Master the 70 980 pdf Recertification for MCSE: Server Infrastructure content and be ready for exam day success quickly with this Exambible 70 980 vce free practice test. We guarantee it!We make it a reality and give you real 70 980 dump questions in our Microsoft 70 980 pdf braindumps.Latest 100% VALID Microsoft 70 980 dump Exam Questions Dumps at below page. You can use our Microsoft 70 980 vce braindumps and pass your exam.
2017 NEW RECOMMEND
Free VCE & PDF File for Microsoft 70-980 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q31. – (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest
security updates installed.
You need to implement a solution to ensure that only the client computers that have all of
the required security updates installed can connect to VLAN 1. The solution must ensure
that all other client computers connect to VLAN 3.
Solution: You implement the VPN enforcement method.
Does this meet the goal?
Q32. HOTSPOT – (Topic 10)
You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
You implement Hyper-V Recovery Manager for the deployment.
You create two new clouds named Cloud1 and Cloud2. Metadata for both clouds is uploaded to Windows Azure.
You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2.
Where should you perform each action? To answer, select the appropriate tool for each action in the answer area.
Q33. – (Topic 10)
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Group Policy preferences
B. A desired configuration baseline
C. The Windows PowerShell Desired State Configuration (DSC) feature
D. The Microsoft Baseline Security Analyzer (MBSA)
Q34. HOTSPOT – (Topic 10)
You plan to implement a virtualization solution to host 10 virtual machines. All of the virtual
machines will be hosted on servers that run Windows Server 2012.
You need to identify which servers must be deployed for the planned virtualization solution. The solution must meet the following requirements:
.Minimize the number of servers.
.Ensure that live migration can be used between the hosts.
Which servers should you identify?
To answer, select the appropriate servers in the answer area.
Q35. – (Topic 10)
Your network contains an Active Directory domain named contoso.com.
Your company has an enterprise root certification authority (CA) named CA1.
You plan to deploy Active Directory Federation Services (AD FS) to a server named Server1.
The company purchases a Microsoft Office 365 subscription.
You plan to register the company's SMTP domain for Office 365 and to configure single sign-on for all users.
You need to identify which certificate or certificates are required for the planned deployment.
Which certificate or certificates should you identify? (Each correct answer presents a complete solution. Choose all that apply.)
A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com
B. a server authentication certificate that is issued by CA1 and that contains the subject name Server1
C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1
D. a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com
E. self-signed server authentication certificates for server1.contoso.com
Q36. – (Topic 9)
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest named contoso.com. The forest contains a Microsoft Exchange Server 2010 organization. All of the domain controllers in contoso.com run Windows Server 2012.
The perimeter network contains an Active Directory forest named litware.com.
You deploy Microsoft Forefront Unified Access Gateway (UAG) to litware.com. All of the domain controllers in litware.com run Windows Server 2012.
Some users connect from outside the network to use Outlook Web App.
You need to ensure that external users can authenticate by using client certificates. What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. To the perimeter network, add an Exchange server that has the Client Access server role installed.
B. Deploy UAG to contoso.com.
C. Enable Kerberos delegation in litware.com.
D. Enable Kerberos constrained delegation in litware.com.
Q37. DRAG DROP – (Topic 9)
Your network contains three servers named Server1, Server2, and Server3 that run Windows Server 2012. Server3 is connected to a disk storage array.
You need to ensure that Server1 can store files on the storage array. The solution must ensure that Server1 can access the storage as a local disk.
What should you configure on each server?
To answer, drag the appropriate configuration to the correct location in the answer area. Each configuration may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Q38. DRAG DROP – (Topic 9)
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com.
You plan to decommission the fabrikam.com domain.
You need to perform the following migration tasks: . Copy user accounts from the fabrikam.com domain to the contoso.com domain. . Move the client computers from fabrikam.com to contoso.com. The solution must ensure that all of the user profiles are associated to the migrated user accounts.
Which tool should you use to perform each task?
To answer, drag the appropriate tool to the correct migration task in the answer area. Each
tool may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Q39. – (Topic 9)
Your company, which is named Contoso, Ltd., has a main office and two branch offices. The main office is located in North America. The branch offices are located in Asia and Europe.
You plan to design an Active Directory forest and domain infrastructure.
You need to recommend an Active Directory design to meet the following requirements:
. The contact information of all the users in the Europe office must not be visible to the users in the other offices.
. The administrators in each office must be able to control the user settings and the computer settings of the users in their respective office.
The solution must use the least amount of administrative effort.
What should you include in the recommendation?
A. One forest that contains three domains
B. Three forests that each contain one domain
C. Two forests that each contain one domain
D. One forest that contains one domain
Explanation: Answer: B http://www.informit.com/articles/article.aspx?p=32080&seqNum=5
Q40. DRAG DROP – (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server.
You plan to delegate the administration of IPAM as shown in the following table.
You need to recommend which IPAM security group must be used for each department. The solution must minimize the number of permissions assigned to each group.
What should you recommend?
To answer, drag the appropriate group to the correct department in the answer area. Each group may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.