Sie sind auf Seite 1von 6

1.

To configure an NLB cluster after installing NLB on the Windows Server 2012 R2
computer, you must configure three types of parameters. Which of the following is not
one of the three you must configure?

a. Port rules
b. Cluster parameters
c. Host parameters
d. Firewall rules

Answer: _____

2. Which PowerShell cmdlet here will correctly install NLB and the NLB management
console?

a. Install-WindowsFeature NLB,NLB-Console
b. Add-WindowsComponents NLB,NLB-Manager
c. Add-WindowsFeature NLB,RSAT-NLB
d. Add-WindowsFeature NLB, NLB-RSAT

Answer: _____

3. Which of the following is a constraint of using NLB clusters in unicast mode that you
will need to design for?

a. You will need to ensure you have at least one node in the NLB cluster
configured to handle traffic for each class C subnet in your network.
b. You will need to manually add ARP entries to the routers.
c. You will need separate cluster and management network adapters if you
manage the nodes from a different TCP/IP subnet than the cluster network.
d. You will need to configure routers to duplicate packets for delivery to all
cluster nodes.

Answer: _____

4. Which NLB control command would most likely be the best option to use to
immediately prepare a node for emergency maintenance?

a. Resume
b. Suspend
c. Stop
d. Drainstop

Answer: _____
5. Which of the following availability guidelines allows for a maximum downtime per
month of 43.8 minutes?

a. Five nines (99.999%)


b. Six nines (99.9999%)
c. Four nines (99.9%)
d. Three nines (99.9%)

Answer: _____

6. Which PowerShell cmdlet is used to add a new dedicated IP to an NLB cluster node?

a. Add-NlbClusterDip
b. Add-NlbClusterNodeIp
c. Add-NlbClusterIp
d. Add-NlbClusterNodeDip

Answer: _____

7. In which NLB cluster operation mode is the MAC address of every node’s network
adapter replaced with a single shared MAC address?

a. Unicast
b. Multicast
c. Single
d. Class C

Answer: _____

8. Which of the following technologies transparently distributes traffic across multiple


servers by using virtual IP addresses and a shared name?

a. RAID array
b. Network Load Balancing
c. Failover cluster
d. Redundant network cards

Answer: _____
9. Many components can be configured redundantly within a server system. Of the
components listed, which one is typically not available in a redundant arrangement in a
single server system?

a. Disks
b. Power supplies
c. Network cards
d. Mainboards (motherboards)

Answer: _____

10. While logged into a Windows Server 2012 R2 computer that is part of an NLB
cluster, which of the following PowerShell one-liners is the correct way to change or set
the primary IP address of the cluster?

a. Find-NlbCluster | Set-NlbCluster -ClusterVIP IPaddress


b. Get-NlbCluster | Set-NlbCluster -ClusterPrimaryIP IPaddress
c. Attach-NlbCluster | Set-NlbCluster -ClusterPrimaryIP IPaddress
d. Set-NlbCluster -ClusterPrimaryIP IPaddress

Answer: _____

11. Which cluster operation mode is designed to prevent the network switch from
flooding with traffic?

a. IGMP Multicast
b. Unicast
c. BGP Simulcast
d. Multicast

Answer: _____

12. When you configure port rules for NLB clusters, you will need to configure all of the
options listed here, except for one. Which option in this list will you not configure for a
port rule?

a. The TCP or UDP port(s) the rule should apply to


b. The protocols that this rule should apply to
c. The node IP address the rule should apply to
d. The filtering mode

Answer: _____
13. Which of the following availability guidelines allows for a maximum downtime per
month of 25.9 seconds?

a. Three nines (99.9%)


b. Six nines (99.9999%)
c. Four nines (99.99%)
d. Five nines (99.999%)

Answer: _____

14. Which of the following availability guidelines allows for a maximum downtime per
year of 52.6 minutes?

a. Six nines (99.9999%)


b. Five nines (99.999%)
c. Three nines (99.9%)
d. Four nines (99.99%)

Answer: _____

15. Why should you clearly express availability requirements?

a. To ensure RAID is used


b. To ensure there are no misunderstandings
c. To avoid dissatisfaction
d. To prevent making poor decisions

Answer: _____

16. When configuring a port rule for an NLB cluster with the “multiple host” filtering
mode selected, which of the following statements is most correct pertaining to the affinity
configuration?

a. Selecting the “Class C” option will allow all cluster nodes to respond to a
single class C network segment
b. Selecting the “Single” option will force a single cluster node to handle all client
requests from a specific client
c. Selecting the “none” option will allow all cluster nodes to respond to only the
specified client requests
d. Selecting the “none” option will allow no cluster nodes to respond to any client
requests
Answer: _____

17. Which NLB control command would be the correct one to use to gracefully prepare a
node for a planned maintenance activity?

a. Suspend
b. Drainstop
c. Resume
d. Stop

Answer: _____

18. Which PowerShell cmdlet is used to delete an NLB cluster?

a. Drop-NlbCluster
b. Remove-NlbCluster
c. Disband-NlbCluster
d. Delete-NlbCluster

Answer: _____

19. Which of the following availability guidelines allows for a maximum downtime per
year of 31.5 seconds?

a. Six nines (99.9999%)


b. Three nines (99.9%)
c. Five nines (99.999%)
d. Four nines (99.99%)

Answer: _____

20. Which of the following statements about Network Load Balancing is incorrect?

a. Network adapters in the NLB cluster can use both multicast and unicast
simultaneously.
b. All hosts in the NLB cluster receive the incoming traffic.
c. NLB detects the failure of a cluster node using a heartbeat.
d. Windows Server 2012 R2 NLB clusters can have between 2 and 32 nodes.

Answer: _____
21. From where would you add Network Load Balancing to a Windows Server 2012 R2
computer?

a. Add/Remove Programs
b. Programs and Features
c. Computer Management
d. Server Manager

Answer: _____

22. What is the function of port rules in an NLB cluster?

a. They define which ports the cluster will listen for


b. They define which ports are allowed to pass through the cluster
c. They define which ports are balanced among the hosts of the cluster
d. They define which ports the cluster will not listen for

Answer: _____

Das könnte Ihnen auch gefallen