Examcollection 70 980 pdf Questions are updated and all exam 70 980 answers are verified by experts. Once you have completely prepared with our 70 980 vce exam prep kits you will be ready for the real 70 980 dump exam without a problem. We have Updated Microsoft 70 980 vce dumps study guide. PASSED 70 980 pdf First attempt! Here What I Did.
Q91. HOTSPOT - (Topic 9)
Your network contains an Active Directory forest named northwindtraders.com.
The client computers in the finance department run either Windows 8.1, Windows 8, or Windows 7. All of the client computers in the marketing department run Windows 8.1.
You need to design a Network Access Protection (NAP) solution for northwindtraders.com that meets the following requirements:
. The client computers in the finance department that run Windows 7 must have a firewall enabled and the antivirus software must be up-to-date.
. The finance computers that run Windows 8.1 or Windows 8 must have automatic updating enabled and the antivirus software must be up-to-date.
. The client computers in the marketing department must have automatic updating enabled and the antivirus software must be up-to-date.
. If a computer fails to meet its requirements, the computers must be provided access to a limited set of resources on the network.
. If a computer meets its requirements, the computer must have full access to the network.
What is the minimum number of objects that you should create to meet the requirements? To answer, select the appropriate number for each object type in the answer area.
Answer:
Q92. DRAG DROP - (Topic 10)
Your network contains servers that run Windows Server 2012. The network contains two servers named Server1 and Server2 that are connected to a SAS storage device. The device only supports two connected computers.
Server1 has the iSCSI Target Server role service installed. Ten application servers use their iSCSI Initiator to connect to virtual disks in the SAS storage device via iSCSI targets on Server1.
Currently, Server2 is used only to run backup software.
You install the iSCSI Target Server role service on Server2.
You need to ensure that the iSCSI targets are available if Server1 fails.
Which five actions should you perform?
To answer, move the five appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
Q93. HOTSPOT - (Topic 10)
You plan to implement a virtualization solution to host 10 virtual machines. All of the virtual
machines will be hosted on servers that run Windows Server 2012.
You need to identify which servers must be deployed for the planned virtualization solution. The solution must meet the following requirements:
.Minimize the number of servers.
.Ensure that live migration can be used between the hosts.
Which servers should you identify?
To answer, select the appropriate servers in the answer area.
Answer:
Q94. - (Topic 10)
Your company has a human resources department a finance department, a sales department and an R&D department.
The company audits the access of documents that contain department-specific sensitive information.
You are planning an administrative model for the departments to meet the following requirements:
. Provide R&D managers with the ability to back up all the files of their department only.
. Provide finance managers with the ability to view the audit logs for the files of their department only.
. Provide human resources managers with the ability to view the audit logs for the files of their department only.
. Provide sales managers with the ability to modify the permissions on all the shared folders of their department only.
You need to identify the minimum amount of file servers required on the network to meet the requirements of each department.
How many file servers should you identify?
A. 1
B. 2
C. 3
D. 4
Answer: C
Q95. - (Topic 8)
You need to recommend a solution to maintain a copy of App2. The solution must meet the application requirements and must minimize additional hardware purchases.
What should you include in the recommendation?
A. Single-site Failover Clustering
B. Hyper-V replicas
C. Multi-site Failover Clustering
D. Distributed File System (DFS) Replication
Answer: B
Q96. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2008 R2. All domain controllers are installed on physical servers. The network contains several Hyper-V hosts.
The network contains a Microsoft System Center 2012 infrastructure.
You plan to use domain controller cloning to deploy several domain controllers that will run Windows Server 2012.
You need to recommend which changes must be made to the network infrastructure before you can use domain controller cloning.
What should you recommend?
A. Upgrade a global catalog server to Windows Server 2012. Deploy Virtual Machine Manager (VMM).
B. Upgrade a global catalog server to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012.
C. Upgrade the domain controller that has the PDC emulator operations master role to Windows Server 2012. Deploy a Hyper-V host that runs Windows Server 2012.
D. Upgrade the domain controller that has the infrastructure master operations master role to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012.
Answer: C
Q97. - (Topic 10)
Your network contains an Active Directory forest named contoso.com.
Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2.
The certification authority (CA) infrastructure of both companies is configured as shown in the following table.
You need to recommend a certificate solution that meets the following requirements:
. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com.
. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com.
What should you include in the recommendation?
A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.
B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.
C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.
D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.
Answer: B
Q98. HOTSPOT - (Topic 2)
You need to recommend a storage configuration for the Hyper-V hosts.
What should you recommend? To answer, select the appropriate options in the answer area.
Answer:
Q99. - (Topic 9)
Your network contains an Active Directory domain named contoso.com.
All client computers run either Windows 7 or Windows 8.
Some users work from customer locations, hotels, and remote sites. The remote sites often
have firewalls that limit connectivity to the Internet.
You need to recommend a VPN solution for the users.
Which protocol should you include in the recommendation?
A. PPTP
B. SSTP
C. IKEv2
D. L2TP/IPSec
Answer: B
Q100. - (Topic 10)
Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM) server named Server1.
You use Server1 to manage 20 Hyper-V hosts.
The network also contains five Citrix XenServer virtualization hosts.
You need to recommend which installation is required to manage the XenServer servers from Server1.
What should you recommend installing?
A. The Citrix XenServer - Microsoft System Center Integration Pack on the Citrix XenServer hosts
B. The Citrix XenServer - Microsoft System Center Integration Pack on Server1
C. Citrix Essentials for Hyper-V on Server1
D. Citrix Essentials for Hyper-V on the Citrix XenServer hosts
Answer: A