70-743 Upgrading Your Skills to MCSA Server 2016: Practice Tests

70-743 Upgrading Your Skills to MCSA Server 2016: Tests 2020

70-743 exam practice tests

70-743 Upgrading Your Skills to MCSA Server 2016: Practice Tests

Welcome to the practice tests for exam 70-743 Practice tests on Windows Server 2016.

This practice tests covered 70-743 installation, storage, compute, networking, and identity functionality available in Windows Server 2016 syllabus questions and you will get confidence for passing the Microsoft official 70-743 Exam .This 70-743 practice test will help you prepare for the real exam test environment.This course provides practice for taking the actual exam

70-743: Upgrading Your Skills to MCSA: Windows Server 2016 practice test is designed to help candidates prepare for and pass Microsoft’s 70-743 exam. The 70-743 exam practice tests covers some of the topics covered in the main Windows Server 2016 exams: 70-740, 70-741, and 70-742.

Candidates who have already earned an MCSA: Windows Server 2008 or MCSA: Windows Server 2012 R2 certification can upgrade their certification to MCSA: Windows Server 2016 by passing the 70-743 exam . This is an Unofficial course and this course is not affiliated, licensed or trademarked with Microsoft in any way.”

New Updated questions

70-743 exam practice tests improve the following skills:

  • Install Windows Servers in host and compute environments

  • Implement storage solutions

  • Implement Hyper-V

  • Implement Windows containers

  • Implement high availability

  • Implement Domain Name System (DNS)

  • Implement network connectivity and remote access solutions

  • Implement an advanced network infrastructure

  • Install and configure Active Directory Domain Services (AD DS)

  • Implement identity federation and access solutions

Course not found.

Microsoft exam 70-743 exam Practice tests

Question 1.

You have a server named Server1 that runs Windows Server 2016.
You need to configure Server1 as a multitenant RAS Gateway.
What should you install on Server1?

  • A. the Network Controller server role
  • B. the Remote Access server role
  • C. the Data Center Bridging feature
  • D. the Network Policy and Access Services server role

Answer 1. B

RAS Gateway – Multitenant. You can deploy RAS Gateway as a multitenant, software-based edge gateway and router when you are using Hyper-V Network
Virtualization or you have VM networks deployed with virtual Local Area Networks (VLANs). With the RAS Gateway, Cloud Service Providers (CSPs) and
Enterprises can enable datacenter and cloud network traffic routing between virtual and physical networks, including the Internet. With the RAS Gateway, your tenants can use point-so-site VPN connections to access their VM network resources in the datacenter from anywhere. You can also provide tenants with site-to- site VPN connections between their remote sites and your CSP datacenter. In addition, you can configure the RAS Gateway with BGP for dynamic routing, and you can enable Network Address Translation (NAT) to provide Internet access for VMs on VM networks.

Question 2.

You have an Active Directory domain that contains several Hyper-V hosts that run Windows Server 2016.
You plan to deploy network virtualization and to centrally manage Datacenter Firewall policies.
Which component must you install for the planned deployment?

  • A. the Routing role service
  • B. the Canary Network Diagnostics feature
  • C. the Network Controller server role
  • D. the Data Center Bridging feature

Answer 2. C

Using Windows PowerShell, the REST API, or a management application, you can use Network Controller to manage the following physical and virtual network infrastructure:
* Datacenter Firewall
This Network Controller feature allows you to configure and manage allow/deny firewall Access Control rules for your workload VMs for both East/West and North/
South network traffic in your datacenter. The firewall rules are plumbed in the vSwitch port of workload VMs, and so they are distributed across your workload in the datacenter. Using the Northbound API, you can define the firewall rules for both incoming and outgoing traffic from the workload VM. You can also configure each firewall rule to log the traffic that was allowed or denied by the rule.
* Hyper-V VMs and virtual switches
* Remote Access Service (RAS) Multitenant Gateways, Virtual Gateways, and gateway pools
* Load Balancers

Question 3.

You have a virtual machine named VM1 that runs Windows Server 2016. VM1 hosts a service that requires high network throughput.
VM1 has a virtual network adapter that connects to a Hyper-V switch named vSwitch1. vSwitch1 has one network adapter. The network adapter supports Remote
Direct Memory Access (RMDA), the Single Root I/O Virtualization (SR-IOV) interface, Quality of Service (QoS), and Receive Side Scaling (RSS).
You need to ensure that the traffic from VM1 can be processed by multiple networking processors.
Which Windows PowerShell command should you run on the host of VM1?

  • A. Set-NetAdapterRss
  • B. Set-NetAdapterRdma
  • C. Set-NetAdapterSriov
  • D. Set-NetAdapterQoS

Answer 3. A

Course not found.

The Set-NetAdapterRss cmdlet sets the receive side scaling (RSS) properties on a network adapter. RSS is a scalability technology that distributes the receive network traffic among multiple processors by hashing the header of the incoming packet. Without RSS Windows Server 2012/2016; network traffic is received on the first processor which can quickly reach full utilization limiting receive network throughput. Many properties can be configured using the parameters to optimize the performance of RSS. The selection of the processors to use for RSS is an important aspect of load balancing. Most of the parameters for this cmdlet help to determine the processors used by RSS.

Question 4.

You have a Nano Server named Nano1.
You deploy several containers to Nano1 that use an image named Image1.
You need to deploy a new container to Nano1 that uses Image1.
What should you run?

  • A. the Install-WindowsFeature cmdlet
  • B. the docker run command
  • C. the docker load command
  • D. the Install-NanoServerPackage cmdlet

Answer 4. B

When an operator executes docker run, the container process that runs is isolated in that it has its own file system, its own networking, and its own isolated process tree separate from the host.
The basic docker run command takes this form:
$ docker run [OPTIONS] IMAGE[:TAG|@DIGEST] [COMMAND] [ARG…]

Question 5.

You have a server named Server1 that runs Windows Server 2016.
You plan to deploy Internet Information Services (IIS) in a Windows container.
You need to prepare Server1 for the planned deployment.
Which three actions should you perform? Each correct answer presents part of the solution.

  • A. Install the Container feature.
  • B. Install Docker.
  • C. Install the Base Container Images.
  • D. Install the Web Server role.
  • E. Install the Hyper-V server role.

Answer 5. A, B, C

Step 1 (A): The container feature needs to be enabled before working with Windows containers. To do so run the following command in an elevated PowerShell session.
Enable-WindowsOptionalFeature -Online -FeatureName containers All
Step 2 (B): Docker is required in order to work with Windows containers.
Note: First install the OneGet PowerShell module.
Install-Module -Name DockerMsftProvider -Repository PSGallery -Force
Next you use OneGet to install the latest version of Docker.
Install-Package -Name docker -ProviderName DockerMsftProvider
Step 3 (C): Install Base Container Images
Windows containers are deployed from templates or images. Before a container can be deployed, a container base OS image needs to be downloaded. The following commands will download the Nano Server base image.
Pull the Nano Server base image.
docker pull microsoft/nanoserver

Question 6.

You have a Hyper-V host named Server1 that runs Windows Server 2016.
Server1 has a virtual machine named VM1. VM1 is configured to run the Docker daemon.
On VM1, you have a container network that uses transparent mode.
You need to ensure that containers that run on VM1 can obtain IP addresses from DHCP.
What should you do?

  • A. On VM1, run docker network connect.
  • B. On Server1, run docker network connect.
  • C. On VM1, run Get-VMNetworkAdapter –VMName VM1 | Set-VMNetworkAdapter –MacAddressSpoofing On.
  • D. On Server1, run Get-VMNetworkAdapter –VMName VM1 | Set-VMNetworkAdapter – MacAddressSpoofing On.

Answer 6. D

If the container host is virtualized, and you wish to use DHCP for IP assignment, you must enable MACAddressSpoofing.
PS C:\> Get-VMNetworkAdapter -VMName ContainerHostVM | Set-VMNetworkAdapter -MacAddressSpoofing On
The command needs to be run on the Hyper-V host.

Course not found.

Question 7.

You have a server named Server1 that runs Windows Server 2016. You install the Docker daemon on Server1.
You need to configure the Docker daemon to accept connections only on TCP port 64500.
What should you do?

  • A. Edit the configuration.json file.
  • B. Run the Set-ServiceWindows PowerShell cmdlet.
  • C. Edit the daemon.json file.
  • D. Run the New-NetFirewallRule cmdlet

Answer 7. C

Configure Docker with Configuration File
The preferred method for configuring the Docker Engine on Windows is using a configuration file. The configuration file can be found at ‘c:\ProgramData\docker
\config\daemon.json’.
Only the desired configuration changes need to be added to the configuration file. For example, this sample configures the Docker Engine to accept incoming connections on port 64500. All other configuration options will use default values.
{
“hosts”: [“tcp://0.0.0.0:64500”]
}

Question 8.

You have a failover cluster named Cluster1.
A virtual machine named VM1 is a highly available virtual machine that runs on Cluster1. A custom application named App1 runs on VM1.
You need to configure monitoring on VM1. If App1 adds an error entry to the Application even log, VM1 should be automatically rebooted and moved to another cluster node.
Which tool should you use?

  • A. Resource Monitor
  • B. Failover Cluster Manager
  • C. Server Manager
  • D. Hyper-V Manager

Answer 8. B

Do you have a large number of virtualized workloads in your cluster? Have you been looking for a solution that allows you to detect if any of the virtualized workloads in your cluster are behaving abnormally? Would you like the cluster service to take recovery actions when these workloads are in an unhealthy state? In
Windows Server 2012/2016, there is a great new feature, in Failover Clustering called “VM Monitoring”, which does exactly that – it allows you monitor the health state of applications that are running within a virtual machine and then reports that to the host level so that it can take recovery actions.
VM Monitoring can be easily configured using the Failover Cluster Manager through the following steps:
✑ Right click on the Virtual Machine role on which you want to configure monitoring
✑ Select “More Actions” and then the “Configure Monitoring” options
✑ You will then see a list of services that can be configured for monitoring using the Failover Cluster Manager.

Question 9.

Your network contains an Active Directory domain. The domain contains two Hyper-V hosts.
You plan to perform live migrations between the hosts.
You need to ensure that the live migration traffic is authenticated by using Kerberos.
What should you do first?

  • A. From Server Manager, install the Host Guardian Service server role on a domain controller.
  • B. From Active Directory Users and Computers, add the computer accounts for both servers to the Cryptographic Operators group.
  • C. From Active Directory Users and Computers, modify the Delegation properties of the computer accounts for both servers.
  • D. From Server Manager, install the Host Guardian Service server role on both servers.

Answer 9. C

If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation before you proceed to the rest of the steps.
To configure constrained delegation
✑ Open the Active Directory Users and Computers snap-in.
From the navigation pane, select the domain and double-click the Computers folder.

✑ From the Computers folder, right-click the computer account of the source server and then click Properties.
✑ In the Properties dialog box, click the Delegation tab.
✑ On the delegation tab, select Trust this computer for delegation to the specified services only. Under that option, select Use Kerberos only.

Course not found.

Question 10.

You have an Active Directory domain named Contoso.com. The domain contains servers named Server1, Server2 and Server3 that run Windows Server 2016.
Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. You add a Hyper-V Replica Broker role named Broker1 to Cluster1.
Server3 is a Hyper-V server. A virtual machine named VM1 runs on Server3.
Live Migration is enabled on all three servers and it is configured to use Kerberos authentication only.
You need to ensure that you can perform the migration of VM1 to Server2.
What should you do?

  • A. Add the Server3 computer account to the Replicator group on Server1 and Server2.
  • B. Modify the Delegation settings on the Server3 computer account.
  • C. Modify the Storage Migration settings on Server3.
  • D. Modify the Cluster permissions for Cluster1.

Answer 10. B

If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation before you proceed to the rest of the steps.
To configure constrained delegation
✑ Open the Active Directory Users and Computers snap-in. For example, to do this from Server Manager, select the server if it not already selected. After the server is selected, click Tools, and then click Active Directory Users and Computers. This opens the Active Directory Users and Computers snap-in.
✑ From the navigation pane, select the domain and double-click the Computers folder.
✑ From the Computers folder, right-click the computer account of the source server and then click Properties.
✑ In the Properties dialog box, click the Delegation tab.
✑ On the delegation tab, select Trust this computer for delegation to the specified services only. Under that option, select Use Kerberos only.
✑ Click Add.

================== Please comment if want more Q&A==============================

Agile project management Artificial Intelligence aws blockchain cloud computing coding interview coding interviews Collaboration Coursera css cybersecurity cyber threats data analysis data breaches data science data visualization devops django docker finance flask hacking html It Certification java javascript ketan kk Kubernetes machine learning machine learning engineer mongoDB Network & Security network protocol nodejs online courses online learning Operating Systems Other It & Software python Software Engineering Terraform Udemy courses VLAN web development

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.