Top 15 bible 70-980 for client (166 to 180)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-980-dumps.html


70-980 Product Description:
Exam Number/Code: 70-980 vce
Exam name: Recertification for MCSE: Server Infrastructure
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-980 Recertification for MCSE: Server Infrastructure

70-980 examcollection

Exam Code: 70-980 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Recertification for MCSE: Server Infrastructure
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-980 Exam.

2016 Apr 70-980 Study Guide Questions:

Q166. - (Topic 9) 

Your network contains an Active Directory forest. The forest contains a single domain. The forest has five Active Directory sites. Each site is associated to two subnets. 

You add a site named Site6 that contains two domain controllers. Site6 is associated to one subnet. 

You need to verify whether replication to the domain controllers in Site6 completes successfully. 

Which two possible commands can you use to achieve the goal? Each correct answer presents a complete solution. 

A. Get-ADReplicationSubnet 

B. Get-ADReplicationUpToDatenessVectorTable 

C. repadmin /showattr 

D. Get-ADReplicationSite1ink 

E. repadmin /showrepl 

Answer: B,E 


Q167. - (Topic 3) 

You need to recommend a Group Policy strategy to support the company's planned changes. 

What should you include in the recommendation? 

A. Link a Group Policy object (GPO) to the AllComputers OU in each domain. 

B. Link a Group Policy object (GPO) to litwareinc.com and configure filtering. 

C. Link a Group Policy object (GPO) to each domain. 

D. Link a Group Policy object (GPO) to the Boston site. 

Answer: D 

Explanation: 


D:\Documents and Settings\useralbo\Desktop\1.jpg 


Q168. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012. 

The forest contains an Active Directory domain. The domain contains a global security group named GPO_Admins that is responsible for managing Group Policies in the forest. 

A second forest named fabrikam.com contains three domains. The forest functional level is Windows Server 2003. 

You need to design a trust infrastructure to ensure that the GPO_Admins group can create, edit, and link Group Policies in every domain of the fabrikam.com forest. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. A two-way forest trust 

B. A one-way forest trust 

C. Three external trusts 

D. Three shortcut trusts 

Answer: B 


Q169. - (Topic 9) 

Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. 

You plan to implement Windows Server 2012. 

You need to create a report that includes the following information: 

. The servers that run applications and services that can be moved to Windows 

Server 2012 . The servers that have hardware that can run Windows Server 2012 . The servers that are suitable to be converted to virtual machines hosted on Hyper-

V hosts that run Windows Server 2012 

What should you do? 

A. From an existing server, run the Microsoft Application Compatibility Toolkit (ACT). 

B. Install Windows Server 2012 on a new server, and then run the Windows Server Migration Tools. 

C. Install Windows Server 2012 on a new server, and then run Microsoft Deployment Toolkit (MDT) 2012. 

D. From an existing server, run the Microsoft Assessment and Planning (MAP) Toolkit. 

Answer: D 

Explanation: 

http://technet.microsoft.com/en-us/library/bb977556.aspx The Microsoft Assessment and Planning Toolkit (MAP) is an agentless, automated, multiproduct planning and assessment tool for quicker and easier desktop, server and cloud migrations. MAP provides detailed readiness assessment reports and executive proposals with extensive hardware and software information, and actionable recommendations to help organizations accelerate their IT infrastructure planning process, and gather more detail on assets that reside within their current environment. MAP also provides server utilization data for Hyper-V server virtualization planning; identifying server placements, and performing virtualization candidate assessments, including ROI analysis for server consolidation with Hyper-V. The latest version of the MAP Toolkit adds new scenarios to help you plan your IT future while supporting your current business needs. Included scenarios help you to: Plan your deployment of Windows 8 and Windows Server 2012 with hardware and infrastructure readiness assessments Assess your environment for Office 2013 Plan your migration to Windows Azure Virtual Machines Track Lync Enterprise/Plus usage Size your desktop virtualization needs for both Virtual Desktop Infrastructure (VDI) and session based virtualization using Remote Desktop Services Ready your information platform for the cloud with SQL Server 2012 Virtualize your existing Linux servers onto Hyper-V Identify opportunities to lower your virtualization costs with Hyper-V using the VMware migration assessment MAP is just one of the tools provided by the Microsoft Solution Accelerators team. The Microsoft Assessment and Planning Toolkit, Microsoft Deployment Toolkit, and Security Compliance Manager provide tested guidance and automated tools to help organizations plan, securely deploy, and manage new Microsoft technologies—easier, faster, and at less cost. All are freely available, and fully-supported by Microsoft. 


Q170. DRAG DROP - (Topic 7) 

You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Topic 8, A.Datum Corporation 

Overview 

A. Datum Corporation is an accounting company. 

The company has a main office and two branch offices. The main office is located in Miami. 

The branch offices are located in New York and Seattle. 

Existing Environment 

Network Infrastructure 

The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2. The main office has the following servers and client computers: 

Two domain controllers configured as DNS servers and DHCP servers 

One file server that has multiples shares 

One thousand client computers that run Windows 7 

Each branch office has the following servers and client computers: 

One domain controller configured as a DNS server and a DHCP server 

Five hundred to 800 client computers that run Windows XP 

Each office has multiple subnets. The network speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a WAN link. The main office is connected to the Internet. 

Current Issues 

The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link will not be replaced for another year. 

Requirements 

Application Requirements 

The company is developing an application named App1. App1 is a multi-tier application that will be sold as a service to customers. 

Each instance of App1 is comprised of the following three tiers: 

A web front end 

A middle tier that uses Windows Communication Foundation (WCF) 

A Microsoft SQL Server 2008 R2 database on the back end 

Each tier will be hosted on one or more virtual machines. Multiple tiers cannot coexist on the same virtual machine. 

When customers purchase App1, they can select from one of the following service levels: 

Standard: Uses a single instance of each virtual machine required by App1. If a virtual machine becomes unresponsive, the virtual machine must be restarted. Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and fault tolerance. 

All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server fails. 

You plan to deploy an application named App2. App2 is comprised of the following two tiers: 

A web front end 

A dedicated SQL Server 2008 R2 database on the back end 

App2 will be hosted on a set of virtual machines in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the App2 virtual machines will be maintained in the Seattle office. 

App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory Federation Services server role and all of the Active Directory Federation Services (AD FS) role services installed. 

Planned Changes 

A. Datum plans to implement the following changes: 

Replace all of the servers with new servers that run Windows Server 2012. 

Implement a private cloud by using Microsoft System Center 2012 to host instances of App1. 

In the Miami office, deploy four new Hyper-V hosts to the perimeter network. 

In the Miami office, deploy two new Hyper-V hosts to the local network. 

In the Seattle office, deploy two new Hyper-V hosts. 

In the Miami office, implement a System Center 2012 Configuration Manager primary site that has all of the system roles installed. 

Implement a public key infrastructure (PKI). 

Notification Requirements 

A. Datum identifies the following notification requirements: 

Help desk tickets must be created and assigned automatically when an instance of App1 becomes unresponsive. Customers who select the Enterprise service level must receive an email notification each time a help desk ticket for their instance of App1 is opened or closed. 

Technical Requirements 

A. Datum identifies the following technical requirements: 

Minimize costs whenever possible. 

Minimize the amount of WAN traffic 

Minimize the amount of administrative effort whenever possible. 

Provide the fastest possible failover for the virtual machines hosting App2. 

Ensure that administrators can view a consolidated report about the software updates in all of the offices. 

Ensure that administrators in the Miami office can approve updates for the client computers in all of the offices. 

Security Requirements 

A. Datum identifies the following security requirements: 

An offline root certification authority (CA) must be configured. 

Client computers must be issued certificates by a server in their local office. 

Changes to the CA configuration settings and the CA security settings must be logged. 

Client computers must be able to renew certificates automatically over the Internet. 

The number of permissions and privileges assigned to users must be minimized whenever possible. 

. Users from a group named Group1 must be able to create new instances of App1 in the private cloud. 

. Client computers must be issued new certificates when the computers are connected to the local network only. 

. The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker). 

. Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com. 


70-980 practice

Improved 70-980 exam answers:

Q171. - (Topic 4) 

You need to recommend an Office 365 integration solution. What should you include in the recommendation? 

A. Active Directory directory synchronization 

B. The Active Directory Migration Tool (ADMT) 

C. Windows Identity Foundation (WIF) 3.5 

D. The Sync Framework Toolkit 

Answer: A 


Q172. - (Topic 8) 

You need to recommend a solution to maintain a copy of App2. The solution must meet the application requirements and must minimize additional hardware purchases. 

What should you include in the recommendation? 

A. Single-site Failover Clustering 

B. Hyper-V replicas 

C. Multi-site Failover Clustering 

D. Distributed File System (DFS) Replication 

Answer: B 


Q173. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,C 

Explanation: 

Creating a New Object: Resulting in multiple Event ID 5137 entries containing all attributes provided explicitly by the security principal that invoked the operation (but not those automatically generated by the system). Note that similar information also gets recorded if audit of User Account Management or Directory Service Access is enabled. 


Q174. DRAG DROP - (Topic 10) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012. 

Server1 has the iSCSI Target Server role service installed and is configured to have five iSCSI virtual disks. 

You install the Multipath I/O (MPIO) feature on Server2. 

From the MPIO snap-in, you add support for iSCSI devices. 

You need to ensure that Server2 can connect to the five iSCSI disks. The solution must ensure that Server2 uses MPIO to access the disks. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 


Answer: 



Q175. DRAG DROP - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts. 

You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table. 


You need to identify which network must be added to each virtual machine. 

Which network types should you identify? 

To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 


Answer: 



70-980 practice exam

Precise 70-980 preparation:

Q176. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest contains 

a single domain and two sites named Montreal and Vancouver. 

Montreal contains an IP Address Management (IPAM) server named Server1 that is used 

to manage all of the DHCP servers and the DNS servers in the site. 

Vancouver contains several DHCP servers and several DNS servers. 

In Vancouver, you install the IP Address Management (IPAM) Server feature on a server 

named Server2. 

You need to recommend which configurations must be performed to ensure that the DHCP 

servers and the DNS servers in Vancouver are managed by Server2. What should you recommend? 

A. Replicate the IPAM database from Server1 to Server2. On Server2, change the manageability status of the DNS servers and the DHCP servers in Vancouver. 

B. Replicate the IPAM database from Server1 to Server2. On Server1, change the manageability status of the DNS servers and the DHCP servers in Vancouver. 

C. From Server2, run the Invoke-IpamGpoProvisioningcmdlet On Server2, change the manageability status of the DNS servers and the DHCP servers in Vancouver. 

D. From Server1, run the Invoke-IpamGpoProvisioningcmdlet. On Server1, change the manageability status of the DNS servers and the DHCP servers in Vancouver. 

Answer: C 


Q177. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. 

You plan to deploy DirectAccess. 

The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. 

You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement. 

Solution: You enable force tunneling. Does this meet the goal? 

A. Yes 

B. No 

Answer: A 


Q178. - (Topic 9) 

Your company has a main office. 

The network contains an Active Directory domain named contoso.com. The main office contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Access server role installed and is configured to accept incoming SSTP-based VPN connections. 

All client computers run Windows 7. 

The company plans to open a temporary office that will contain a server named Server2 that runs 

Windows Server 2012 and has the DHCP Server server role installed. The office will also have 50 client computers and an Internet connection. 

You need to recommend a solution to provide the users in the temporary office with access to the resources in the main office. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Use the Connection Manager Administration Kit (CMAK) to create a connection package that specifies Server1 as the target for SSTP-based VPN connections. Manually distribute the CMAK package to each client computer in the temporary office. 

B. Install the Remote Access server role on Server2. From Routing and Remote Access on Server2, add a SSTP-based VPN port. From DHCP on Server2, configure the default gateway server option. 

C. Uses the Connection Manager Administration Kit (CMAK) to create a connection package that specifies Server1 as the target for SSTP-based VPN connections. Use a Group Policy object (GPO) to distribute the CMAK package to each client computer in the temporary office. 

D. Install the Remote Access server role on Server2. From Routing and Remote Access on Server2, configure a demand-dial interface. From DHCP on Server2, configure the default gateway server option. 

Answer: B 

Explanation: 

See link for an article on both Routing and Remote Access server role and the DHCP default gateway option. http://blogs.technet.com/b/rrasblog/archive/2009/03/25/remote-access-deployment-part-2-configuringrras-asa-vpn-server.aspx 


Q179. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. 

You plan to automate the deployment of servers that run Windows Server 2012. 

You identify the following requirements for the deployment: 

Update the custom images that will be used for the deployment. 

Add custom drivers to the images that will be used for the deployment. 

Add software packages to the images that will be used for the deployment. 

Perform a zero touch bare-metal installation that uses Wake On LAN. 

A network consultant recommends using Windows Deployment Services (WDS) and the Windows Assessment and Deployment Kit (Windows ADK) to deploy the servers. 

You need to identify which requirements are achieved by using the consultant's recommendations. 

Which requirements should you identify? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Update the custom images used for the deployment. 

B. Add software packages to the images used for the deployment. 

C. Perform a zero touch bare-metal installation that uses Wake On LAN. 

D. Add custom drivers to the images used for the deployment. 

Answer: A,D 


Q180. HOTSPOT - (Topic 9) 

Your network contains an Active Directory forest name fabrikam.com. The forest contains two domains named fabrikam.com and contoso.com. All servers run Windows Server 2012 R2. 

The forest contains a DHCP server named Server1 and a DNS server named Server2. 

You need to recommend a solution to ensure that any computers that are neither members of contoso.com nor fabrikam.com receive a DNS suffix of guest.fabrikam.com. 

What two commands should you run? To answer, select the appropriate options in the answer area. 



Answer: 




see more Recertification for MCSE: Server Infrastructure