Exam Code: 70-980 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Recertification for MCSE: Server Infrastructure
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-980 Exam.
Q71. HOTSPOT - (Topic 9)
You run the ldifde command and receive the following output:
The command completes successfully.
Use the drop-down menus to select the answer choice that completes each statement.
Answer:
Q72. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a second System Center 2012 infrastructure in a test environment.
You create a service template named Template1 in both System Center 2012 infrastructures.
For self-service users, you create a service offering for Template1. The users create 20 instances of Template1.
You modify Template1 in the test environment. You export the service template to a file named Template1.xml.
You need to ensure that the changes to Template1 can be applied to the existing instances in the production environment.
What should you do when you import the template?
A. Overwrite the current service template.
B. Change the name of the service template.
C. Create a new service template.
D. Change the release number of the service template.
Answer: D
Q73. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess.
The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network.
You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement.
What should you include in the recommendation?
A. Set the ISATAP State to state enabled.
B. Enable split tunneling.
C. Set the ISATAP State to state disabled.
D. Enable force tunneling.
Answer: D
Explanation:
http://blogs.technet.com/b/csstwplatform/archive/2009/12/15/directaccess-how-to-configure-forcetunneling-forda-so-that-client-are-forced-to-use-ip-https.aspx You can configure DirectAccess clients to send all of their traffic through the tunnels to the DirectAccess server with force tunneling. When force tunneling is configured, DirectAccess clients that detect that they are on the Internet modify their IPv4 default route so that default route IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the DirectAccess server.
Q74. - (Topic 10)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM).
Server1 and Server2 have identical hardware, software, and settings.
You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table.
You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20
percent.
You discover that none of the virtual machines hosted on Server2 are migrated to Server1.
You need to ensure that the virtual machines hosted on Server2 are migrated to Server1.
What should you modify from the Dynamic Optimization configuration?
A. The Host Reserve threshold
B. The Power Optimization threshold
C. The Aggressiveness level
D. The Dynamic Optimization threshold
Answer: C
Q75. - (Topic 2)
You need to recommend a solution for the remote access servers. What should you include in the recommendation?
A. Network address translation (NAT)
B. Logging levels
C. Packet filtering
D. Packet tracing
Answer: A
Q76. HOTSPOT - (Topic 2)
You need to recommend a configuration for the DHCP infrastructure.
What should you recommend? To answer, select the appropriate options in the answer area.
Answer:
Q77. - (Topic 9)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server server role installed.
You configure Server1 as part of a Network Access Protection (NAP) solution that uses the
802.lx enforcement method,
You add a new switch to the network and you configure the switch to use 802.lx authentication.
You need to ensure that only compliant client computers can access network resources through the new switch.
What should you do on Server1?
A. Add the IP address of each new switch to a remediation server group.
B. Add the IP address of each new switch to the list of RADIUS clients.
C. Add the IP address of each new switch to a connection request policy as an Access Client IPv4 Address.
D. Add the IP address of each new switch to a remote RADIUS server group.
Answer: B
Q78. - (Topic 5)
You are planning the delegation for the virtualization environment. The delegation must meet the virtualization requirements.
Which user role profile should you select for Group2?
A. Administrators
B. Read-Only Administrator
C. Self-Service User
D. Delegated Administrator
Answer: A
Q79. - (Topic 9)
Your network contains a Hyper-V host named Host1 that runs Windows Server 2012. Host1 contains a virtual machine named DC1. DC1 is a domain controller that runs Windows Server 2012.
You plan to clone DC1.
You need to recommend which steps are required to prepare DC1 to be cloned.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.)
A. Run dcpromo.exe /adv.
B. Create a file named Dccloneconfig.xml.
C. Add DC1 to the Cloneable Domain Controllers group.
D. Run sysprep.exe /oobe.
E. Run New-VirtualDiskClone.
Answer: B,C
Explanation:
http://blogs.technet.com/b/askpfeplat/archive/2012/10/01/virtual-domain-controller-cloning-in-windowsserver-2012.aspx DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. There's a new group in town. It's called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn't be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group. Make sure to remove those as well
Q80. DRAG DROP - (Topic 6)
You need to recommend a monitoring solution for Proseware.
Which three actions should you recommend performing in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer: