getcertified4sure.com

The Only Tip You Need: 70 980 dump




Best Quality of exam 70 980 braindumps materials and secret for Microsoft certification for IT learners, Real Success Guaranteed with Updated 70 980 pdf pdf dumps vce Materials. 100% PASS Recertification for MCSE: Server Infrastructure exam Today!

Q91. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. 

Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2. 

The certification authority (CA) infrastructure of both companies is configured as shown in the following table. 

You need to recommend a certificate solution that meets the following requirements: 

. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com. 

. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com. 

What should you include in the recommendation? 

A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

Answer:


Q92. - (Topic 9) 

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server server role installed. 

You configure Server1 as part of a Network Access Protection (NAP) solution that uses the 

802.lx enforcement method, 

You add a new switch to the network and you configure the switch to use 802.lx authentication. 

You need to ensure that only compliant client computers can access network resources through the new switch. 

What should you do on Server1? 

A. Add the IP address of each new switch to a remediation server group. 

B. Add the IP address of each new switch to the list of RADIUS clients. 

C. Add the IP address of each new switch to a connection request policy as an Access Client IPv4 Address. 

D. Add the IP address of each new switch to a remote RADIUS server group. 

Answer:


Q93. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three Active Directory sites. The Active Directory sites are configured as shown in the following table. 

The sites connect to each other by using the site links shown in the following table. 

You need to design the Active Directory site topology to meet the following requirements: 

. Ensure that all replication traffic between Site2 and Site3 replicates through Site1 if a domain controller in Site1 is available. 

. Ensure that the domain controllers between Site2 and Site3 can replicate if all of the domain controllers in Site1 are unavailable. 

What should you do? 

A. Delete Link2. 

B. Disable site link bridging. 

C. Delete Link3. 

D. Create one site link bridge. 

Answer:


Q94. - (Topic 3) 

You need to recommend a server deployment strategy for the main office that meets the server deployment requirements. 

What should you recommend installing in the main office? 

A. Windows Deployment Services (WDS) 

B. The Windows Automated Installation Kit (Windows AIK) 

C. The Express Deployment Tool (EDT) 

D. The Windows Assessment and Deployment Kit (Windows ADK) 

Answer:


Q95. - (Topic 3) 

You need to recommend a change to the Active Directory environment to support the company's planned changes. 

What should you include in the recommendation? 

A. Raise the functional level of the domain and the forest. 

B. Implement Administrator Role Separation. 

C. Upgrade the domain controllers that have the PDC emulator master role to Windows Server 2012. 

D. Upgrade the domain controller that has the domain naming master role to Windows Server 2012. 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 


Q96. - (Topic 10) 

Your Active Directory currently contains five virtualized domain controllers that run Windows Server 2012 R2. 

The system state of each domain controller is backed up daily. The backups are shipped to a remote location weekly. 

Your company recently implemented a disaster recovery site that contains several servers. The servers run Windows Server 2012 R2 and have the Hyper-V server role installed. The disaster recovery site has a high-speed WAN link to the main office. 

You need to create an Active Directory recovery plan that meets the following requirements: 

. Restores the Active Directory if a catastrophe prevents all access to the main office. 

. Minimizes data loss. 

What should you include in the plan? 

A. Hyper-V replicas 

B. Live migration 

C. Virtual machine checkpoints 

D. System state restores 

Answer:


Q97. - (Topic 9) 

Your company has a main office that contains several servers and several users. The main 

office contains a file server named Server1 that runs Windows Server 2012. 

The users access a large report file that is created on Server1 each day. 

The company plans to open a new branch office. The branch office will contain only client computers. 

You need to implement a solution to reduce the amount of bandwidth used by the client computers in the branch office to download the report each day. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Install the BranchCache for network files role service on Server1. Configure the client computers to use BranchCache in hosted cache mode. 

B. Configure the offline settings of the shared folder that contains the report. 

C. Install the BranchCache for network files role service on Server1. Configure the client computers to use Branchcache in distributed mode. 

D. Enable the Background Intelligent Transfer Service (BITS) feature on Server1 and on each client computer in the branch office. Move the report to a web folder. 

Answer:

Explanation: 

http://technet.microsoft.com/library/ee649232(WS.10).aspx Distributed cache mode. In this mode, branch office client computers download content from the content servers in the main office and then cache the content for other computers in the same branch office. Distributed cache mode does not require a server computer in the branch office. 


Q98. - (Topic 3) 

You need to recommend an IPAM management solution for the Operators groups. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. Add the computers used by the members of the Operators group to the IPAM server. 

B. Modify the membership of the IPAM Administrators group and the WinRMRemoteWMIUsers_ group on the IPAM server. 

C. Run the Set-IpamConfigurationcmdlet and modify the membership of the WinRMRemoteWMRJsers_ group on the IPAM server. 

D. Run the Set-IpamConfigurationcmdlet on the IPAM server. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 


Q99. - (Topic 1) 

You need to recommend a fault-tolerant solution for the VPN. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. Network adapter teaming 

B. Network Load Balancing (NLB) 

C. Failover Clustering 

D. DirectAccess 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg http://technet.microsoft.com/en-us/library/hh831698.aspx 


Q100. - (Topic 3) 

You need to recommend a solution that meets the security requirements. 

Which schema attribute properties should you recommend modifying? 

A. isIndexed 

B. searchFlags 

C. isCriticalSystemObject 

D. schemaFlagsEx 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema. 

. Determine and then modify the current searchFlags value of an attribute 

. Verify that an attribute is added to the RODC FAS 

-Determine and then modify the current searchFlags value of an attribute To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags: 

. To add the attribute to the RODC FAS, set the 10th bit to 0x200. 

. To mark the attribute as confidential, set the 7th bit to 0x080. http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx