Does this meet the goal?

Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on
each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a
virtual network adapter that is connected to the external virtual network switch and that has a VLAN
identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster. The cluster will be configured to use unicast only.

You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the
existing virtual network adapter.
Does this meet the goal?

Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on
each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a
virtual network adapter that is connected to the external virtual network switch and that has a VLAN
identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster. The cluster will be configured to use unicast only.

You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the
existing virtual network adapter.
Does this meet the goal?

A.
Yes

B.
No



Leave a Reply 6

Your email address will not be published. Required fields are marked *


JamesL

JamesL

Disagree

surely if its unicast you need 2 NICs in each VM. Therefore without addition of another NIC spoofing will not meet the goal

Answer B. No

mi74

mi74

Second NIC is only needed for being able to connect to strict machine. But if they are virtual, you can simply connect to concole, from Hyper-V manager snap-in, not even needing RDP…

Piet

Piet

Unicast with only 1 NIC is possible so answer A is correct.

RR

RR

correction: W2008 and higher support unicast with one NIC. Spoofing is set on VMnic. I think A is correct

Reginaldo

Reginaldo

In the text does not specify that will be exist communications between them. So A is correct.