An Expert interview about exam 70 980

Want to know Ucertify 70 980 dump Exam practice test features? Want to lear more about Microsoft Recertification for MCSE: Server Infrastructure certification experience? Study Guaranteed Microsoft 70 980 dump answers to Abreast of the times 70 980 vce questions at Ucertify. Gat a success with an absolute guarantee to pass Microsoft 70 980 dump (Recertification for MCSE: Server Infrastructure) test on your first attempt.

2017 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-980 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/70-980-dumps.html

Q61. – (Topic 9) 

Your company has a main office that contains several servers and several users. The main 

office contains a file server named Server1 that runs Windows Server 2012. 

The users access a large report file that is created on Server1 each day. 

The company plans to open a new branch office. The branch office will contain only client computers. 

You need to implement a solution to reduce the amount of bandwidth used by the client computers in the branch office to download the report each day. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Install the BranchCache for network files role service on Server1. Configure the client computers to use BranchCache in hosted cache mode. 

B. Configure the offline settings of the shared folder that contains the report. 

C. Install the BranchCache for network files role service on Server1. Configure the client computers to use Branchcache in distributed mode. 

D. Enable the Background Intelligent Transfer Service (BITS) feature on Server1 and on each client computer in the branch office. Move the report to a web folder. 

Answer:

Explanation: 

http://technet.microsoft.com/library/ee649232(WS.10).aspx Distributed cache mode. In this mode, branch office client computers download content from the content servers in the main office and then cache the content for other computers in the same branch office. Distributed cache mode does not require a server computer in the branch office. 

Q62. – (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

You plan to implement Network Load Balancing (NLB). 

You need to identify which network services and applications can be load balanced by using NLB. 

Which services and applications should you identify? 

A. Microsoft SQL Server 2012 Reporting Services 

B. A failover cluster 

C. A DHCP server 

D. A Microsoft Exchange Server 2010 Mailbox server 

E. A file server 

F. A Microsoft SharePoint Server 2010 front-end Web server 

Answer: A,F 

Q63. – (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012. 

Your company uses IP Address Management (IPAM) to manage multiple DHCP servers. A user named User1 is a member of the IPAM Users group and is a member of the local Administrators group on each DHCP server. 

When User1 edits a DHCP scope by using IPAM, the user receives the error message 

shown in the exhibit. (Click the Exhibit button.) 

You need to prevent User1 from receiving the error message when editing DHCP scopes by using IPAM. 

What should you do? 

A. Add User1 to the DHCP Administrators group on each DHCP server. 

B. Add User1 to the IPAM Administrators group. 

C. Run the Set-IpamServerConfig cmdlet. 

D. Run the Invoke-IpamGpoProvisioning cmdlet. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh831622.aspx IPAM Administrators: IPAM Administrators have the privileges to view all IPAM data and perform all IPAM tasks. 

Q64. DRAG DROP – (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3 and Server4 that run Windows Server 2012. 

Server1 and Server2 are configured as file servers and are part of a failover cluster named Cluster1. Server3 and Server4 have Microsoft SQL Server 2012 installed and are part of a failover cluster named Cluster2. 

You add a disk named Disk1 to the nodes in Cluster1. Disk1 will be used to store the data files and log files used by SQL Server 2012. 

You need to configure the environment so that access to Disk1 remains available when a node on Cluster1 fails over or fails back. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 

Q65. – (Topic 5) 

You need to recommend a solution for managing updates. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. A System Center 2012 Configuration Manager management point in the main office and a WSUS downstream server in each office 

B. A System Center 2012 Configuration Manager software update point in the main office and a System Center 2012 Configuration Manager distribution point in each office 

C. A System Center 2012 Configuration Manager management point in the main office and a System Center 2012 Configuration Manager distribution point in each office 

D. A WSUS upstream server in the main office and a WSUS downstream server in each office 

Answer:

Q66. HOTSPOT – (Topic 2) 

You need to recommend a configuration for the DHCP infrastructure. 

What should you recommend? To answer, select the appropriate options in the answer area. 

Answer: 

Q67. – (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains servers that run either Windows Server 2008 R2 or Windows Server 2012. 

All client computers on the internal network are joined to the domain. Some users establish VPN connections to the network by using Windows computers that do not belong to the domain. 

All client computers receive IP addresses by using DHCP. 

You need to recommend a Network Access Protection (NAP) enforcement method to meet the following requirements: 

Verify whether the client computers have up-to-date antivirus software. 

Provides a warning to users who have virus definitions that are out-of-date. 

Ensure that client computers that have out-of-date virus definitions can connect to 

the network. 

Which NAP enforcement method should you recommend? 

A. DHCP 

B. IPSec 

C. VPN 

D. 802.1x 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc733020(v=ws.10).aspx 

NAP enforcement for DHCP 

DHCP enforcement is deployed with a DHCP Network Access Protection (NAP) enforcement server component, a DHCP enforcement client component, and Network Policy Server (NPS). 

Using DHCP enforcement, DHCP servers and NPS can enforce health policy when a computer attempts to lease or renew an IP version 4 (IPv4) address. However, if client computers are configured with a static IP address or are otherwise configured to circumvent the use of DHCP, this enforcement method is not effective. 

Q68. – (Topic 9) 

Your company has a main office and a branch office. 

The network contains an Active Directory domain named contoso.com. The main office contains domain controllers that run Windows Server 2012. The branch office contains a read-only domain controller (RODC) that runs Windows Server 2012. 

You need to recommend a solution to control which Active Directory attributes are replicated to the RODC. 

What should you include in the recommendation? 

A. The partial attribute set 

B. The filtered attribute set 

C. Application directory partitions 

D. Constrained delegation 

Answer:

Q69. – (Topic 10) 

Your network contains an Active Directory forest named contoso.com. 

Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2. 

The certification authority (CA) infrastructure of both companies is configured as shown in the following table. 

You need to recommend a certificate solution that meets the following requirements: 

. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com. 

. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com. 

What should you include in the recommendation? 

A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

Answer:

Q70. – (Topic 5) 

You are planning the delegation for the virtualization environment. The delegation must meet the virtualization requirements. 

Which user role profile should you select for Group2? 

A. Administrators 

B. Read-Only Administrator 

C. Self-Service User 

D. Delegated Administrator 

Answer:

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.