is preparing to deploy virtual machines (VMs) from templates and has the following requirements:
-The templates must be created from virtual hard disks (VHDs).
-The templates must include Windows 7.
-An out of the box experience (OOBE) must be provided for all guest operating systems that are deployed from the templates.
You need to create a template that meets the company requirements.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Q26. DRAG DROP
A company has a physical Windows 2008 R2 server that they plan to migrate to a virtual machine (VM).
You need to document the migration process.
How should you complete the diagram? (To answer, drag the appropriate answers from the list of answer choices to the correct locations in the answer area)
1. (1) Install agent.
2. (3) Capture Image.
3. (5) Create Virtual machine. http://technet.microsoft.com/en-us/library/bb963740.aspx
Tested 70-659 bible:
Q27. You are configuring a virtual machine (VM) that is hosted on a Windows Server 2008 R2 Hyper-V server. The VM is currently in the Running state.
You need to export the VM without loss of data.
What are two possible first steps that you could perform to achieve this goal?
(Each correct answer presents a complete solution. Choose two.)
A. Save the VM.
B. Pause the VM.
C. Turn off the VM.
D. Shut down the VM.
Q28. A company has two Windows Server 2008 R2 Datacenter servers with Hyper-V. A single logical unit number (LUN) is presented to both servers.
The company has the following requirements:
-Both hosts must be able to access the LUN simultaneously.
-All virtual machines (VMs) will be highly available virtual machines.
You need to configure the environment to meet the company requirements.
Which two actions should you perform? (Each answer presents part of the solution. Choose two.)
A. Install the Internet Storage Name Server (iSNS) feature.
B. Install the Network Load Balancing feature.
C. Install the Failover Clustering feature.
D. Enable the Clustered Shared Volume (CSV) feature.
E. Enable dynamic memory on the VMs.
F. Install the Storage Manager for SANs feature.
Q29. You use Hyper-V Manager to create a new virtual machine named VM1. VM1 has the configuration shown in the following display.
You start VM1 and begin installing Windows Server 2008 R2 from a DVD. An error message appears, and you are unable to complete Windows Setup.
You need to be able to install Windows Server 2008 R2 on VM1.
What should you do?
A. Increase the Memory setting to 2048 MB.
B. Move VM1.vhd to IDE Controller 0.
C. Change the Processor setting to 1 Virtual Processor.
D. Change the Bios setting to Boot from IDE.
Determining your storage configuration options on virtual machines You can select either integrated device electronics (IDE) or SCSI devices on virtual machines: IDE devices. Hyper-V uses emulated devices with IDE controllers. You can have up to two IDE controllers with two disks on each controller. The startup disk (sometimes referred to as the boot disk) must be attached to one of the IDE devices. The startup disk can be either a virtual hard disk or a physical disk. Although a virtual machine must use an IDE device as the startup disk to start the guest operating system, you have many options to choose from when selecting the physical device that will provide the storage for the IDE device. For example, you can use any of the types of physical storage identified in the introduction section. SCSI devices. Each virtual machine supports up to 256 SCSI disks (four SCSI controllers with each controller supporting up to 64 disks). SCSI controllers use a type of device developed specifically for use with virtual machines and use the virtual machine bus to communicate. The virtual machine bus must be available when the guest operating system is started. Therefore, virtual hard disks attached to SCSI controllers cannot be used as startup disks.
Q30. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V environment.
The finance department uses a legacy application that is not supported on Windows Server 2008 R2. The application runs on a server that has the following configuration:
-Windows 2000 Server operating system
-One 10GB hard disk, FAT formatted
-512 MB of RAM
You need to ensure that you can perform a physical-to-virtual (P2V) conversion of the server.
What should you do?
A. Run the convert c: /FS: NTFS command on the server.
B. Use offline P2V.
C. Increase the server's RAM to at least 1024 MB.
D. Use online P2V.
The following table lists some of the differences between the online and offline P2V conversions.
Requirements on the Source Machine
To perform a P2V conversion, your source computer:
Must have at least 512 MB of RAM.
Cannot have any volumes larger than 2040GB.
Must have an Advanced Configuration and Power Interface (ACPI) BIOS – Vista WinPE will not install on a non-ACPI BIOS.
Must be accessible by VMM and by the host computer.
Cannot be in a perimeter network. A perimeter network, which is also known as a screened subnet, is a collection of devices and subnets placed between an intranet and the Internet to help protect the intranet from unauthorized Internet users. The source computer for a P2V conversion can be in any other network topology in which the VMM server can connect to the source machine to temporarily install an agent and can make Windows Management Instrumentation (WMI) calls to the source computer.
The following table lists the Windows operating systems for which P2V conversions are supported in VMM2008 and in VMM2008R2.
Supported Operating Systems for P2V Conversions in VMM2008 and VMM2008R2
Q31. On each Guest VM, in Windows, Configure each Network Adapter based on your network address scheme.
The required configuration information for each Network adapter is as follows:
NLBNIC: IP Address and Subnet Only Configured
WINS: Disable Netbios
IMPORTANT: DO NOT MANUALLY select the “network load balancing (NLB) connection”!! This will happen automatically during the NLB Cluster creation process. If its manually selected the NLB Cluster creation will not pick up this network interface as an option. This image is merely to serve as a reference to remove all connections accept NLB and TCP.
Corp NetworkNIC: Corporate network configuration (IP, GW, DNS).
NLB Remote Access Connections
My Server NIC configuration:
Q32. You create a virtual machine (VM) on a Windows Server 2008 R2 Hyper-V server.
You plan to use this VM as the base image for new VMs.
You need to ensure that you can import the base image multiple times on the original host server.
In the Import Virtual Machine Wizard, which settings should you configure during each import process?
A. Select the Copy the virtual machine option and the Duplicate all files check box.
B. Select the Copy the virtual machine option. Clear the Duplicate all files check box.
C. Select the Move or restore the virtual machine option and the Duplicate all files check box.
D. Select the Move or restore the virtual machine option. Clear the Duplicate all files check box.
Importing a virtual machine was a onetime operation unless you kept a backup of the files. Hyper-V now provides the ability to backup the files for you. Hyper-V R2 Import Virtual Machine wizard now has the ability to duplicate the files of a virtual machine you are attempting to import so that you can import it another time. This is presented by a checkbox option on the import wizard screen that reads.
Duplicate all files so the same virtual machine can be imported again.
By selecting this option when you import a virtual machine, Hyper-V will make a backup of the required files so that you can import this virtual machine again if needed.
see more 70-659 dumps