You need to minimize the likelihood that a virtual mach…

Note: This question is part of a series of questions that use the same scenario. For your convenience, the
scenario is repeated in each question. Each question presents a different goal and answer choices, but the text
of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and
the domain is Windows Server 2008 R2. All servers in the domain run Windows Server 2016 Standard. The
domain contains 300 client computers that run either Windows 8.1 or Windows 10.
The domain contains nine servers that are configured as shown in the following table.

The virtual machines are configured as follows:
– Each virtual machine has one virtual network adapter.
– VM1 and VM2 are part of a Network Load Balancing (NLB) cluster.
– All of the servers on the network can communicate with all of the virtual machines.
You need to minimize the likelihood that a virtual machine running malicious code will consume excessive
resources on Server5.
What should you do?

Note: This question is part of a series of questions that use the same scenario. For your convenience, the
scenario is repeated in each question. Each question presents a different goal and answer choices, but the text
of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and
the domain is Windows Server 2008 R2. All servers in the domain run Windows Server 2016 Standard. The
domain contains 300 client computers that run either Windows 8.1 or Windows 10.
The domain contains nine servers that are configured as shown in the following table.

The virtual machines are configured as follows:
– Each virtual machine has one virtual network adapter.
– VM1 and VM2 are part of a Network Load Balancing (NLB) cluster.
– All of the servers on the network can communicate with all of the virtual machines.
You need to minimize the likelihood that a virtual machine running malicious code will consume excessive
resources on Server5.
What should you do?

A.
Configure the virtual machines as shielded virtual machines.

B.
Run theSet-VMProcessorcmdlet and specify the–EnableHostResourceProtectionparameter.

C.
Run theSet-VMProcessorcmdlet and specify the –MaximumCountPerNumaNodeparameter.

D.
Configure VM Network Adapter Isolation.



Leave a Reply 0

Your email address will not be published. Required fields are marked *