Foolproof 70 980 vce tips

Want to know Actualtests 70 980 pdf Exam practice test features? Want to lear more about Microsoft Recertification for MCSE: Server Infrastructure certification experience? Study Highest Quality Microsoft 70 980 dump answers to Replace 70 980 pdf questions at Actualtests. Gat a success with an absolute guarantee to pass Microsoft 70 980 pdf (Recertification for MCSE: Server Infrastructure) test on your first attempt.

2017 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-980 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/70-980-dumps.html

Q131. – (Topic 1) 

You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation? 

A. Microsoft Baseline Security Analyzer (MBSA) 

B. Microsoft Desktop Optimization Pack (MDOP) 

C. Microsoft System Center 2012 Operations Manager 

D. Microsoft System Center 2012 Data Protection Manager (DPM) 

Answer:

Explanation: 

D:\\Documents and Settings\\useralbo\\Desktop\\1.jpg 

Microsoft Desktop Optimization Pack Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution. What is the Microsoft Desktop Optimization Pack? The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services. MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies— available only to Windows Software Assurance customers. http://technet.microsoft.com/en-us/library/cc507880.aspx 

Q132. – (Topic 5) 

You are planning the deployment of System Center 2012 Virtual Machine Manager (VMM). 

You need to identify which additional System Center 2012 product is required to meet the virtualization requirements. 

What should you include in the recommendation? 

A. App Controller 

B. Operations Manager 

C. Configuration Manager 

D. Service Manager 

Answer:

Topic 6, Proseware Inc (B) 

General Overview 

Proseware Inc., is a manufacturing company that has 4,000 employees. 

Proseware works with a trading partner named Fabrikam, Inc. 

Physical Locations 

Proseware has a main office and two branch offices. The main office is located in London. The branch offices are located in Madrid and Berlin. Proseware has a sales department based in the London office and a research department based in the Berlin office. The offices connect to each other by using a WAN link. Each office connects directly to the Internet. 

Proseware rents space at a hosting company. All offices have a dedicated WAN link to the hosting company. Web servers that are accessible from the Internet are located at the hosting company. 

Active Directory 

The Proseware network contains an Active Directory forest named proseware.com. The forest contains a single domain. The forest functional level is Windows Server 2012. 

Each office contains three domain controllers. An Active Directory site is configured for each office. 

System state backups are performed every day on the domain controllers by using System Center 2012 R2 Data Protection Manager (DPM). 

Virtualization 

Proseware has Hyper-V hosts that run Windows Server 2012 R2. Each Hyper-V host manages eight to ten virtual machines. The Hyper-V hosts are configured as shown in the following table. 

All of the Hyper-V hosts store virtual machines on direct-attached storage (DAS). 

Servers 

All servers run Windows Server 2012 R2. All of the servers are virtualized, except for the Hyper-V hosts. 

VDI1 and VDI2 use locally attached storage to host virtual hard disk (VHD) files. The VHDs use the .vhd format. 

A line-of-business application named SalesApp is used by the sales department and runs on a server named APP1. APP1 is hosted on HyperV2. 

A server named CA1 has the Active Directory Certificate Services server role installed and is configured as an enterprise root certification authority (CA) named ProsewareCA. 

Ten load-balanced web servers hosted on HyperV7 and HyperV8 run the Internet-facing web site that takes orders from Internet customers. 

System Center 2012 R2 Operations Manager is used to monitor the health of the servers on the network. 

All of the servers are members of the proseware.com domain, except for the servers located in the perimeter network. 

Client Computers 

All client computers run either Windows 8.1 or Windows 7. Some of the users in the London office connect to pooled virtual desktops hosted on VDI1 and VDI2. 

Problem Statements 

Proseware identifies the following issues on the network: 

Virtualization administrators report that the load on the Hyper-V hosts is inconsistent. The virtualization administrators also report that administrators fail to account for host utilization when creating new virtual machines. 

Users in the sales department report that they experience issues when they attempt to access SalesApp from any other network than the one in the London office. 

Sometimes, configuration changes are not duplicated properly across the web servers, resulting in customer ordering issues. Web servers are regularly changed. 

Demand for virtual desktops is increasing. Administrators report that storage space is becoming an issue as they want to add more virtual machines. 

In the past, some personally identifiable information (PII) was exposed when paper shredding procedures were not followed. 

Requirements 

Planned Changes 

Proseware plans to implement the following changes on the network: Implement a backup solution for Active Directory. Relocate the sales department to the Madrid office. Implement System Center 2012 R2 components, as required. Protect email attachments sent to Fabrikam that contain PII data so that the attachments cannot be printed. Implement System Center 2012 R2 Virtual Machine Manager (VMM) to manage the virtual machine infrastructure. Proseware does not plan to use private clouds in the near future. Deploy a new Hyper-V host named RESEARCH1 to the Berlin office. RESEARCH1 will be financed by the research department. All of the virtual machines deployed to RESEARCH1 will use VMM templates. 

Technical Requirements 

Proseware identifies the following virtualization requirements: 

. The increased demand for virtual desktops must be met. 

. Once System Center is deployed, all of the Hyper-V hosts must be managed by using VMM. 

. If any of the Hyper-V hosts exceeds a set number of virtual machines, an administrator must be notified by email. 

. Network administrators in each location must be responsible for managing the Hyper-V hosts in their respective location. The management of the hosts must be performed by using VMM. 

. The network technicians in each office must be able to create virtual machines in their respective office. The network technicians must be prevented from modifying the host server settings. 

. New virtual machines must be deployed to RESEARCH1 only if the virtual machine template used to create the machine has a value specified for a custom property named CostCenter' that matches Research'. 

The web site configurations must be identical on all web servers. 

Security Requirements 

Proseware identifies the following security requirements: 

. All email messages sent to and from Fabrikam must be encrypted by using digital certificates issued to users by the respective CA of their company. No other certificates must be trusted between the organizations. 

. Microsoft Word documents attached to email messages sent from Proseware to Fabrikam must be protected. 

. Privileges must be minimized, whenever possible. 

Q133. HOTSPOT – (Topic 10) 

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. The forest contains two servers. 

The servers are configured as shown in the following table. 

You prepare the forest to support Workplace Join and you enable the Device Registration Service (DRS) on Server1. 

You need to ensure that Workplace Join meets the following requirements: 

. Application access must be based on device claims. . Users who attempt to join their device to the workplace through Server2 must be prevented from locking out their Active Directory account due to invalid credentials. 

Which cmdlet should you run to achieve each requirement? To answer, select the cmdlet for each requirement in the answer area. 

Answer: 

Q134. – (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. 

The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. 

You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement. 

What should you include in the recommendation? 

A. Set the ISATAP State to state enabled. 

B. Enable split tunneling. 

C. Set the ISATAP State to state disabled. 

D. Enable force tunneling. 

Answer:

Explanation: 

http://blogs.technet.com/b/csstwplatform/archive/2009/12/15/directaccess-how-to-configure-forcetunneling-forda-so-that-client-are-forced-to-use-ip-https.aspx You can configure DirectAccess clients to send all of their traffic through the tunnels to the DirectAccess server with force tunneling. When force tunneling is configured, DirectAccess clients that detect that they are on the Internet modify their IPv4 default route so that default route IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the DirectAccess server. 

Q135. – (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings. 

You need to design a Group Policy strategy to meet the following requirements: 

. The security settings in GPO1 must be applied to all client computers. 

. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1. 

B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1. 

C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1. 

D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1. 

Answer:

Q136. DRAG DROP – (Topic 10) 

You have a failover cluster named Cluster1 that contains four Hyper-V hosts. Cluster1 hosts 20 virtual machines. 

You deploy a new failover cluster named Cluster2. 

You plan to replicate the virtual machines from Cluster1 to Cluster2. 

You need to recommend which actions must be performed on Cluster2 for the planned deployment. 

Which three actions should you recommend? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 

Q137. DRAG DROP – (Topic 7) 

You need to prepare the required Hyper-V virtual network components for Customer2. 

Which four objects should you create and configure in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order. 

Answer: 

Q138. – (Topic 9) 

Your company has two main offices and 10 branch offices. Each office is configured as a separate Active Directory site. 

The main offices sites are named Site1 and Site2. Each office connects to Site1 and Site2 by using a WAN link. Each site contains a domain controller that runs Windows Server 2008. 

You are redesigning the Active Directory infrastructure. 

You plan to implement domain controllers that run Windows Server 2012 and decommission all of the domain controllers that run Windows Server 2008. 

You need to recommend a placement plan for the Windows Server 2012 domain controllers to meet the following requirements: 

. Ensure that users can log on to the domain if a domain controller or a WAN link fails. . Minimize the number of domain controllers implemented. 

What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Read-only domain controllers (RODCs) in the branch office sites 

B. A writable domain controller in Site1 

C. A writable domain controller in Site2 

D. Writable domain controllers in the branch office sites 

Answer: B,C,D 

Q139. – (Topic 10) 

Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed. 

You plan to deploy a management solution. 

You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements: 

. An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine. 

. An administrator must be able to assign an incident to a specific administrator for resolution. 

. An incident that remains unresolved for more than 10 hours must be escalated automatically to another administrator. 

. Administrators must be able to generate reports that contain the details of incidents and escalations. 

Which System Center 2012 roles should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Operations Manager and Orchestrator 

B. Operations Manager and Service Manager 

C. Configuration Manager and Service Manager 

D. Service Manager and Virtual Machine Manager (VMM) 

Answer:

Q140. – (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network contains a perimeter network. The perimeter network and the internal network are separated by a firewall. 

On the perimeter network, you deploy a server named Server1 that runs Windows Server 2012. 

You deploy Active Directory Certificate Services (AD CS). 

Each user is issued a smart card. 

Users report that when they work remotely, they are unable to renew their smart card certificate. 

You need to recommend a solution to ensure that the users can renew their smart card certificate from the Internet. 

What should you recommend implementing on Server1? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role service 

B. The Active Directory Federation Services server role 

C. An additional certification authority (CA) and the Online Responder role service 

D. The Certification Authority Web Enrollment role service and the Online Responder role service 

Answer:

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.