getcertified4sure.com

What to do with 70 980 pdf




Cause all that matters here is passing the Microsoft 70 980 vce exam. Cause all that you need is a high score of 70 980 dump Recertification for MCSE: Server Infrastructure exam. The only one thing you need to do is downloading Pass4sure 70 980 dump exam study guides now. We will not let you down with our money-back guarantee.

Q71. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either Windows Server 2012 or Windows Server 2008 R2. 

The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008. 

The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin. 

You need to recommend changes to the current environment to meet the compliance policy. 

Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Raise the forest functional level to Windows Server 2008 R2. 

B. Run the Enable-ADOptionalFeaturecmdlet. 

C. Run the New-ADObject cmdlet. 

D. Run the Set-Server cmdlet 

E. Raise the domain functional level to Windows Server 2012. 

Answer: A,B 

Explanation: You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2. 

B: Enabling Active Directory Recycle Bin After the forest functional level of your environment is set to Windows Server 2008 R2, you can enable Active Directory Recycle Bin by using the following methods: / Enable-ADOptionalFeature Active Directory module cmdlet (This is the recommended method.) / Ldp.exe 

Note: By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled. 

Reference: Enable Active Directory Recycle Bin 


Q72. - (Topic 3) 

You need to recommend a migration strategy for the DHCP servers. The strategy must 

meet the technical requirements. 

Which Windows PowerShell cmdlet should you recommend running on the physical DHCP servers? 

A. Import-SmigServerSetting 

B. Export-SmigServerSetting 

C. Receive-SmigServerData 

D. Send-SmigServerData 

Answer:


Q73. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. 

All client computers run either Windows 7 or Windows 8. 

The corporate security policy states that all of the client computers must have the latest security updates installed. 

You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3. 

Which Network Access Protection (NAP) enforcement method should you implement? 

A. VPN 

B. DHCP 

C. IPsec 

D. 802.1x 

Answer:

Explanation: 

http://blogs.technet.com/b/wincat/archive/2008/08/19/network-access-protection-using-802-1x-vlan-s-orportacls-which-is-right-for-you.aspx The most common method of the list is 802.1x for a variety of reasons. First, the industry has been selling 802.1x network authentication for the last 10 years. 1x gained tremendous popularity as wireless networking became prevalent in the late 90's and early 2000's and has been proven to be a viable solution to identifying assets and users on your network. For customers that have invested in 802.1x capable switches and access points, NAP can very easily be implemented to complement what is already in place. The Network Policy Server (NPS) role Windows Server 2008 has been dramatically improved to make 802.1x policy creation much simpler to do. 


Q74. - (Topic 5) 

You need to recommend a solution that manages the security events. The solution must meet the technical requirements. 

Which configuration should you include in the recommendation? 

A. Object access auditing by using a Group Policy object (GPO) 

B. Event rules by using System Center 2012 Operations Manager 

C. Event forwarding by using Event Viewer 

D. Audit Collection Services (ACS) by using System Center 2012 

Answer:


Q75. HOTSPOT - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest contains one domain. All domain controllers run Windows Server 2012. The functional level of the forest and the domain is Windows Server 2012. 

The domain contains three domain controllers. The domain controllers are configured as shown in the following table. 

In the forest, you plan to add a new domain controller that runs Windows Server 2012 R2. 

You need to prepare the environment before you add the new domain controller. 

Which domain controllers must be available to run each command? To answer, select the 

appropriate domain controllers in the answer area. 

Answer: 


Q76. - (Topic 3) 

You need to implement the technical requirements for the boston.litwareinc.com domain. 

Which tools should you use? 

A. Gpfixup and Gpupdate 

B. Rendom and Gpfixup 

C. Gpupdate and Dcgpofix 

D. Adprep and Rendom 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg http://technet.microsoft.com/en-us/library/cc732097(v=ws.10).aspx 


Q77. - (Topic 4) 

You need to recommend a solution for the sales reports. 

What should you include in the recommendation? 

A. BranchCache in distributed cache mode 

B. Offline files 

C. BranchCache in hosted cache mode 

D. Distributed File System (DFS) 

Answer:

Topic 5, Contoso, Ltd (B) 

Overview 

Contoso, Ltd., is a recruiting and staffing company that has offices throughout North 

America. 

The company has a main office and six branch offices. The main office is located in Miami. 

The branch offices are located in New York. Seattle, Los Angeles, Montreal, Toronto, and 

Vancouver. 

Existing Environment 

Network Infrastructure 

The network contains one Active Directory domain named contoso.com. 

The main office has the following servers: 

One file server that maintains multiples shares 

Two domain controllers configured as DNS servers 

One Windows Server Update Services (WSUS) server 

Two DHCP servers that each have a scope for all of the subnets 

Two servers that have Failover Clustering configured and are used as virtualization hosts 

One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management (CRM) database 

Each branch office has the following servers: 

One domain controller configured as a DNS server 

One DHCP server that has a single scope for its respective office 

Each office has a single subnet. The network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed connection to the Internet. The offices connect to each other by using VPN appliances. 

Current Issues 

Users report that it can take a long time to download files from network shares in the main office. 

A root cause analysis identifies that network traffic peaks when the users experience this issue. 

Requirements 

Planned Changes 

The company plans to implement the following changes: 

. Replace all of the domain controllers with new servers that run Windows Server 2012. 

. Upgrade the CRM application to use a web-based application that connects to the current CRM database. The web application will store session data in the memory of each web server. 

. Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be deployed in the future. 

. Monitor the availability of the CRM application and create alerts when the overall availability is less than 99 percent. 

. Implement Microsoft System Center 2012 to manage the new environment. 

Business Requirements 

The company identifies the following business requirements: 

. Minimize hardware costs and software costs whenever possible. 

. Minimize the amount of network traffic over the VPN whenever possible. 

. Ensure that the users in the branch offices can access files currently on the main 

office file server if an Internet link fails. 

Technical Requirements 

The company identifies the following technical requirements: 

. Provide a highly available DHCP solution. 

. Maintain a central database that contains the security events from all of the servers. The database must be encrypted. 

. Ensure that an administrator in the main office can manage the approval of Windows updates and updates to third-party applications for all of the users. 

. Ensure that all of the domain controllers have the ReliableTimeSource registry value in HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\Services\W32Time\Parameters set to 1, even if an administrator changes that value manually. 

Virtualization Requirements 

The company identifies the following virtualization requirements: 

. Minimize the number of permissions and privileges assigned to users. 

. Ensure that the members of a group named Group2 can add a WSUS server to the fabric. 

. Ensure that a diagram view of the virtualization environment can be generated dynamically. 

. Minimize the amount of administrative effort required to manage the virtualization environment. 

. Prevent the failure of a front-end web server from affecting the availability of the CRM application. 

. Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles office only. 

. Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual Machine Manager (VMM) library. 

. On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization hosts without disrupting the virtual machines hosted on the virtualization hosts. 


Q78. - (Topic 9) 

Your network contains an Active Directory domain. 

You plan to implement a remote access solution that will contain three servers that run 

Windows Server 2012. The servers will be configured as shown in the following table. 

Server1 will support up to 200 concurrent VPN connections. 

You need to ensure that all VPN connection requests are authenticated and authorized by either Server2 or Server3. The solution must ensure that the VPN connections can be authenticated if either Server2 or Server3 fails. 

What should you do? 

A. On Server1, configure a RADIUS proxy. On Server2 and Server3, add a RADIUS client. 

B. On Server2 and Server3, add a RADIUS client. On Server1, modify the Authentication settings. 

C. On Server1, configure a RADIUS proxy. Add Server2 and Server3 to a failover cluster. 

D. Add Server2 and Server3 to a Network Load Balancing (NLB) cluster. On Server1, modify the Authentication settings. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc754033.aspx 


Q79. - (Topic 9) 

You plan to deploy multiple servers in a test environment by using Windows Deployment Services (WDS). 

You need to identify which network services must be available in the test environment to deploy the servers. 

Which network services should you identify? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Active Directory Domain Services (AD DS) 

B. DNS 

C. DHCP 

D. WINS 

E. Active Directory Lightweight Directory Services (AD LDS) 

F. Network Policy Server (NPS) 

Answer: B,C 

Explanation: http://technet.microsoft.com/en-us/library/hh831764.aspx 


Q80. HOTSPOT - (Topic 2) 

You need to recommend a storage configuration for the Hyper-V hosts. 

What should you recommend? To answer, select the appropriate options in the answer area. 

Answer: