70 980 vce [Jul 2017]

70-980 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!

Download 70-980 Dumps Free

Product Description:
Exam Number/Code: 70-980
Exam name: Recertification for MCSE: Server Infrastructure
n questions with full explanations
Certification: Microsoft Certification

HOW TO GET 70-980 Exam PDF Collection Free?

Pass4sure 70 980 vce Questions are updated and all 70 980 vce answers are verified by experts. Once you have completely prepared with our 70 980 dump exam prep kits you will be ready for the real 70 980 vce exam without a problem. We have Most recent Microsoft 70 980 dump dumps study guide. PASSED 70 980 dump First attempt! Here What I Did.

Q131. - (Topic 6) 

You need to recommend changes to the existing environment to meet the email requirement. 

What should you recommend? 

A. Implement a two-way forest trust that has selective authentication. 

B. Implement qualified subordination. 

C. Deploy the FabrikamCA root certificate to all of the client computers. 

D. Deploy a user certificate from FabrikamCA to all of the users. 

Answer:

Topic 7, Northwind Traders (B) 

Overview 

Northwind Traders is an IT services and hosting provider. 

Northwind Traders has two main data centers in North America. The data centers are located in the same city. The data centers connect to each other by using high-bandwidth, low-latency WAN links. Each data center connects directly to the Internet. 

Northwind Traders also has a remote office in Asia that connects to both of the North American data centers by using a WAN link. The Asian office has 30 multipurpose servers. 

Each North American data center contains two separate network segments. One network segment is used to host the internal servers of Northwind Traders. The other network segment is used for the hosted customer environments. 

Existing Environment 

Active Directory 

The network contains an Active Directory forest named northwindtraders.com. The forest contains a single domain. All servers run Windows Server 2012 R2. 

Server Environment 

The network has the following technologies deployed: 

Service Provider Foundation 

Windows Azure Pack for Windows Server 

System Center 2012 R2 Virtual Machine Manager (VMM) 

An Active Directory Rights Management Services (AD RMS) cluster 

An Active Directory Certificate Services (AD CS) enterprise certification authority (CA) 

All newly deployed servers will include the following components: 

Dual 10-GbE Remote Direct Memory Access (RDMA)-capable network adapters 

Dual 1-GbE network adapters 

128 GB of RAM 

Requirements 

Business Goals 

Northwind Traders will provide hosting services to two customers named Customer1 and Customer2. The network of each customer is configured as shown in the following table. 

Planned Changes 

Northwind Traders plans to implement the following changes: 

Deploy System Center 2012 R2 Operations Manager. 

Deploy Windows Server 2012 R2 iSCSI and SMB-based storage. 

Implement Hyper-V Recovery Manager to protect virtual machines. 

Deploy a certificate revocation list (CRL) distribution point (CDP) on the internal network. 

For Customer 1, install server authentication certificates issued by the CA of Northwind Traders on the virtual machine in the hosting networks. 

General Requirements 

Northwind Traders identifies the following requirements: 

Storage traffic must use dedicated adapters. 

All storage and network traffic must be load balanced. 

The amount of network traffic between the internal network and the hosting network must be minimized. 

The publication of CRLs to CDPs must be automatic. 

Each customer must use dedicated Hyper-V hosts. 

Administrative effort must be minimized, whenever possible. 

All servers and networks must be monitored by using Operations Manager. 

Anonymous access to internal file shares from the hosting network must be prohibited. 

All Hyper-V hosts must use Cluster Shared Volume (CSV) shared storage to host virtual machines. 

All Hyper-V storage and network traffic must remain available if single network adapter fails. 

The Hyper-V hosts connected to the SMB-based storage must be able to make use of the RDMA technology. 

The number of servers and ports in the hosting environment to which the customer 

has access must be minimized. 

Customer1 Requirements 

Northwind Traders identifies the following requirements for Customer1: 

. Customer1 must use SMB-based storage exclusively. 

. Customer1 must use App Controller to manage hosted virtual machines. 

. The virtual machines of Customer1 must be recoverable if a single data center fails. 

. Customer1 must be able to delegate self-service roles in its hosted environment to its users. 

. Customer1 must be able to check for the revocation of certificates issued by the CA of Northwind Traders. 

. The users of Customer1 must be able to obtain use licenses for documents protected by the AD RMS of Northwind Traders. 

. Certificates issued to the virtual machines of Customer1 that reside on the hosted networks must be renewed automatically. 

Customer2 Requirements 

Northwind Traders identifies the following requirements for Customer2: 

. Customer2 must use iSCSI-based storage exclusively. 

. All of the virtual machines of Customer2 must be migrated by using a SAN transfer. 

. None of the metadata from the virtual machines of Customer2 must be stored in Windows Azure. 

. The network configuration of the Hyper-V hosts for Customer2 must be controlled by using logical switches. 

. The only VMM network port profiles and classifications allowed by Customer2 must be low-bandwidth, medium-bandwidth, or high-bandwidth. 

. The users at Northwind Traders must be able to obtain use licenses for documents protected by the AD RMS cluster of Customer2. Customer2 plans to decommission its AD RMS cluster during the next year. 


Q132. - (Topic 2) 

You need to recommend a deployment method for Proseware. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. a WDS Deployment server and Multicast transmissions 

B. a WDS Deployment server and Unicast transmissions 

C. a WDS Transport server and Multicast transmissions 

D. a WDS Transport server and Unicast transmissions 

Answer:


Q133. - (Topic 8) 

You need to recommend a solution that meets the security requirements for Group1. 

To which System Center 2012 Virtual Machine Manager (VMM) group should you assign Group1? 

A. Delegated Administrator 

B. Administrators 

C. Self-Service User 

D. Read-Only Administrator 

Answer:


Q134. DRAG DROP - (Topic 7) 

You need to prepare for the migration of virtual machines across the Hyper-V hosts of Customer2. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q135. - (Topic 9) 

Your company is a hosting provider that provides cloud-based services to multiple customers. 

Each customer has its own Active Directory forest located in your company's datacenter. 

You plan to provide VPN access to each customer. The VPN solution will use RADIUS for authentication services and accounting services. 

You need to recommend a solution to forward authentication and accounting messages from the perimeter network to the Active Directory forest of each customer. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. One RADIUS proxy for each customer and Active Directory Federation Services (AD FS) 

B. A RADIUS server for each customer and one RADIUS proxy 

C. One RADIUS proxy and one Active Directory Lightweight Directory Services (AD LDS) instance for each customer 

D. A RADIUS server for each customer and a RADIUS proxy for each customer 

Answer:


Q136. - (Topic 3) 

You need to recommend a migration strategy for the DHCP servers. The strategy must 

meet the technical requirements. 

Which Windows PowerShell cmdlet should you recommend running on the physical DHCP servers? 

A. Import-SmigServerSetting 

B. Export-SmigServerSetting 

C. Receive-SmigServerData 

D. Send-SmigServerData 

Answer:


Q137. DRAG DROP - (Topic 9) 

Your network contains an Active Directory forest named corp.contoso.com. All servers run Windows Server 2012. 

The network has a perimeter network that contains servers that are accessed from the Internet by using the contoso.com namespace. 

The network contains four DNS servers. The servers are configured as shown in the following table. 

All of the client computers on the perimeter network use Server1 and Server2 for name resolution. 

You plan to add DNS servers to the corp.contoso.com domain. 

You need to ensure that the client computers automatically use the additional name servers. The solution must ensure that only computers on the perimeter network can resolve names in the corp.contoso.com domain. 

Which DNS configuration should you implement on Server1 and Server2? 

To answer, drag the appropriate DNS configuration to the correct location in the answer area. Each DNS configuration may be used once, more than once, or not at all. 

Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q138. - (Topic 9) 

Your company has a main office and four branch offices. The main office is located in London. 

The network contains an Active Directory domain named contoso.com. Each office contains one domain controller that runs Windows Server 2012. The Active Directory site topology is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that when a domain controller in a branch office is offline for maintenance, users in that branch office are authenticated by using the domain controllers in any of the sites. 

You need to recommend changes to Active Directory to ensure that when a domain controller in a branch office is offline, the users in that branch office are authenticated by the domain controllers in London. 

What should you include in the recommendation? 

Exhibit 

A. Modify the DC Locator DNS Records settings. 

B. Disable site link bridging. 

C. Modify the site link costs. 

D. Modify the service location (SRV) records in DNS. 

Answer:

Explanation: 

After having read several articles on the subject, I would say the correct answer for this question would be modifying the DC locator DNS record. Though I have never used it in any environment I worked in. But I am not sure. If anyone can clarify this one, mail me at badmuts13(a)gmail.com 


Q139. - (Topic 10) 

Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed. 

You plan to deploy a management solution. 

You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements: 

. An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine. 

. An administrator must be able to assign an incident to a specific administrator for resolution. 

. An incident that remains unresolved for more than 10 hours must be escalated automatically to another administrator. 

. Administrators must be able to generate reports that contain the details of incidents and escalations. 

Which System Center 2012 roles should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Operations Manager and Orchestrator 

B. Operations Manager and Service Manager 

C. Configuration Manager and Service Manager 

D. Service Manager and Virtual Machine Manager (VMM) 

Answer:


Q140. - (Topic 9) 

You are designing an Active Directory forest for a company named Contoso, Ltd. Contoso identifies the following administration requirements for the design: 

. User account administration and Group Policy administration will be performed by network technicians. The technicians will be added to a group named OUAdmins. 

. IT staff who are responsible for backing up servers will have user accounts that are members of the Backup Operators group in the domain. 

. All user accounts will be located in an organizational unit (OU) named AllEmployees. 

You run the Delegation of Control Wizard and assign the OUAdmins group full control to all of the objects in the AllEmployeesOU. 

After delegating the required permissions, you discover that the user accounts of some of the IT staff have inconsistent permissions on the objects in AllEmployees. 

You need to recommend a solution to ensure that the members of OUAdmins can manage all of the objects in AllEmployees. 

What should you include in the recommendation? 

A. Remove the IT staff user accounts from Backup Operators and place them in a new group. Grant the new group the Backup files and directories user right and the Restore files and directories user right. Enforce permission inheritance on all of the objects in the AllEmployeesOU. 

B. Create separate administrator user accounts for the technicians. Enforce permission inheritance on all of the objects in the AllEmployeesOU. Delegate permissions to the new useraccounts. 

C. Enforce permission inheritance on all of the objects in the AllEmployeesOU. Run the Delegation of Control Wizard. 

D. Move the user accounts of the technicians to a separate OU. Enforce permission inheritance on all of the objects in the AllEmployeesOU. Run the Delegation of Control Wizard on the AllEmployeesOU. 

Answer:


[TRY FREE] BUY 70-980 Full version( pdf+software ):
https://www.exambible.com/70-980-exam/