Why should the network utilization rising above 50% be used to identify bottlenecks?
A. This indicates insufficient bandwidth for virtual machines delivered by Provisioning Services.
B. This indicates a saturated network segment.
C. This indicates an incorrectly configured router.
D. This indicates a failed network switch.
正解:B
質問 2:
How should the components be set up for this environment?
A. Configure high availability between the London and New York datacenter. Place the StoreFront servers and Delivery Controllers in the internal network.
B. Configure GSLB for NetScaler. Place the StoreFront servers and Delivery Controllers in the internal network.
C. Configure a back-up vServer at each site. Place the StoreFront servers and Delivery Controllers in the internal network.
D. Configure GSLB for the StoreFront servers and Delivery Controllers and place them in the internal network.
正解:B
質問 3:
Why does using StoreFront logs help the company comply with its security policy?
A. Because they are centralized, industry-standard logs that are easily queried
B. Because they contain detailed records of user authentication activity
C. Because they collect data from multiple devices
D. Because they use password-protection for added security
正解:B
質問 4:
How should Machine Creation Services be implemented for this environment?
A. Install a new Windows image utilizing a XenServer virtual machine and prepare a master image that includes the delivery agent. Clone the virtual machine.
B. Install a new Windows image utilizing a XenServer virtual machine and prepare a master image that includes the delivery agent. Take a snapshot of the image.
C. Install a new Windows image utilizing a XenServer virtual machine and prepare a master image that includes the delivery agent. Change the Windows and Office product key to use MAK.
D. Install a new Windows image utilizing a XenServer virtual machine and prepare a master image that includes the delivery agent. Convert the virtual machine to a template
正解:B
質問 5:
What are the benefits of using local VMs?
A. It enables remote access to desktops.
B. It allows users to install applications.
C. It supports GPUs with thin clients.
D. It enforces centralized user data storage.
正解:B
質問 6:
Why does using SmartAuditor help the company comply with its security policy?
A. Because it uses a standard TCP port
B. Because it password-protects the audit logs for added security
C. Because it collects logs from multiple devices
D. Because it is a centralized, industry-standard log that is easily queried
正解:B
質問 7:
Based on the assessment of the current company infrastructure, which design option is best for remote access?
A. Deploy three NetScaler appliances: one in each datacenter.
B. Deploy one pair of NetScaler appliances in the London failover datacenter.
C. Deploy two NetScaler appliances: one in London and one in New York.
D. Deploy six NetScaler appliances: two in New York, two in Hong Kong, and two in London.
正解:A
質問 8:
Why is this the best image management process design for this environment?
A. This design reduces the storage footprint and infrastructure server requirement.
B. This design eliminates network traffic.
C. This design provides centralized image management process.
D. This design does NOT require PXE
正解:C
Mizushima -
きっちりとまとまっていてわかりやすかったです。効率よく1Y0-400学習できそうです。