70-980 forum(76 to 90) for IT candidates: Mar 2016 Edition

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-980-dumps.html


70-980 Product Description:
Exam Number/Code: 70-980 vce
Exam name: Recertification for MCSE: Server Infrastructure
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-980 Recertification for MCSE: Server Infrastructure

70-980 examcollection

Question No. 76

- (Topic 1) 

You need to recommend a fault-tolerant solution for the VPN. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. Network adapter teaming 

B. Network Load Balancing (NLB) 

C. Failover Clustering 

D. DirectAccess 

Answer:

Explanation: 


D:\Documents and Settings\useralbo\Desktop\1.jpg http://technet.microsoft.com/en-us/library/hh831698.aspx 


Question No. 77

- (Topic 2) 

You need to recommend a solution for the RODC 

Which attribute should you include in the recommendation? 

A. systemFlags 

B. searchFlags 

C. policy-Replication-Flags 

D. flags 

Answer:


Question No. 78

- (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest is managed by using Microsoft System Center 2012. 

You plan to create virtual machine templates to deploy servers by using the Virtual Machine 

Manager Self-service Portal (VMMSSP). 

To the Virtual Machine Manager (VMM) library, you add a VHD that has a generalized image of Windows Server 2012. 

You need to identify which VMM components must be associated with the image. 

Which components should you identify? (Each correct answer presents part of the solution. 

Choose all that apply.) 

A. A guest OS profile 

B. A hardware profile 

C. A capability profile 

D. A host profile 

Answer: A,B 

Explanation: 

http://technet.microsoft.com/en-us/library/jj860424.aspx Profiles VMM provides the following profiles: Hardware profile—A hardware profile defines hardware configuration settings such as 

CPU, memory, network adapters, a video adapter, a DVD drive, a floppy drive, COM ports, 

and the priority given the virtual machine when allocating resources on a virtual machine 

host. 

Guest operating system profile—A guest operating system profile defines operating system 

configured settings which will be applied to a virtual machine created from the template. It 

defines common operating system settings such as the type of operating system, the 

computer name, administrator password, domain name, product key, and time zone, 

answer file and run once file. 

NOTE: VMM also includes host profiles. Host profiles are not used for virtual machine 

creation. 

They are used during the conversion of a bare-metal computer to a Hyper-V host. 

(http://technet.microsoft.com/en-us/library/hh368987.aspx) 


Question No. 79

- (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012. 

Your company plans to deploy an application that will provide a search interface to users in the company. The application will query the global catalog for the Employee-Number attribute. 

You need to recommend a solution to ensure that the application can retrieve the Employee-Number value from the global catalog. 

What should you include in the recommendation? 

A. the Dsmod command 

B. the Ldifde command 

C. the Enable-ADOptionalFeaturecmdlet 

D. the Csvde command 

Answer:

Explanation: http://technet.microsoft.com/en-us/library/ee617209.aspx - Enable-AdOptionalFeature http://technet.microsoft.com/en-us/library/ee617218.aspx - Get-ADOptionalFeature (as of W2012R2, only OptionalFeature is ActiveDirectory Recycle Bin). 


Question No. 80

HOTSPOT - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. You plan to implement multiple DHCP servers. 

An administrator named Admin1 will authorize the DHCP servers. You need to ensure that Admin1 can authorize the planned DHCP servers. 

To which container should you assign Admin1 permissions? To answer, select the appropriate node in the answer area. 


Answer: 



Question No. 81

- (Topic 9) 

Your network contains an Active Directory domain. 

You plan to implement a remote access solution that will contain three servers that run 

Windows Server 2012. The servers will be configured as shown in the following table. 


Server1 will support up to 200 concurrent VPN connections. 

You need to ensure that all VPN connection requests are authenticated and authorized by either Server2 or Server3. The solution must ensure that the VPN connections can be authenticated if either Server2 or Server3 fails. 

What should you do? 

A. On Server1, configure a RADIUS proxy. On Server2 and Server3, add a RADIUS client. 

B. On Server2 and Server3, add a RADIUS client. On Server1, modify the Authentication settings. 

C. On Server1, configure a RADIUS proxy. Add Server2 and Server3 to a failover cluster. 

D. Add Server2 and Server3 to a Network Load Balancing (NLB) cluster. On Server1, modify the Authentication settings. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc754033.aspx 


Question No. 82

- (Topic 3) 

You need to recommend a solution that meets the security requirements. 

Which schema attribute properties should you recommend modifying? 

A. isIndexed 

B. searchFlags 

C. isCriticalSystemObject 

D. schemaFlagsEx 

Answer:

Explanation: 


D:\Documents and Settings\useralbo\Desktop\1.jpg 

Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema. 

. Determine and then modify the current searchFlags value of an attribute 

. Verify that an attribute is added to the RODC FAS 

-Determine and then modify the current searchFlags value of an attribute To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags: 

. To add the attribute to the RODC FAS, set the 10th bit to 0x200. 

. To mark the attribute as confidential, set the 7th bit to 0x080. http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx 


Question No. 83

- (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The Active Directory site topology is configured as shown in the exhibit. (Click the Exhibit button.) 


DC1 and DC2 run Windows Server 2003 R2. All FSMO roles are located on DC2. 

You plan to deploy a read-only domain controller (RODC) to Site3. 

You need to recommend changes to the network to support the planned RODC 

implementation. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. To Site1, add an RODC that runs Windows Server 2012. 

B. Replace DC2 with a domain controller that runs Windows Server 2012. 

C. To Site2, add an RODC that runs Windows Server 2012. 

D. Replace DC1 with a domain controller that runs Windows Server 2012. 

Answer:

Explanation: http://technet.microsoft.com/en-us/library/cc772065%28v=ws.10%29.aspx Each RODC requires a writable domain controller running Windows Server 2008 for the same domain from which the RODC can directly replicate. Typically, this requires that a writable domain controller running Windows Server 2008 be placed in the nearest site in the topology. 


Question No. 84

HOTSPOT - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. The forest contains two servers. 

The servers are configured as shown in the following table. 


You prepare the forest to support Workplace Join and you enable the Device Registration Service (DRS) on Server1. 

You need to ensure that Workplace Join meets the following requirements: 

. Application access must be based on device claims. . Users who attempt to join their device to the workplace through Server2 must be prevented from locking out their Active Directory account due to invalid credentials. 

Which cmdlet should you run to achieve each requirement? To answer, select the cmdlet for each requirement in the answer area. 



Answer: 



Question No. 85

DRAG DROP - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008 R2. Server1 is a file server. 

You deploy a new member server named Server2 that runs Windows Server 2012. 

You plan to migrate file shares from Server1 to Server2. File share and NTFS permissions 

are assigned only to domain local groups. 

You need to identify which actions are required to perform the migration. 

Which five actions should you identify? 

To answer, move the five appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Question No. 86

- (Topic 10) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment. 

The domain contains six servers. The servers are configured as shown in the following table. 


You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in 

Cluster2. 

You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster. 

You need to back up the VMM encryption key. 

What should you back up? 

A. A full system backup of Server1 

B. A full system backup of Server3 

C. A backup of the Windows\DigitalLocker folder on Server5 

D. A backup of the Windows\DigitalLocker folder on Server1 

Answer:


Question No. 87

- (Topic 9) 

Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. 

You plan to implement Windows Server 2012 R2. 

You need to create a report that includes the following information: 

. The servers that run applications and services that can be moved to Windows 

Server 2012 R2 

. The servers that have hardware that can run Windows Server 2012 R2 

. The servers that are suitable to be converted to virtual machines hosted on Hyper-

V hosts that run Windows Server 2012 R2 

Solution: From an existing server, you run the Microsoft Application Compatibility Toolkit (ACT). 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Question No. 88

HOTSPOT - (Topic 4) 

You are planning the certificates for Northwind Traders. 

You need to identify the certificate configurations required for App1. 

How should you configure the certificate request? To answer, select the appropriate 

options in the answer area. 



Answer: 



Question No. 89

- (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The physical 

topology of the network is configured as shown in the exhibit. 

Each office contains 500 employees. 

You plan to deploy several domain controllers to each office. 

You need to recommend a site topology for the planned deployment. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

Exhibit 


A. Five sites and one site link 

B. Three sites and three site links 

C. One site 

D. Five sites and three site links 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc960573.aspx Create a site for each LAN, or set of LANs, that are connected by a high speed backbone, and assign the site a name. Connectivity within the site must be reliable and always available. This would mean 5 sites Site links are transitive, so if site A is connected to site B, and site B is connected to site C, then the KCC assumes that domain controllers in site A can communicate with domain controllers in site C. You only need to create a site link between site A and site C if there is in fact a distinct network connection between those two sites. This would mean 3 sitelinks So answer is "Five sites and three site links" 


Question No. 90

- (Topic 3) 

You need to ensure that NAP meets the technical requirements. 

Which role services should you install? 

A. Network Policy Server, Health Registration Authority and Host Credential Authorization Protocol 

B. Health Registration Authority, Host Credential Authorization Protocol and Online Responder 

C. Certification Authority, Network Policy Server and Health Registration Authority 

D. Online Responder, Certification Authority and Network Policy Server 

Answer:

Explanation: 


D:\Documents and Settings\useralbo\Desktop\1.jpg 

Health Registration Authority Applies To: Windows Server 2008 R2, Windows Server 2012 Health Registration Authority (HRA) is a component of a Network Access Protection (NAP) infrastructure that plays a central role in NAP Internet Protocol security (IPsec) enforcement. HRA obtains health certificates on behalf of NAP clients when they are compliant with network health requirements. These health certificates authenticate NAP clients for IPsec-protected communications with other NAP clients on an intranet. If a NAP client does not have a health certificate, the IPsec peer authentication fails and the NAP client cannot initiate communication with other IPsec-protected computers on the network. HRA is installed on a computer that is also running Network Policy Server (NPS) and Internet Information Services (IIS). If they are not already installed, these services will be added when you install HRA. http://technet.microsoft.com/en-us/library/cc732365.aspx 


Topic 4, Northwind Traders (A) 

Overview 

Northwind Traders is a retail company. 

The company has offices in Montreal and San Diego. The office in Montreal has 1,000 client computers. The office in San Diego has 100 computers. The computers in the San Diego office are often replaced. The offices connect to each other by using a slow WAN link. Each office connects directly to the Internet. 

Existing Environment 

Active Directory Environment 

The network contains an Active Directory forest named northwindtraders.com. The forest contains two domains named northwindtraders.com and west.northwindtraders.com. All servers run Windows Server 2012 R2. 

All client computers run Windows 7. 

Each office is configured as an Active Directory site. The site in the Montreal office is named Site1. The site in the San Diego office is named Site2. 

The forest contains four domain controllers. The domain controllers are configured as shown in the following table. 


DC1, DC2, and DC3 are writable domain controllers. R0DC1 is read-only domain controller 

(RODC). All DNS zones are Active Directory-integrated. All zones replicate to all of the 

domain controllers. 

All of the computers in the San Diego office are configured to use RODC1 as their only 

DNS server. 

The northwindtraders.com domain contains a Group Policy object (GPO) named GPO1. 

GP01 is applied to all of the users in the Montreal office. 

All of the user accounts for the Montreal users are in the northwindtraders.com domain. All 

of the user accounts for the San Diego users are in the west.northwindtraders.com domain. 

Network Environment 

Site1 contains the member servers in the northwindtraders.com domain shown in the following table. 


Server1 connects to SAN storage that supports Offloaded Data Transfer (ODX). All virtual hard disks (VHDs) are stored on the SAN. 

A web application named App1 is installed on Servers. 

Server3 has a shared folder that contains sales reports. The sales reports are read frequently by the users in both offices. The reports are generated automatically once per week by an enterprise resource planning (ERP) system. 

A perimeter network in the Montreal office contains two standalone servers. The servers 

are configured as shown in the following table. 


The servers in the perimeter network are accessible from the Internet by using a domain name suffix of public.northwindtraders.com. 

Each administrator has a management computer that runs Windows 8.1. 

Requirements Planned Changes 

Northwind Traders plans to implement the following changes: 

On Server1, create four virtual machines that run Windows Server 2012 R2. The servers will be configured as shown in the following table. 


Configure IP routing between Site1 and the network services that Northwind 

Traders hosts in Windows Azure. 

Place a domain controller for the northwindtraders.com domain in Windows Azure. 

Upgrade all of the computers in the Montreal office to Windows 8.1. 

Purchase a subscription to Microsoft Office 365. 

Configure a web application proxy on Server6. 

Configure integration between VMM and IPAM. 

Apply GPO1 to all of the San Diego users. 

Connect Site1 to Windows Azure. 

Technical Requirements 

Northwind Traders must meet the following technical requirements: 

All virtual machines must use ODX. 

Users must be able to access App1 from the Internet. 

GPO1 must not be applied to computers that run Windows 8.1. 

All DNS zones must replicate only to DC1, DC2, and DC3. 

All computers must be able to resolve names by using a local DNS server. 

If a WAN link fails, users must be able to access all of the sales reports. 

The credentials for accessing Windows Azure must be permanently stored. 

The on-premises network must be connected to Windows Azure by using Server4. 

The administrators must be able to manage Windows Azure by using Windows PowerShell. 

The number of servers and services deployed in the San Diego office must be minimized. 

Active Directory queries for the objects in the forest must not generate WAN traffic, whenever possible. 

Security Requirements 

Northwind Traders identifies the following security requirements: 

Ensure that all DNS zone data is encrypted when it is replicated. 

Minimize the number of permissions assigned to users and administrators, whenever possible. Prevent an Active Directory Domain Services (AD DS) attribute named SSNumber from replicating to Site2. 

Ensure that users can use their northwindtraders.com user account to access the resources hosted in Office 365. 

Prevent administrators from being required to re-enter their credentials when they manage Windows Azure from approved management computers.