It is impossible to pass Microsoft 70 980 pdf exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft 70 980 pdf practice questions. You will get a surprising result by our Down to date Recertification for MCSE: Server Infrastructure practice guides.
Q1. - (Topic 2)
You need to recommend a trust model.
What should you include in the recommendation?
A. A one-way, forest trust that has selective authentication.
B. A one-way, external trust
C. A two-way, external trust
D. A one-way, forest trust that has domain-wide authentication.
Answer: A
Explanation:
From case study:
Users in the Montreal office must only be allowed to access shares that are located on
File01 and File02. The Montreal users must be prevented from accessing any other servers
in the proseware.com forest regardless of the permissions on the resources.
Q2. - (Topic 1)
You need to recommend a solution for DHCP logging. The solution must meet the technical requirement.
What should you include in the recommendation?
A. Event subscriptions
B. IP Address Management (IPAM)
C. DHCP audit logging
D. DHCP filtering
Answer: B
Explanation:
D:\Documents and Settings\useralbo\Desktop\1.jpg
Feature description IPAM in Windows Server 2012 is a new built-in framework for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS). IPAM includes components for:
. Automatic IP address infrastructure discover)': IPAM discovers domain controllers, DHCP servers, and DNS servers in the domains you choose. You can enable or disable management of these servers by IPAM.
. Custom IP address space display, reporting, and management: The display of IP addresses is highly customizable and detailed tracking and utilization data is available. IPv4 and IPv6 address space is organized into IP address blocks, IP address ranges, and individual IP addresses. IP addresses are assigned built-in or user-defined fields that can be used to further organize IP address space into hierarchical, logical groups.
. Audit of server configuration changes and tracking of IP address usage: Operational events are displayed for the IPAM server and managed DHCP servers. IPAM also enables IP address tracking using DHCP lease events and user logon events collected from Network Policy Server (NPS), domain controllers, and DHCP servers. Tracking is available by IP address, client ID, host name, or user name.
. Monitoring and management of DHCP and DNS services: IPAM enables automated service availability monitoring for Microsoft DHCP and DNS servers across the forest. DNS zone health is displayed, and detailed DHCP server and scope management is available using the IPAM console. http://technet.microsoft.com/en-us/library/hh831353.aspx
Q3. - (Topic 10)
Your company has 10,000 users located in 25 different sites.
All servers run Windows Server 2012. All client computers run either Windows 7 or Windows 8.
You need to recommend a solution to provide self-service password reset for all of the users.
What should you include in the recommendation?
A. The Microsoft System Center 2012 Service Manager Self-Service Portal and Microsoft System Center 2012 Orchestrator runbooks
B. Microsoft System Center 2012 Operations Manager management packs and Microsoft System Center 2012 Configuration Manager collections
C. The Microsoft System Center 2012 Service Manager Self-Service Portal and Microsoft System Center 2012 Operation Manager management packs
D. Microsoft System Center 2012 App Controller and Microsoft System Center 2012 Orchestrator runbooks
Answer: A
Q4. - (Topic 3)
You need to recommend an IPAM management solution for the Operators groups. The solution must meet the technical requirements.
What should you include in the recommendation?
A. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. Add the computers used by the members of the Operators group to the IPAM server.
B. Modify the membership of the IPAM Administrators group and the WinRMRemoteWMIUsers_ group on the IPAM server.
C. Run the Set-IpamConfigurationcmdlet and modify the membership of the WinRMRemoteWMRJsers_ group on the IPAM server.
D. Run the Set-IpamConfigurationcmdlet on the IPAM server. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains.
Answer: B
Explanation:
D:\Documents and Settings\useralbo\Desktop\1.jpg
Q5. HOTSPOT - (Topic 7)
You need to recommend changes to allow Customer1 to delegate permissions in its hosting environment to its users.
Where should you recommend performing each task? To answer, select the appropriate location for each task in the answer area.
Answer:
Q6. - (Topic 10)
Your network contains a Microsoft System Center 2012 infrastructure.
You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts.
You deploy a Windows Server Update Services (WSUS) server.
You need to automate the remediation of non-compliant Hyper-V hosts. The solution must
minimize the amount of time that virtual machines are unavailable.
What should you do first?
A. Configure the Hyper-V hosts to download Windows updates from the WSUS server by using a Group Policy object (GPO).
B. Install the WSUS Administration console on the VMM server, and then add the WSUS server to the fabric.
C. Install the Virtual Machine Manager console on the WSUS server, and then add the WSUS server to the fabric.
D. Configure the Hyper-V hosts to download Windows updates from the VMM server by using a Group Policy object (GPO).
Answer: B
Q7. - (Topic 7)
You plan to implement a solution that meets the certificate requirements of Customer1. You need to identify which role services must be deployed to the hosting environment.
Which two role services should you identify? Each correct answer presents part of the solution.
A. Certification Authority Web Enrollment
B. Online Responder
C. Certificate Enrollment Policy Web Service
D. Certificate Enrollment Web Service
Answer: C,D
Q8. - (Topic 10)
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed.
You plan to deploy a management solution.
You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements:
. An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine.
. An administrator must be able to assign an incident to a specific administrator for resolution.
. An incident that remains unresolved for more than 10 hours must be escalated automatically to another administrator.
. Administrators must be able to generate reports that contain the details of incidents and escalations.
Which System Center 2012 roles should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Operations Manager and Orchestrator
B. Operations Manager and Service Manager
C. Configuration Manager and Service Manager
D. Service Manager and Virtual Machine Manager (VMM)
Answer: B
Q9. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The Active Directory site topology is configured as shown in the exhibit. (Click the Exhibit button.)
DC1 and DC2 run Windows Server 2003 R2. All FSMO roles are located on DC2.
You plan to deploy a read-only domain controller (RODC) to Site3.
You need to recommend changes to the network to support the planned RODC
implementation.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. To Site1, add an RODC that runs Windows Server 2012.
B. Replace DC2 with a domain controller that runs Windows Server 2012.
C. To Site2, add an RODC that runs Windows Server 2012.
D. Replace DC1 with a domain controller that runs Windows Server 2012.
Answer: D
Explanation: http://technet.microsoft.com/en-us/library/cc772065%28v=ws.10%29.aspx Each RODC requires a writable domain controller running Windows Server 2008 for the same domain from which the RODC can directly replicate. Typically, this requires that a writable domain controller running Windows Server 2008 be placed in the nearest site in the topology.
Q10. - (Topic 10)
Your network contains an Active Directory domain named contoso.com.
The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited.
You need to recommend an auditing solution to meet the security policy.
What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.)
A. From the Default Domain Controllers Policy, enable the Audit directory services setting.
B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting.
C. From the Secure OU, modify the Auditing settings.
D. From the Default Domain Controllers Policy, enable the Audit object access setting.
E. From the Secure OU, modify the Permissions settings.
F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting.
Answer: A,C
Explanation:
Creating a New Object: Resulting in multiple Event ID 5137 entries containing all attributes provided explicitly by the security principal that invoked the operation (but not those automatically generated by the system). Note that similar information also gets recorded if audit of User Account Management or Directory Service Access is enabled.
Q11. HOTSPOT - (Topic 9)
Your network contains an Active Directory forest named northwindtraders.com.
The client computers in the finance department run either Windows 8.1, Windows 8, or Windows 7. All of the client computers in the marketing department run Windows 8.1.
You need to design a Network Access Protection (NAP) solution for northwindtraders.com that meets the following requirements:
. The client computers in the finance department that run Windows 7 must have a firewall enabled and the antivirus software must be up-to-date.
. The finance computers that run Windows 8.1 or Windows 8 must have automatic updating enabled and the antivirus software must be up-to-date.
. The client computers in the marketing department must have automatic updating enabled and the antivirus software must be up-to-date.
. If a computer fails to meet its requirements, the computers must be provided access to a limited set of resources on the network.
. If a computer meets its requirements, the computer must have full access to the network.
What is the minimum number of objects that you should create to meet the requirements? To answer, select the appropriate number for each object type in the answer area.
Answer:
Q12. - (Topic 9)
Your network contains an Active Directory forest named contoso.com.
You plan to deploy 200 new physical servers during the next 12 months by using Windows Deployment Services (WDS). You identify four server builds for the 200 servers as shown in the following table.
You need to recommend the minimum number of images that must be created for the planned deployment.
How many images should you recommend?
A. 1
B. 2
C. 3
D. 4
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/hh831764.aspx
Q13. - (Topic 9)
Your company plans to hire 100 sales representatives who will work remotely.
Each sales representative will be given a laptop that will run Windows 7. A corporate image of Windows 7 will be applied to each laptop.
While the laptops are connected to the corporate network, they will be joined to the domain. The sales representatives will not be local administrators.
Once the laptops are configured, each laptop will be shipped by courier to a sales representative.
The sales representative will use a VPN connection to connect to the corporate network.
You need to recommend a solution to deploy the VPN settings for the sales representatives. The solution must meet the following requirements:
. Ensure that the VPN settings are the same for every sales representative.
. Ensure that when a user connects to the VPN, an application named App1 starts.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. VPN auto triggering
B. The Add-VpnConnectioncmdlet
C. The Connection Manager Administration Kit (CMAK)
D. Group Policy preferences
Answer: C
Q14. HOTSPOT - (Topic 10)
Your network contains five physical servers. The servers are configured as shown in the following table.
All servers run Windows Server 2012 R2.
During the setup of VMM, you configure distributed key management.
You need to ensure that the entire VMM infrastructure can be restored.
What should you include in the backup plan? To answer, select the appropriate server to
back up for each backup content type in the answer.
Answer:
Q15. HOTSPOT - (Topic 10)
Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers. The IP addresses of the web proxies at each office are configured as shown in the following table.
The connections to the web proxies are balanced by using round-robin DNS.
The company plans to deploy a new application. The new application has a farm of front-end web servers that connect to a back-end application server. When a session to a web server is established, the web server stores data until the session closes. Once the session closes, the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among the web servers. The solution must ensure that if a web server fails, the users are NOT directed to the failed server.
How should you configure the port rule? To answer, select the appropriate options in the answer area.
Answer: