getcertified4sure.com

Advanced Guide: 70 980 dump




Cause all that matters here is passing the Microsoft 70 980 pdf exam. Cause all that you need is a high score of 70 980 vce Recertification for MCSE: Server Infrastructure exam. The only one thing you need to do is downloading Testking 70 980 vce exam study guides now. We will not let you down with our money-back guarantee.

Q21. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three Active Directory sites. The Active Directory sites are configured as shown in the following table. 

The sites connect to each other by using the site links shown in the following table. 

Site link name Connected sites 

You need to design the Active Directory site topology to meet the following requirements: 

. Ensure that all replication traffic between Site2 and Site3 replicates through Site1 if a domain controller in Site1 is available. 

. Ensure that the domain controllers between Site2 and Site3 can replicate if all of the domain controllers in Site1 are unavailable. 

What should you do? 

A. Delete Link1. 

B. Delete Link2. 

C. Delete Link3. 

D. Disable site link bridging. 

E. Create one site link bridge. 

F. Modify the cost of Link2. 

G. Create one SMTP site link between Site2 and Site3. 

H. Create one SMTP site link between Site1 and Site3. Create one SMTP site link between Site1 and Site2. 

Answer:


Q22. DRAG DROP - (Topic 9) 

Your network contains an Active Directory forest named adatum.com. The forest contains a single domain. All servers run Windows Server 2012 R2. All client computers run Windows 

8.1. 

The DNS zone of adatum.com is Active Directory-integrated. 

You need to implement DNSSEC to meet the following requirements: 

Ensure that the zone is signed. 

Ensure that the zone signing key (ZSK) changes every 30 days. 

Ensure that the key signing key (KSK) changes every 365 days. 

What should you do? To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q23. DRAG DROP - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3 and Server4 that run Windows Server 2012. 

Server1 and Server2 are configured as file servers and are part of a failover cluster named Cluster1. Server3 and Server4 have Microsoft SQL Server 2012 installed and are part of a failover cluster named Cluster2. 

You add a disk named Disk1 to the nodes in Cluster1. Disk1 will be used to store the data files and log files used by SQL Server 2012. 

You need to configure the environment so that access to Disk1 remains available when a node on Cluster1 fails over or fails back. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q24. HOTSPOT - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. 

The domain has a certification authority (CA). You create four certificate templates. The templates are configured as shown in the following table: 

You install the Remote Access server role in the domain. 

You need to configure DirectAccess to use one-time password (OTP) authentication. 

What should you do? To answer, select the appropriate options in the answer area, 

Answer: 


Q25. - (Topic 10) 

Your network contains a Microsoft System Center 2012 infrastructure. 

You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts. 

You deploy a Windows Server Update Services (WSUS) server. 

You need to automate the remediation of non-compliant Hyper-V hosts. The solution must 

minimize the amount of time that virtual machines are unavailable. 

What should you do first? 

A. Configure the Hyper-V hosts to download Windows updates from the WSUS server by using a Group Policy object (GPO). 

B. Install the WSUS Administration console on the VMM server, and then add the WSUS server to the fabric. 

C. Install the Virtual Machine Manager console on the WSUS server, and then add the WSUS server to the fabric. 

D. Configure the Hyper-V hosts to download Windows updates from the VMM server by using a Group Policy object (GPO). 

Answer:


Q26. - (Topic 10) 

Your network contains 500 client computers that run Windows 7 and a custom application named App1. App1 uses data stored in a shared folder. 

You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2. 

Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area Network (SAN). 

You plan to move the shared folder to Cluster1. 

You need to recommend which cluster resource must be created to ensure that the shared folder can be accessed from Cluster1. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. The Generic Application cluster role 

B. The DFS Namespace Server cluster role 

C. The clustered File Server role of the File Server for general use type 

D. The clustered File Server role of the File Server for scale-out application data type 

Answer:


Q27. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment. 

The domain contains six servers. The servers are configured as shown in the following table. 

You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in 

Cluster2. 

You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster. 

You need to back up the VMM encryption key. 

What should you back up? 

A. A full system backup of Server1 

B. A full system backup of Server3 

C. A backup of the Windows\DigitalLocker folder on Server5 

D. A backup of the Windows\DigitalLocker folder on Server1 

Answer:


Q28. - (Topic 10) 

Your network contains the following: 

20 Hyper-V hosts 

100 virtual machines 

2,000 client computers 

You need to recommend an update infrastructure design to meet the following requirements: 

. Deploy updates to all of the virtual machines and the client computers from a single console. 

. Generate reports that contain a list of the applied updates. 

What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer. 

A. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Configuration Manager and a second WSUS server that is integrated with Microsoft System Center 2012 Virtual Machine Manager (VMM) 

B. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Virtual Machine Manager (VMM) 

C. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Configuration Manager, a second WSUS server integrated with Microsoft System Center 2012 Virtual Machine Manager (VMM), and a third standalone WSUS server. 

D. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Configuration Manager and Microsoft System Center 2012 Virtual Machine Manager (VMM) 

Answer: D


Q29. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains servers that run either Windows Server 2008 R2 or Windows Server 2012. 

All client computers on the internal network are joined to the domain. Some users establish VPN connections to the network by using Windows computers that do not belong to the domain. 

All client computers receive IP addresses by using DHCP. 

You need to recommend a Network Access Protection (NAP) enforcement method to meet the following requirements: 

Verify whether the client computers have up-to-date antivirus software. 

Provides a warning to users who have virus definitions that are out-of-date. 

Ensure that client computers that have out-of-date virus definitions can connect to 

the network. 

Which NAP enforcement method should you recommend? 

A. DHCP 

B. IPSec 

C. VPN 

D. 802.1x 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc733020(v=ws.10).aspx 

NAP enforcement for DHCP 

DHCP enforcement is deployed with a DHCP Network Access Protection (NAP) enforcement server component, a DHCP enforcement client component, and Network Policy Server (NPS). 

Using DHCP enforcement, DHCP servers and NPS can enforce health policy when a computer attempts to lease or renew an IP version 4 (IPv4) address. However, if client computers are configured with a static IP address or are otherwise configured to circumvent the use of DHCP, this enforcement method is not effective. 


Q30. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two 

virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: