getcertified4sure.com

Questions Ask for exam 70 980




Examcollection 70 980 vce Questions are updated and all exam 70 980 answers are verified by experts. Once you have completely prepared with our 70 980 pdf exam prep kits you will be ready for the real 70 980 vce exam without a problem. We have Rebirth Microsoft 70 980 dump dumps study guide. PASSED exam 70 980 First attempt! Here What I Did.

Q101. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network contains two servers named Server1 and Server2. 

You deploy Active Directory Certificate Services (AD CS). The certification authority (CA) is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can issue certificates based on certificate templates. 

What should you do? 

A. On Server1, install the Network Device Enrollment Service role service. 

B. Configure Server2 as a standalone subordinate CA. 

C. On Server1, uninstall, and then reinstall AD CS. 

D. On Server1, run the Add-CertificateEnrollmentPolicyServer cmdlet. 

Answer:

Explanation: In a typical CA infrastructure the Stand-alone CAs are primarily intended to be used as Trusted Offline RootCAs in a CA hierarchy or when extranets and the Internet are involved. In a stand-alone CA Certificatetemplates are not used. An enterprise CA uses certificate types, which are based on a certificate template 


Q102. HOTSPOT - (Topic 9) 

Your network contains an Active Directory forest name fabrikam.com. The forest contains two domains named fabrikam.com and contoso.com. All servers run Windows Server 2012 R2. 

The forest contains a DHCP server named Server1 and a DNS server named Server2. 

You need to recommend a solution to ensure that any computers that are neither members of contoso.com nor fabrikam.com receive a DNS suffix of guest.fabrikam.com. 

What two commands should you run? To answer, select the appropriate options in the answer area. 

Answer: 


Q103. - (Topic 9) 

Your company has a main office. The main office is located in a building that has 10 floors. 

A datacenter on the ground floor contains a Windows Server 2012 failover cluster. The failover cluster contains a DHCP server resource named DHCP1. All client computers receive their IP addresses from DHCP1. All client computers are part of the 131.107.0.0/16 IPv4 subnet. 

You plan to implement changes to the network subnets to include a separate subnet for each floor of the office building. The subnets will connect by using routers. 

You need to recommend changes to the DHCP infrastructure to ensure that all of the client computers can receive their IP configuration by using DHCP. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Install a remote access server on each floor. Configure a DHCP relay agent on each new DHCP server. Create a scope for each subnet on DHCP1. 

B. Install a DHCP server on each floor. Create a scope for the local subnet on each new DHCP server. Enable DHCP Failover on each new DHCP server. 

C. Configure each router to forward requests for IP addresses to DHCP1. Create a scope for each subnet on DHCP1. 

D. Configure each router to forward requests for IP addresses to DHCP1. Create a scope for the 10.0.0.0/16 subnet on DHCP1. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc771390.aspx Excerpt: In TCP/IP networking, routers are used to interconnect hardware and software used on different physical network segments called subnets and forward IP packets between each of the subnets. To support and use DHCP service across multiple subnets, routers connecting each subnet should comply with DHCP/ BOOTP relay agent capabilities described in RFC 1542. 


Q104. - (Topic 3) 

You need to recommend changes to the Active Directory environment to support the virtualization requirements. 

What should you include in the recommendation? 

A. Raise the functional level of the domain and the forest. 

B. Upgrade the domain controller that has the domain naming master role to Windows Server 2012. 

C. Implement Administrator Role Separation. 

D. Upgrade the domain controllers that have the PDC emulator master role to Windows Server 2012. 

Answer:

Explanation: From case study: 

* Ensure that the additional domain controllers for the branch offices can be deployed by using domain controller cloning. 


Q105. - (Topic 2) 

You need to recommend a deployment method for Proseware. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. a WDS Deployment server and Multicast transmissions 

B. a WDS Deployment server and Unicast transmissions 

C. a WDS Transport server and Multicast transmissions 

D. a WDS Transport server and Unicast transmissions 

Answer:


Q106. - (Topic 10) 

Your company has an office in New York. 

Many users connect to the office from home by using the Internet. 

You deploy an Active Directory Certificate Services (AD CS) infrastructure that contains an enterprise certification authority (CA) named CA1. CA1 is only available from hosts on the internal network. 

You need to ensure that the certificate revocation list (CRL) is available to all of the users. 

What should you do? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Create a scheduled task that copies the CRL files to a Web server. 

B. Run the Install-ADCSWebEnrollment cmdlet. 

C. Run the Install-EnrollmentPolicyWebService cmdlet. 

D. Deploy a Web server that is accessible from the Internet and the internal network. 

E. Modify the location of the Authority Information Access (AIA). 

F. Modify the location of the CRL distribution point (CDP). 

Answer: A,D,F 

Explanation: 

CRLs will be located on Web servers which are Internet facing. 

CRLs will be accessed using the HTTP retrieval protocol. 

CRLs will be accessed using an external URL of http://dp1.pki.contoso.com/pki 

F: To successfully authenticate an Internet Protocol over Secure Hypertext Transfer Protocol (IP-HTTPS)-based connection, DirectAccess clients must be able to check for certificate revocation of the secure sockets layer (SSL) certificate submitted by the DirectAccess server. To successfully perform intranet detection, DirectAccess clients must be able to check for certificate revocation of the SSL certificate submitted by the network 

location server. This procedure describes how to do the following: 

Create a Web-based certificate revocation list (CRL) distribution point using Internet 

Information Services (IIS) 

Configure permissions on the CRL distribution shared folder 

Publish the CRL in the CRL distribution shared folder 

Reference: Configure a CRL Distribution Point for Certificates 


Q107. DRAG DROP - (Topic 10) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are members of a failover cluster. 

The network contains a Storage Area Network (SAN) that has a LUN named LUN1. LUN1 is connected to a 12-TB disk on the SAN. 

You plan to host three new virtual machines on the failover cluster. Each virtual machine will store up to 4 TB of data on a single disk. The virtual machines will be backed up from the hosts by using the Volume Shadow Copy Service (VSS). 

You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q108. - (Topic 9) 

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed. 

All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1. 

You plan to add another DHCP server named Server2 to Subnet1. 

You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Create a Network Load Balancing (NLB) cluster. 

B. Configure Failover for the scope. 

C. Create a DHCP failover cluster. 

D. Create a split scope. 

Answer:

Explanation: 

http://blogs.technet.com/b/keithmayer/archive/2012/10/28/step-by-step-scoping-out-the-new-dhcpfailover-inwindows-server-2012-31-days-of-favorite-features-part-28-of-31.aspx#.UQhW-b-jbK0 

D:\Documents and Settings\useralbo\Desktop\1.jpg 


Q109. - (Topic 10) 

Your company has a main office and a branch office. 

You plan to implement a failover cluster named Cluster1 to host an application named App1. The data of App1 will replicate to all of the nodes in Cluster1. 

Cluster1 will contain two servers. The servers will be configured as shown in the following table. 

The cluster nodes will not use shared storage. 

The branch office contains two file servers named Server3 and Server4. 

You need to ensure that App1 fails over automatically to another server if a single node in Cluster1 fails. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Add Server3 as a node in Cluster1. 

B. Add Server1, Server2, and Server3 to a Network Load Balancing (NLB) cluster. 

C. Add Server3 and Server4 to a new failover cluster named Cluster2. Install App1 on Cluster2. 

D. Add Server3 as a file share witness for Cluster1. 

Answer:


Q110. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. 

All client computers run either Windows 7 or Windows 8. 

The corporate security policy states that all of the client computers must have the latest security updates installed. You need to implement a solution to ensure that only the client computers that have all of 

the required security updates installed can connect to VLAN 1. The solution must ensure 

that all other client computers connect to VLAN 3. 

Solution: You implement the IPsec enforcement method. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: