getcertified4sure.com

Advanced Guide: 70 980 dump




It is impossible to pass Microsoft 70 980 vce exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed Microsoft 70 980 vce practice questions. You will get a surprising result by our Rebirth Recertification for MCSE: Server Infrastructure practice guides.

Q1. - (Topic 10) 

Your company has a main office and a branch office. Each office contains several hundred computers that run Windows 2012. 

You plan to deploy two Windows Server Update Services (WSUS) servers. The WSUS servers will be configured as shown in the following table. 

You need to implement the WSUS infrastructure to meet the following requirements: 

. All updates must be approved from a server in the main office. 

. All client computers must connect to a WSUS server in their local office. 

What should you do? (Each correct answer presents part of the solution. Choose all that apply. 

A. Deploy a Group Policy object (GPO) that has the update location set to Server1. 

B. On Server2, configure WSUS in Replica mode. 

C. On Server1, configure WSUS in Replica mode. 

D. On Server2, configure WSUS in Autonomous mode. 

E. Deploy a Group Policy object (GPO) that has the update location set to Server2. 

F. On Server1, configure WSUS in Autonomous mode. 

Answer: A,B,E,F 


Q2. HOTSPOT - (Topic 9) 

Your network contains an Active Directory forest named northwindtraders.com. 

The client computers in the finance department run either Windows 8.1, Windows 8, or Windows 7. All of the client computers in the marketing department run Windows 8.1. 

You need to design a Network Access Protection (NAP) solution for northwindtraders.com that meets the following requirements: 

. The client computers in the finance department that run Windows 7 must have a firewall enabled and the antivirus software must be up-to-date. 

. The finance computers that run Windows 8.1 or Windows 8 must have automatic updating enabled and the antivirus software must be up-to-date. 

. The client computers in the marketing department must have automatic updating enabled and the antivirus software must be up-to-date. 

. If a computer fails to meet its requirements, the computers must be provided access to a limited set of resources on the network. 

. If a computer meets its requirements, the computer must have full access to the network. 

What is the minimum number of objects that you should create to meet the requirements? To answer, select the appropriate number for each object type in the answer area. 

Answer: 


Q3. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

Your company has an enterprise root certification authority (CA) named CA1. 

You plan to deploy Active Directory Federation Services (AD FS) to a server named Server1. 

The company purchases a Microsoft Office 365 subscription. 

You plan to register the company's SMTP domain for Office 365 and to configure single sign-on for all users. 

You need to identify which certificate or certificates are required for the planned deployment. 

Which certificate or certificates should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com 

B. a server authentication certificate that is issued by CA1 and that contains the subject name Server1 

C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1 

D. a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com 

E. self-signed server authentication certificates for server1.contoso.com 

Answer:


Q4. DRAG DROP - (Topic 2) 

You need to recommend changes for the Active Directory infrastructure. 

What should you recommend? To answer, drag the appropriate domain and forest functional levels for proseware.com to the correct locations. Each functional level may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 

Topic 3, Litware, Inc 

Overview 

Litware, Inc., is a manufacturing company. The company has a main office and two branch offices. The main office is located in Seattle. The branch offices are located in Los Angeles and Boston. 

Existing Environment 

Active Directory 

The network contains an Active Directory forest named litwareinc.com. The forest contains a child domain for each office. The child domains are named boston.litwareinc.com and la.litwareinc.com. An Active Directory site exists for each office. 

In each domain, all of the client computer accounts reside in an organizational unit (OU) named AllComputers and all of the user accounts reside in an OU named AllUsers. 

All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. The functional level of the domain and the forest is Windows Server 2008. 

Network Infrastructure 

The main office has the following servers: 

Five physical Hyper-V hosts that run Windows Server 2012 

Three virtual file servers that run Windows Server 2008 R2 

One physical DHCP server that runs Windows Server 2008 R2 

Ten physical application servers that run Windows Server 2012 

One virtual IP Address Management (IPAM) server that runs Windows Server 2012 

One virtual Windows Server Update Services (WSUS) server that runs Windows Server 2008 R2 

One physical domain controller and two virtual domain controllers that run Windows Server 2008 R2 

Each branch office has following servers: 

One virtual file server that runs Windows Server 2008 R2 

Two physical Hyper-V hosts that run Windows Server 2012 

One physical DHCP server that runs Windows Server 2008 R2 

One physical domain controller and two virtual domain controllers that run Windows Server 2008 R2 

All of the offices have a high-speed connection to the Internet. The offices connect to each other by using T1 leased lines. 

The IPAM server in the main office gathers data from the DNS servers and the DHCP servers in all of the offices. 

Requirements Planned Changes 

The company plans to implement the following changes: 

Implement the Active Directory Recycle Bin. 

Implement Network Access Protection (NAP). 

Implement Folder Redirection in the Boston office only. 

Deploy an application named Appl to all of the users in the Boston office only. 

Migrate to IPv6 addressing on all of the servers in the Los Angeles office. Some 

application servers in the Los Angeles office will have only IPv6 addresses. 

Technical Requirements 

The company identifies the following technical requirements: 

Minimize the amount of administrative effort whenever possible. 

Ensure that NAP with IPSec enforcement can be configured. 

Rename boston.litwareinc.com domain to bos.litwareinc.com. 

Migrate the DHCP servers from the physical servers to a virtual server that runs Windows Server 2012. 

Ensure that the members of the Operators groups in all three domains can manage the IPAM server from their client computer. 

VPN Requirements 

You plan to implement a third-party VPN server in each office. The VPN servers will be configured as RADIUS clients. A server that runs Windows Server 2012 will perform RADIUS authentication for all of the VPN connections. 

Visualization Requirements 

The company identifies the following visualization requirements: 

Virtualize the application servers. 

Ensure that the additional domain controllers for the branch offices can be deployed by using domain controller cloning. 

Automatically distribute the new virtual machines to Hyper-V hosts based on the current resource usage of the Hyper-V hosts. 

Server Deployment Requirements 

The company identifies the following requirements for the deployment of new servers on the network: 

Deploy the new servers over the network. 

Ensure that all of the server deployments are done by using multicast. 

Security Requirements 

A new branch office will open in Chicago. The new branch office will have a single read-only domain controller (RODC). Confidential attributes must not be replicated to the Chicago office. 


Q5. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest contains five domains. You need to ensure that the CountryCode attribute is replicated to the global catalog. 

What should you do? 

A. Modify the schema partition. 

B. Create and modify an application partition. 

C. Modify the configuration partition. 

D. Modify the domain partitions. 

Answer:


Q6. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. Client computers run either Windows 7 or Windows 8. 

You plan to implement several Group Policy settings that will apply only to laptop 

computers. 

You need to recommend a Group Policy strategy for the planned deployment. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Loopback processing 

B. WMI filtering 

C. Security filtering 

D. Block inheritance 

Answer:

Explanation: 

http://www.discoposse.com/index.php/2012/04/05/group-policy-wmi-filter-laptop-or-desktop-hardware/ Another method to detect hardware as laptop only is to look for the presence of a battery based on the BatteryStatus property of the Win32_Battery class. By using the Win32_Battery class, we can search to see if there is a battery present. If the battery status is not equal to zero (BatteryStatus <> 0 ) then you know that it is a laptop. 


Q7. DRAG DROP - (Topic 10) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012. 

Server1 has the iSCSI Target Server role service installed and is configured to have five iSCSI virtual disks. 

You install the Multipath I/O (MPIO) feature on Server2. 

From the MPIO snap-in, you add support for iSCSI devices. 

You need to ensure that Server2 can connect to the five iSCSI disks. The solution must ensure that Server2 uses MPIO to access the disks. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q8. - (Topic 9) 

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest named contoso.com. The forest contains a Microsoft Exchange Server 2010 organization. All of the domain controllers in contoso.com run Windows Server 2012. 

The perimeter network contains an Active Directory forest named litware.com. 

You deploy Microsoft Forefront Unified Access Gateway (UAG) to litware.com. All of the domain controllers in litware.com run Windows Server 2012. 

Some users connect from outside the network to use Outlook Web App. 

You need to ensure that external users can authenticate by using client certificates. What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. To the perimeter network, add an Exchange server that has the Client Access server role installed. 

B. Deploy UAG to contoso.com. 

C. Enable Kerberos delegation in litware.com. 

D. Enable Kerberos constrained delegation in litware.com. 

Answer:


Q9. - (Topic 9) 

Your network contains an Active Directory domain. All servers run Windows Server 2012 R2. 

The domain contains the servers shown in the following table. 

You need to recommend which servers will benefit most from implementing data deduplication. 

Which servers should you recommend? 

A. Server1 and Server2 

B. Server1 and Server3 

C. Server1 and Server4 

D. Server2 and Server3 

E. Server2 and Server4 

F. Server3 and Server4 

Answer:


Q10. - (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: