We provide real 70 980 dump exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft exam 70 980 Exam quickly & easily. The exam 70 980 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 980 dump dumps pdf and vce product and material, you can easily pass the 70 980 dump exam.
Q51. Topic 1, Contoso Ltd (A)
Overview
Contoso, Ltd., is a healthcare company in Europe that has 2,000 users. The company is migrating to Windows Server 2012.
The company has two main offices and two branch offices. The main offices are located in Paris and Amsterdam. One of the branch offices is a sales office located in Berlin. The other branch office is a research office located in Brussels.
The offices connect to each other by using a WAN link.
Current Environment
Active Directory
The network contains an Active Directory forest named contoso.com. An Active Directory site exists for each office.
The forest contains a child domain named research.contoso.com.
The functional level of both the domains is Windows Server 2008.
In each site, there are two domain controllers for the contoso.com domain and two domain controllers for the research.contoso.com domain. The domain controllers run Windows Server 2008 R2.
All of the domain controllers are global catalog servers.
The FSMO roles were not moved since the domains were deployed.
Network Infrastructure
All servers run Windows Server 2008 R2.
Each user has a laptop computer that runs Windows 7.
The company has 10 print servers. Each print server contains several shared printers.
The company has 10 file servers that have the following disk configurations:
A simple volume named C that is the System and Boot volume and is formatted NTFS A mounted virtual hard disk (VHD) named DATA that is formatted NTFS A simple volume named D that is formatted FAT32 A simple volume named E that is formatted NTFS A Clustered Shared Volume (CSV)
The Paris office contains a server named PA1. The Amsterdam office contains a server named AM1. Both servers have the following server roles installed:
DNS Server DHCP Server
Remote Access
The DNS servers are configured to use the DNS servers of the company's Internet Service Provider (ISP) as forwarders.
Users often work remotely. The users access the internal network by using an SSTP-based VPN connection.
Requirements Planned Changes
The company plans to implement the following changes:
Create a child domain named sales.contoso.com. Only the domain controllers in sales.contoso.com will host a zone for the sales.contoso.com domain. The domain controllers in sales.contoso.com will run Windows Server 2012. The client computers in sales.contoso.com will use the sales.contoso.com domain controllers as their DNS servers.
Implement two servers in the Amsterdam office and two servers in the Paris office to replace PA1 and AMI. These new servers will run Windows Server 2012 and will not have shared storage.
Decommission the research.contoso.com domain. All of the users and the Group Policy objects (GPOs) in research.contoso.com will be migrated to contoso.com.
Migrate the existing print queues to virtualized instances of Windows Server 2012.
Migrate the file servers to new servers that run Windows Server 2012.
Implement RADIUS authentication for VPN connections.
Deploy Windows Server 2012 to all new servers.
Technical Requirements
The company identifies following technical requirements:
All changes to Group Policies must be logged.
Network Access Protection (NAP) policies must be managed centrally.
Core networking services in each office must be redundant if a server fails.
The possibility of IP address conflicts during the DHCP migration must be minimized.
A central log of the IP address leases and the users associated to those leases must be created.
All of the client computers must be able to resolve internal names and internet names.
Administrators in the Paris office need to deploy a series of desktop restrictions to the entire company by using Group Policy.
The new sales.contoso.com domain will contain a web application that will access data from a Microsoft SQL Server located in the contoso.com domain. The web application must use integrated Windows authentication. Users' credentials must be passed from the web applications to the SQL Server.
After the planned upgrade to Windows Server 2012, you restore a user account from the Active Directory Recycle Bin.
You need to replicate the restored user account as quickly as possible.
Which cmdlets should you run?
A. Get-ADReplicationSite and Set-ADReplicationConnection
B. Get-ADReplicationAttributeMetadata and Compare-Object
C. Get-ADReplicationUpToDatenessVectorTable and Set-ADReplicationSite
D. Get ADDomainController and Sync-ADObject
Answer: D
Explanation:
D:\Documents and Settings\useralbo\Desktop\1.jpg
The Get-ADDomainController cmdlet gets the domain controllers specified by the parameters. You can get domain controllers by setting the Identity, Filter or Discover parameters. The Identity parameter specifies the domain controller to get. You can identify a domain controller by its GUID, IPV4Address, global IPV6Address, or DNS host name. You can also identify a domain controller by the name of the server object that represents the domain controller, the Distinguished Name (DN) of the NTDS settings object or the server object, the GUID of the NTDS settings object or the server object under the configuration partition, or the DN of the computer object that represents the domain controller. You can also set the Identity parameter to a domain controller object variable, such as $<localDomainControllerObject>, or pass a domain controller object through the pipeline to the Identity parameter. To search for and retrieve more than one domain controller, use the Filter parameter. The Filter parameter uses the PowerShell Expression Language to write query strings for Active Directory.
PowerShell Expression Language syntax provides rich type conversion support for value types received by the Filter parameter. For more information about the Filter parameter syntax, see about_ActiveDirectory_Filter. You cannot use an LDAP query string with this cmdlet. To get a domain controller by using the discover mechanism of DCLocator, use the Discover parameter. You can provide search criteria by setting parameters such as Service, SiteName, DomainName, NextClosestSite, AvoidSelf, and ForceDiscover. http://technet.microsoft.com/en-us/library/hh852293.aspx
Detailed Description The Sync-ADObject cmdlet replicates a single object between any two domain controllers that have partitions in common. The two domain controllers do not need to be direct replication partners. It can also be used to populate passwords in a read-only domain controller (RODC) cache. http://technet.microsoft.com/en-us/library/hh852296.aspx
Q52. - (Topic 9)
Your network contains multiple servers that run Windows Server 2012. All client computers run Windows 8.
You need to recommend a centralized solution to download the latest antivirus definitions for Windows Defender.
What should you include in the recommendation?
A. Microsoft System Center 2012 Endpoint Protection
B. Network Access Protection (NAP)
C. Microsoft System Center Essentials
D. Windows Server Update Services (WSUS)
Answer: D Explanation:
For those who actually doubt this Answer:
http://support.microsoft.com/kb/919772
To use WSUS to deploy Windows Defender definition updates to client computers, follow
these steps:
1. Open the WSUS Administrator console, and then click Options at the top of the console.
2. Click Synchronization Options.
3. Under Products and Classifications, click Change under Products.
4. Verify that the Windows Defender check box is selected, and then click OK.
5. Under Products and Classifications, click Change under Update Classifications.
6. Verify that the Definition Updates check box is selected, and then click OK.
7. Optional Update the automatic approval rule. To do this, follow these steps:
a. At the top of the console, click Options.
b. Click Automatic Approval Options.
c. Make sure that the Automatically approve updates for installation by using the following rule check box is selected.
d. Under Approve for Installation, click Add/Remove Classification.
e. Verify that the Definition Updates check box is selected, and then click OK.
8. At the top of the console, click Options.
9. Click Synchronization Options.
10. On the taskbar on the left, click Synchronize now.
11. At the top of the console, click Updates.
12. Approve any Windows Defender updates that WSUS should deploy.
Q53. HOTSPOT - (Topic 9)
Your network contains an Active Directory forest named contoso.com. The forest contains one domain. All domain controllers run Windows Server 2012. The functional level of the forest and the domain is Windows Server 2012.
The domain contains three domain controllers. The domain controllers are configured as shown in the following table.
In the forest, you plan to add a new domain controller that runs Windows Server 2012 R2.
You need to prepare the environment before you add the new domain controller.
Which domain controllers must be available to run each command? To answer, select the
appropriate domain controllers in the answer area.
Answer:
Q54. - (Topic 9)
Your company, which is named Contoso, Ltd., has a main office and two branch offices. The main office is located in North America. The branch offices are located in Asia and Europe.
You plan to design an Active Directory forest and domain infrastructure.
You need to recommend an Active Directory design to meet the following requirements:
. The contact information of all the users in the Europe office must not be visible to the users in the other offices.
. The administrators in each office must be able to control the user settings and the computer settings of the users in their respective office.
The solution must use the least amount of administrative effort.
What should you include in the recommendation?
A. One forest that contains three domains
B. Three forests that each contain one domain
C. Two forests that each contain one domain
D. One forest that contains one domain
Answer: D
Explanation: Answer: B http://www.informit.com/articles/article.aspx?p=32080&seqNum=5
Q55. - (Topic 3)
You need to implement the technical requirements for the boston.litwareinc.com domain.
Which tools should you use?
A. Gpfixup and Gpupdate
B. Rendom and Gpfixup
C. Gpupdate and Dcgpofix
D. Adprep and Rendom
Answer: B
Explanation:
D:\Documents and Settings\useralbo\Desktop\1.jpg http://technet.microsoft.com/en-us/library/cc732097(v=ws.10).aspx
Q56. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1.
You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings.
You need to design a Group Policy strategy to meet the following requirements:
. The security settings in GPO1 must be applied to all client computers.
. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1.
What should you include in the design?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1.
B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1.
C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1.
D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1.
Answer: D
Q57. - (Topic 9)
Your network contains a Hyper-V host named Host1 that runs Windows Server 2012. Host1 contains a virtual machine named DC1. DC1 is a domain controller that runs Windows Server 2012.
You plan to clone DC1.
You need to recommend which steps are required to prepare DC1 to be cloned.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.)
A. Run dcpromo.exe /adv.
B. Create a file named Dccloneconfig.xml.
C. Add DC1 to the Cloneable Domain Controllers group.
D. Run sysprep.exe /oobe.
E. Run New-VirtualDiskClone.
Answer: B,C
Explanation:
http://blogs.technet.com/b/askpfeplat/archive/2012/10/01/virtual-domain-controller-cloning-in-windowsserver-2012.aspx DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. There's a new group in town. It's called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn't be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group. Make sure to remove those as well
Q58. HOTSPOT - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.
Answer:
Q59. - (Topic 10)
Your network contains an Active Directory domain named contoso.com.
Your company has an enterprise root certification authority (CA) named CA1.
You plan to deploy Active Directory Federation Services (AD FS) to a server named Server1.
The company purchases a Microsoft Office 365 subscription.
You plan to register the company's SMTP domain for Office 365 and to configure single sign-on for all users.
You need to identify which certificate or certificates are required for the planned deployment.
Which certificate or certificates should you identify? (Each correct answer presents a complete solution. Choose all that apply.)
A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com
B. a server authentication certificate that is issued by CA1 and that contains the subject name Server1
C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1
D. a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com
E. self-signed server authentication certificates for server1.contoso.com
Answer: A
Q60. DRAG DROP - (Topic 7)
You need to prepare the required Hyper-V virtual network components for Customer2.
Which four objects should you create and configure in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order.
Answer: