Free Online Latest 2014 Pass4sure&Lead2pass Citrix 1Y0-A26 Dumps (11-20)

Scenario: An administrator is unable to connect to a resource pool in a XenServer environment in which high availability is enabled. The administrator discovers that the host is unreachable. What does the administrator need to do to recover the host?

A.    Run the pool-disable command, then the host-shutdown command and then restart the host.
B.    Run the pool-disable command, then run the pool-emergency-reset-master command and restart the host.
C.    Run the emergency-ha-disable command, then once the host is restarted, run the pool-ha-enable command.
D.    Run the host-evacuate command, then restart the host and run the pool-emergency-transition-to- master command.

Answer: C

Scenario: In an environment with high availability enabled, an administrator discovered that a host is unreachable in a XenServer pool. The administrator disabled high availability in order to make the host reachable. Which xe CLI command can the administrator run to make the host reachable again?

A.    host-disable
B.    host-evacuate
C.    pool-designate-new-master
D.    pool-emergency-reset-master

Answer: D

An administrator needs to run commands to specify __________ to configure email alerts at the host level. (Choose the correct option to complete the sentence.)

A.    alarm_priority on the host
B.    alarm_priority on the virtual machine
C.    the sender email address and SMTP server
D.    the recipient email address and SMTP server

Answer: D

An administrator needs to authenticate all users when they log into the XenServer pool using their Windows credentials. What is the first step the administrator must take to achieve this?

A.    Join the XenServer pool to the domain.
B.    Add each user to the Users tab in XenCenter.
C.    Create a XenServer user group within Active Directory.
D.    Create Active Directory accounts for the XenServer users.

Answer: A

What must be true in order to integrate Active Directory authentication with a XenServer host?

A.    LDAP port 389 is open for inbound traffic to the XenServer host.
B.    The Active Directory administrator account is created locally on the XenServer host.
C.    The same DNS server is used for both the Active Directory server and the XenServer host.
D.    RAS authentication is used for communication between the Active Directory server and the XenServer host.

Answer: C

Scenario: An administrator configured XenServer Role Based Access Control (RBAC) to authenticate using Active Directory. Using RBAC, the administrator must grant Level 2 Support users with permission to start and stop virtual machines. Which two steps must the administrator take to grant Level 2 Support users virtual machine permissions? (Choose two.)

A.    Assign a role to the subject.
B.    Add an Active Directory group to the pool.
C.    Assign XenServer permissions to a group.
D.    Add users and their roles to the authorized list of users.

Answer: AB

An administrator was given new security rules and now needs to remove specific permissions from the users in the VM Admin Role Based Access Control group. How can the administrator remove the specific permissions from the VM Admin user group?

A.    Reset the VM Admin user group back to the default permissions.
B.    Delete the registry key that applies to the specific permissions that need to be removed.
C.    Run the xe subject-role-remove uuid=<subject UUID> role-name=vm.pool_migrate XenServer command.
D.    Remove the specific permissions from the Active Directory user group associated with the VM Admin user group.

Answer: C

Scenario: An administrator is planning to introduce 100 new virtual machines into the environment. The administrator plans to use XenServer templates and duplication mechanisms. What must the administrator consider when deciding between the full copy and fast clone duplication mechanisms?

A.    A template needs to be copied before it can be fast cloned.
B.    A virtual machine that is duplicated using the full copy method may impact disk performance.
C.    A virtual machine that is duplicated using the fast cloned method may impact disk performance.
D.    A template created on local storage can be duplicated by using the full copy method by any host in the pool.

Answer: C

An administrator cloned a template into a virtual machine and then converted it back into a template. Which action must be performed on the disks to restore expected levels of disk performance?

A.    Run SysPrep
B.    Complete a full copy
C.    Execute a fast clone
D.    Suspend before cloning

Answer: B

An administrator needs to export a virtual machine to an NFS share mounted on a XenServer host. Which xe CLI command does the administrator need to execute from a remote machine to perform the virtual machine export?

A.    xe vm-export -h <hostname> filename=<pathname_of_file>
B.    xe vm-export -h <hostname> -u <root> -pw <password> vm=<vm_name>
C.    xe vm-export -h <hostname> -u <root> -pw <password> filename=<pathname_of_file>
D.    xe vm-export -h <hostname> -u <root> -pw <password> vm=<vm_name> filename=<pathname_of_file>

Answer: D

If you want to pass Citrix 1Y0-A26 successfully, donot missing to read latest lead2pass Citrix 1Y0-A26 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.