Module 03 Implementing Hyper-V and Rapid Server Deployment
Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario? A. VM1's virtual hard disk files will be moved to the destination server. B. VM1's virtual machine configuration files will be moved to the destination server. C. VM1's virtual hard disk files and virtual machine configuration files will be moved to the destination server. D. VM1 will be copied to the destination server and renamed as VM2.
A. VM1's virtual hard disk files will be moved to the destination server. Analysis: a. Correct. If Andrei selects "Move the virtual machine's storage," only VM1's virtual hard disk files will be moved to the destination server. b. Incorrect. The virtual machine configuration files will not be moved with Andrei's selection. c. Incorrect. With Andrei's chosen option, the virtual machine configuration files will not be moved. d. Incorrect. No option on this pane will let Andrei copy VM1 to the destination server as VM2.
Which of the following tools can be used to create an unattended answer file? A. Windows System Image Manager B. Windows Deployment Services C. System Preparation Tool D. Hyper-V Manager
A. Windows System Image Manager Analysis: a. Correct. The Windows System Image Manager tool, which is provided as part of the Windows Assessment and Deployment Kit (ADK), can be used to create an unattended answer file. b. Incorrect. The Windows Deployment Services tool is used to configure Windows Deployment Service. c. Incorrect. The System Preparation Tool is used to remove all unique information from a Windows Server 2019 operating system installed within a virtual machine. d. Incorrect. Hyper-V Manager is a tool used to manage Hyper-V and Hyper-V virtual machines.
Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have? A. WindowsServer2019VMTemplate B. SERVERX C. Win2019VM1 D. It will not have a name.
A. WindowsServer2019VMTemplate Analysis: a. Correct. When a new virtual machine is created based on the virtual machine template, it will be given the same name as the virtual machine template within Hyper-V Manager. Catelin should select it, click Rename in the Actions pane, and supply the same name chosen within the virtual machine folder paths, Win2019VM1. b. Incorrect. The server name is not used for the newly created virtual machine. c. Incorrect. Catelin can rename the virtual machine as Win2019VM1, but this is not the name given to the newly created virtual machine. d. Incorrect. The virtual machine will be created with a default name.
Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision? A. Deion chose Generation 2 in the previous step. B. Deion intends to use this virtual machine in a nested virtualization configuration. C. Deion allocates 1024 MB of startup memory, which is sufficient to run most operating systems. D. Deion intends to run Windows Server 2019 on this virtual machine.
B. Deion intends to use this virtual machine in a nested virtualization configuration. Analysis: a. Incorrect. Deion's decision to choose Generation 2 in the previous step should not influence his decision to not enable dynamic memory in this step. b. Correct. If Deion intends to use this virtual machine in a nested virtualization configuration, the decision to not use dynamic memory is correct. Dynamic memory should not be enabled if you use nested virtualization, as memory resource utilization cannot be efficiently managed between two different Hyper-V hypervisors. c. Incorrect. 1024 MB is sufficient to run small footprint versions of Windows Server, LINUX, or UNIX. For other environments, it is advisable to use more memory or scale according to the needs of the applications and services installed. d. Incorrect. This reason neither justifies the decision to proceed without enabling dynamic memory nor makes a case against it.
Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true? A. Secure Boot is disabled by default in Generation 2 virtual machines. B. Fareeda enabled shielding in the security settings for VM1. C. Fareeda selected the option to Encrypt state and virtual machine traffic. D. BitLocker contains the encryption keys.
B. Fareeda enabled shielding in the security settings for VM1. Analysis: a. Incorrect. Secure Boot is enabled by default within Generation 2 virtual machines; however, this is unrelated to the encryption of the virtual hard disks. b. Correct. If the virtual hard disks are successfully encrypted, the most likely explanation is that Fareeda enabled shielding in the security settings for VM1. If you enable shielding, BitLocker will be used to encrypt virtual hard disks so that they cannot be used on another virtual machine, using encryption keys that are stored in the TPM. c. Incorrect. This option is unrelated to the encryption of virtual hard disks. If Fareeda selected this option, it will enable the encryption of live migration traffic. d. Incorrect. If BitLocker was used to encrypt the virtual hard disks, the encryption keys would be stored in the TPM.
Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true? A. Freya deleted the virtual disk from her system. B. Freya changed the physical disk's settings to take it offline. C. Freya removed the virtual hard drive from the virtual machine. D. Freya used the Browse option under the virtual hard drive settings.
B. Freya changed the physical disk's settings to take it offline. Analysis: a. Incorrect. Deleting the virtual disk from Freya's system is not a requirement for the physical hard disk to be used as a pass-through disk. b. Correct. To use a physical hard disk as a pass-through disk, it has to be taken offline first, and this is most likely what Freya did. c. Incorrect. Removing the virtual hard drive from Freya's system is not a requirement for the physical hard disk to be used as a pass-through disk. d. Incorrect. Choosing Browse will allow Freya to replace the current virtual hard disk file with another existing one. She cannot use this option to replace a virtual hard disk with a physical hard disk.
Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do? A. Rename the virtual machine VM1 B. Remove the computer name SERVERX C. Uninstall server roles and features D. Uninstall third-party software
B. Remove the computer name SERVERX Analysis: a. Incorrect. The System Preparation Tool will not rename the virtual machine. This tool is used to remove all unique information from the Windows Server 2019 operating system installed within the virtual machine, including the computer name, unique system identifiers within the Windows Registry, regional settings, license information, Administrator password, and so on. b. Correct. The System Preparation Tool will remove the computer name SERVERX. This tool is used to remove all unique information from the Windows Server 2019 operating system installed within the virtual machine, including the computer name, unique system identifiers within the Windows Registry, regional settings, license information, Administrator password, and so on. c. Incorrect. The System Preparation Tool will not uninstall server roles and features. This tool is used to remove all unique information from the Windows Server 2019 operating system installed within the virtual machine, including the computer name, unique system identifiers within the Windows Registry, regional settings, license information, Administrator password, and so on. d. Incorrect. The System Preparation Tool will not uninstall third-party software. This tool is used to remove all unique information from the Windows Server 2019 operating system installed within the virtual machine, including the computer name, unique system identifiers within the Windows Registry, regional settings, license information, Administrator password, and so on.
Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice? A. The generation of the virtual machine can be changed later, so this choice does not matter. B. The guest operating system on the virtual machine is a 32-bit version of Windows 7. C. The virtual machine will need to emulate a UEFI BIOS to provide faster boot time. D. The virtual machine will need to emulate a Serial Attached SCSI disk.
B. The guest operating system on the virtual machine is a 32-bit version of Windows 7. Analysis: a. Incorrect. Once the generation of the virtual machine is selected, it cannot be changed at a later stage. b. Correct. Generation 1 virtual machines support 32-bit versions of Windows 7 and later. Generation 2 virtual machines support 64-bit versions of Windows 8 and later. c. Incorrect. Generation 1 virtual machines provide legacy hardware emulation for guest operating systems. Generation 2 virtual machines provide modern hardware emulation, such as UEFI BIOS emulation. d. Incorrect. Generation 2 virtual machines can emulate a Serial Attached SCSI hard disk, whereas Generation 1 virtual machines can emulate legacy SCSI hard disks.
Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time? A. To allow Hyper-V to start the Kerberos protocol B. To allow Hyper-V to start the host operating system C. To add Hyper-V in a Type 2 configuration D. To add Hyper-V in a Type 1 configuration
B. To allow Hyper-V to start the host operating system Analysis: a. Incorrect. The second reboot does not start the Kerberos protocol. The Kerberos protocol is an authentication protocol that allows live migration within an Active Directory domain. b. Correct. Dmitry's computer reboots the second time to allow Hyper-V to start the host operating system that is used to manage virtual machines. c. Incorrect. Hyper-V is a Type-1 hypervisor and is configured as one during the first reboot. d. Incorrect. The first reboot, not the second, configures Hyper-V in a Type 1 configuration.
Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature? A. Deployment Server B. Transport Server C. Single-root I/O virtualization D. Live migration
B. Transport Server Analysis: a. Incorrect. The Deployment Server is the component of the Windows Deployment Services (WDS) role that provides the core functionality of WDS. b. Correct. The Transport Server is a role service in Windows Deployment Services that responds to PXE requests from the network and uses IP multicast to send the contents of WIM images to each computer. c. Incorrect. Single-root I/O virtualization is not a Windows Deployment Services feature. Some PCIe physical network interfaces support single-root I/O virtualization (SR-IOV), which allows the network interface to work closely with Hyper-V to separate network requests from different virtual machines to optimize performance. d. Incorrect. Live migration is not a Windows Deployment Services feature, but it is a Hyper-V feature that will allow you to move a virtual machine to another server running Hyper-V within the same Active Directory domain.
What are the two Windows Imaging Format (WIM) files used in Windows Deployment Services?
Boot.wim and Install.wim
Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored? A. C:\VMs B. E:\VMs C. E:\VMs\Virtual Machines D. E:\VMs\Config Files
C. E:\VMs\Virtual Machines Analysis: a. Incorrect. Ananya has changed the location of the drive with the letter E, so the configuration files cannot be stored on the drive with the letter C. b. Incorrect. All hard disk files for the virtual machine will be stored in E:\VMs but not the configuration files. c. Correct. When Ananya specifies D:\VMs as the location, the configuration files will be stored in the E:\VMs\Virtual Machines subdirectory. d. Incorrect. The installation wizard will not create a subdirectory called Config Files to store the virtual machine configuration files.
Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database? A. On the host server B. On VM1 C. On VM2 D. On VM3
C. On VM2 Analysis: a. Incorrect. Since the host server is running the application, that is not the best place to place the database. An N-tier security design requires that users pass through a number of systems (N) that implement security measures before gaining access to sensitive data. b. Incorrect. VM1 and the host server are connected to the same physical switch. This configuration forwards data packets without monitoring them, so VM1 is not a good choice to host the database. An N-tier security design requires that users pass through a number of systems (N) that implement security measures before gaining access to sensitive data. c. Correct. VM2 is the best choice to place the database because VM2 and the host are connected to an internal virtual switch. Any users trying to access the database in VM2 can only do so through the application running on the host. This type of data security design is called N-tier, as it requires that users pass through a number of systems (N) that implement security measures before gaining access to sensitive data. d. Incorrect. VM3 is not connected to any switch, so users will not be able to access the database. Although the most secure, this configuration does not allow access to any data. An N-tier security design requires that users pass through a number of systems (N) that implement security measures before gaining access to sensitive data.
Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario? A. The modifications within the checkpoint file will be merged into the virtual hard disk. B. Devansh can choose to reverse the Windows Registry modifications while retaining other modifications. C. The checkpoint file that is used to reverse the changes will be deleted from the system. D. The checkpoint file will replace the current virtual hard disk file.
C. The checkpoint file that is used to reverse the changes will be deleted from the system. Analysis: a. Incorrect. The modifications within the checkpoint file will be merged into the virtual hard disk only if Devansh deletes the checkpoint file. b. Incorrect. Devansh cannot choose to retain specific changes from the checkpoint file. c. Correct. When Devansh applies the checkpoint to revert the virtual system to its earlier state, the checkpoint file that is used will be deleted. d. Incorrect. When Devansh applies the checkpoint to revert the virtual system to its earlier state, the checkpoint file will not replace the current virtual hard disk file.
Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use? A. Replication B. Live migration C. Virtual machine templates D. Production checkpoints
C. Virtual machine templates Analysis: a. Incorrect. Replication is a Hyper-V feature that will allow Orana to create a copy of a virtual machine, but it will not simplify her task of creating several virtual machines. b. Incorrect. Live migration will allow Orana to move a virtual machine to another server running Hyper-V within the same Active Directory domain. This is not the feature that she needs to implement. c. Correct. Orana can use virtual machine templates to enable rapid server deployment. A virtual machine template contains a server installation that can be copied multiple times to create new virtual machines. d. Incorrect. Checkpoints (often called snapshots) is a Hyper-V feature that will allow Orana to revert the state of a virtual machine to a previous point in time. This is not the feature that Orana needs to implement.
Describe the two protocols that can be used by servers to authenticate live migration.
CSSP- Delegates credentials of user on remote server. Kerberos- Default Active Directory authentication without signing
Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use? A. Replication B. Nested virtualization C. Live migration D. Checkpoints
D. Checkpoints Analysis: a. Incorrect. Huong can use the replication feature to create a copy of the virtual machine in its current state. It will not help revert the virtual machine to its previous state. b. Incorrect. Nested virtualization enables running a virtual machine within another virtual machine. This is not the feature that Huong should use. c. Incorrect. Live migration will allow Huong to move a virtual machine from one server (the source server) to another server in the same Active Directory domain (the target server). This is not the feature that Huong should use. d. Correct. Huong should use Hyper-V's checkpoints feature. Checkpoints (often called snapshots) is a Hyper-V feature that will allow Huong to revert the state of the virtual machine to a previous point in time.
Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers. If Yihana can successfully install the operating system, which of the following tasks has she completed? A. Turned off the DHCP service B. Turned off the WDS service on the WDS server C. Pressed F1 or Esc keys D. Listed the network interface at the top of the boot order
D. Listed the network interface at the top of the boot order Analysis: a. Incorrect. DHS and DHCP must be configured properly for the WDS server to receive PXE requests. b. Incorrect. DHS and DHCP must be configured properly for the WDS server to receive PXE requests. c. Incorrect. Yihana most likely pressed F12 to begin the network service boot. d. Correct. The network interface should be listed at the top of the boot order for computers or virtual machines. Yihana most likely made this change.
What is the advantage of using production checkpoints over standard checkpoints? A. Production checkpoints are applied without shutting down the guest operating system. B. Unlike production checkpoints, standard checkpoints use a backup service provided by the guest operating system. C. Unlike standard checkpoints, production checkpoints are created automatically whenever a virtual machine starts. D. Production checkpoints cause fewer problems than standard checkpoints when applied.
D. Production checkpoints cause fewer problems than standard checkpoints when applied. Analysis: a. Incorrect. If you apply a production checkpoint, the guest operating system will shut down to perform the action. After you start the virtual machine again, you can safely delete this checkpoint if you do not plan to make other potentially problematic modifications. b. Incorrect. Production checkpoints are the ones that use the backup service provided by the guest operating system, which makes them less resource-intensive. c. Incorrect. You can enable automatic checkpoints for both types of checkpoints. When enabled, a checkpoint will be created automatically each time the virtual machine starts, replacing the previously created automatic checkpoint. d. Correct. Compared with standard checkpoints, production checkpoints cause fewer problems, as they do not save the state of running programs. Hyper-V uses production checkpoints by default.
Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete? A. She enabled replication on SERVERX. B. She enabled the Credential Security Support Provider protocol for replication on SERVERX. C. She enabled the Kerberos protocol for replication on SERVERY. D. She enabled replication on SERVERY.
D. She enabled replication on SERVERY. Analysis: a. Incorrect. Gyaltsen does not need to enable replication on SERVERX to complete this task. b. Incorrect. The Credential Security Support Provider protocol can be used during live migration and is not required for replication. c. Incorrect. Kerberos is an authentication protocol that is specified when virtual machines are moved between servers; it is not required for the completion of the replication process. d. Correct. To successfully replicate VM1 from SERVERX to SERVERY, Gyaltsen has to enable replication on SERVERY.
Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate? A. The Deployment Server service is not running. B. The Transport Server service is not running. C. The WDS role was not installed successfully. D. The WDS service is not yet configured.
D. The WDS service is not yet configured. Analysis: a. Incorrect. A warning about the Deployment Server service will not appear in this tool at this point. The Deployment Server is the component of the Windows Deployment Services (WDS) role that provides the core functionality of WDS. b. Incorrect. A warning about the Transport Server service will not appear in the tool at this point. The Transport Server is a role service in Windows Deployment Services that responds to PXE requests from the network and uses IP multicast to send the contents of WIM images to each computer. c. Incorrect. The Windows Deployment Services tool is available when the WDS role is installed. d. Correct. When the Windows Deployment Services tool is opened for the first time, a yellow warning icon can be observed on the server object in the navigation pane. This indicates that the WDS service is yet to be configured.
Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings? A. The virtual machine will be a Generation 1 virtual machine. B. The virtual machine will be named VM1. C. The virtual machine will have 4 GB of memory, which is expandable up to 36 GB. D. The virtual machine will have a 127 GB dynamically expanding hard disk.
D. The virtual machine will have a 127 GB dynamically expanding hard disk. Analysis: a. Incorrect. A Generation 2 virtual machine is created when the default settings are used. b. Incorrect. The virtual machine will be named New Virtual Machine. c. Incorrect. The virtual machine will have 1 GB of memory. d. Correct. The virtual machine will have a 127 GB dynamically expanding hard disk.
Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use? A. Replication B. Live migration C. Virtual machine templates D. Windows Deployment Services
D. Windows Deployment Services Analysis: a. Incorrect. Replication is a Hyper-V feature that will allow Achelle Electronics to create a copy of a virtual machine, but it will not simplify the task of deploying several servers. b. Incorrect. Live migration will allow Achelle Electronics to move a virtual machine to another server running Hyper-V within the same Active Directory domain, but it will not simplify the task of deploying several servers. c. Incorrect. Achelle Electronics can use virtual machine templates to enable rapid server deployment. However, this is useful only with virtual machines. d. Correct. Windows Deployment Services can be used to rapidly deploy Windows Server 2019 to physical servers that are connected to the network. With the use of rapid server deployment, Achelle Electronics can simplify the process of deploying multiple servers.
Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain. True or False
False Live Migration can only be enabled if the Hyper-V host operating system is joined to an Active Directory domain.
To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. True or False
False To replicate a virtual machine, the target Hyper-V host must have replication enabled.
You need multiple boot images on a WDS server, one for each operating system. True or False
False You only need one boot image on a WDS server, even if that server has multiple install images for different operating systems. The boot.wim from a Windows Server 2019 installation media can be used to install Windows Server 2019 and earlier server operating systems, as well as Windows 10 and earlier client operating systems.
Rajesh has configured the WDS server with the appropriate boot and install images. He configures the client computers to enable them to boot via the network interface. He is prompted to begin installation on the client computers. The boot image is downloaded from the WDS server. What are the next steps that Rajesh must perform to complete the installation process?
Install Windows Deployment Services
Why do large organizations use rapid server deployment?
It is faster and cheaper
What purpose is served by the Out-of-Box Experience (OOBE) wizard during rapid server deployment?
It lets you customize Windows 10 such as change personal and privacy settings.
Maurice is the system administrator of an IT company. The company provides virtual machines on hire to other firms. Recently, a client asked for a virtual machine that has the least downtime. Which of these Hyper-V features, replication, live migration, or checkpoints should Maurice use for this requirement?
Live Migration
What are the optional network interface components available under Hardware Acceleration or Advanced Features when modifying the network adapter settings for a virtual machine?
MAC address caching, IPSec task offload, Virtual Machine Queue
Madison is configuring Live Migration within Hyper-V Manager for a server. The bandwidth on the server's network is limited. What configuration options would you advise Madison to use?
SAB
Describe the two checkpoint mechanisms provided by Windows Server 2019.
Standard takes a ss of VM and memory state. Production are points in images that can be restored.
Describe the three virtual switches that Hyper-V uses with virtual machines.
The three switches are external, private, and internal. External connects to the physical network. Internal does not connect to the physical network. The private switch allows communication between VMs.
Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets. True or False
True Installing the Hyper-V role will install the Hyper-V hypervisor, as well as the associated Hyper-V management tools (graphical Hyper-V Manager console and Hyper-V PowerShell cmdlets) on the host operating system.
Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable? A. N-tier security B. Single-root I/O virtualization C. Hyper-V Extensible Virtual Switch protocol D. Credential Security Support Provider
b. Single-root I/O virtualization Analysis: a. Incorrect. N-tier security is not an available option when configuring virtual switches. It is a security design that requires users to pass through a number of systems (N) that implement security measures before gaining access to sensitive data. b. Correct. Minato should enable single-root I/O virtualization (SR-IOV). SR-IOV optimizes performance by allowing the network interface to work with Hyper-V to separate network requests from different virtual machines. c. Incorrect. The Hyper-V Extensible Virtual Switch is a protocol that is automatically enabled on a physical network interface when you create an external virtual switch. It allows Hyper-V the ability to share the physical network interface with multiple virtual machines simultaneously. d. Incorrect. Credential Security Support Provider (CredSSP) is an authentication protocol used in live migration. It requires that you start the live migration process while logged into the source server as a user with administrative privileges in the domain.