Want to Pass 70-980 Exam In Next HOURS? Get it now →
March 16, 2017

Top Microsoft 70-980 free samples Choices

If you are the man who is able to recognize his shortcomings in Microsoft Microsoft exam preparation but have absolutely no ideas. Exambible will probably be your helper. Exambible.net is the best website you should visit. Exambible provides all the necessary and common Microsoft 70-980 samples. The superior high quality of Microsoft 70-980 exam dumps can easily change your current destiny in the discipline of That. The perfect Microsoft 70-980 practice materials, beyond virtually any doubt, can easily guarantee you get the Microsoft certification. Youll be able to have accessibility to these types of 70-980 study guides only by simply taking Exambibles training course.

2017 Mar 70-980 actual exam

Q71. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. The forest contains multiple servers that run Windows Server 2012. The network contains 1,000 client computers that run Windows 7. Two hundred remote users have laptop computers and only work from home. 

The network does not provide remote access to users. 

You need to recommend a monitoring solution to meet the following requirements: 

Generate a list of updates that are applied successfully to all computers. 

Minimize the amount of bandwidth used to download updates. 

An administrator must approve the installation of an update on any client computer. 

What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Microsoft Asset Inventory Service (AIS) 

B. Windows InTune 

C. Windows Server Update Services (WSUS) 

D. Active Directory Federation Services (AD FS) 

E. Microsoft System Center 2012 Service Manager 

Answer: A,B,C 


Q72. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. 

You need to issue a certificate to users to meet the following requirements: . Ensure that the users can encrypt files by using Encrypting File System (EFS). . Ensure that all of the users reenroll for their certificate every six months. 

Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q73. HOTSPOT - (Topic 7) 

You need to recommend a solution that meets the AD RMS requirements of Customer1 

and Customer2. 

Which actions should you recommend performing for each customer? To answer, select the appropriate customer for each action in the answer area. 

Answer: 


Q74. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

You currently have an intranet web site that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012. 

Users use the name intranet.contoso.com to request the web site and use DNS round robin. 

You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2. 

You need to recommend changes to the DNS records for the planned implementation. 

What should you recommend? 

A. Create a service locator (SRV) record. Map the SRV record to Intranet. 

B. Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server. 

C. Remove both host (A) records named Intranet. Create a new host (A) record named Intranet. 

D. Delete both host (A) records named Intranet. Create two new alias (CNAME) records named Intranet. Map each CNAME record to a Web server name. 

Answer:


Q75. - (Topic 9) 

Your company has a main office. 

The network contains an Active Directory domain named contoso.com. The main office contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Access server role installed and is configured to accept incoming SSTP-based VPN connections. 

All client computers run Windows 7. 

The company plans to open a temporary office that will contain a server named Server2 that runs 

Windows Server 2012 and has the DHCP Server server role installed. The office will also have 50 client computers and an Internet connection. 

You need to recommend a solution to provide the users in the temporary office with access to the resources in the main office. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Use the Connection Manager Administration Kit (CMAK) to create a connection package that specifies Server1 as the target for SSTP-based VPN connections. Manually distribute the CMAK package to each client computer in the temporary office. 

B. Install the Remote Access server role on Server2. From Routing and Remote Access on Server2, add a SSTP-based VPN port. From DHCP on Server2, configure the default gateway server option. 

C. Uses the Connection Manager Administration Kit (CMAK) to create a connection package that specifies Server1 as the target for SSTP-based VPN connections. Use a Group Policy object (GPO) to distribute the CMAK package to each client computer in the temporary office. 

D. Install the Remote Access server role on Server2. From Routing and Remote Access on Server2, configure a demand-dial interface. From DHCP on Server2, configure the default gateway server option. 

Answer:

Explanation: 

See link for an article on both Routing and Remote Access server role and the DHCP default gateway option. http://blogs.technet.com/b/rrasblog/archive/2009/03/25/remote-access-deployment-part-2-configuringrras-asa-vpn-server.aspx 


Improved 70-980 practice test:

Q76. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. 

All client computers run either Windows 7 or Windows 8. 

Some users work from customer locations, hotels, and remote sites. The remote sites often 

have firewalls that limit connectivity to the Internet. 

You need to recommend a VPN solution for the users. 

Which protocol should you include in the recommendation? 

A. PPTP 

B. SSTP 

C. IKEv2 

D. L2TP/IPSec 

Answer:


Q77. - (Topic 10) 

Your company has three main offices named Main1, Main2, and Main3. 

The network contains an Active Directory domain named contoso.com. 

Each office contains a help desk group. 

You plan to deploy Microsoft System Center 2012 Configuration Manager to meet the following requirements: 

. The members of the Domain Admins group must be able to manage all of the Configuration Manager settings. 

. The help desk groups must be able to manage only the client computers in their respective office by using Configuration Manager. 

You need to recommend a Configuration Manager infrastructure to meet the requirements. 

Which infrastructure should you recommend? More than one answer choice may achieve the goal. Select the BEST answer. 

A. Three sites that contain one collection for each office 

B. One site that contains one collection 

C. Three sites that each contain one collection 

D. One site that contains a collection for each office 

Answer:


Q78. - (Topic 10) 

You have a Windows Server 2012 R2 failover cluster that contains four nodes. Each node has four network adapters. The network adapters on each node are configured as shown in the following table. 

NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS). The cluster networks are configured as shown in the following table. 

You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic. 

What should you do? 

A. Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel. 

B. On each server, replace NIC4 with a 1-Gbps network adapter. 

C. Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel. 

D. On each server, enable RDMA on NIC4. 

Answer:


Q79. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

All client computers have a custom application named App1 installed. App1 generates an Event ID 42 every time the application runs out of memory. 

Users report that when App1 runs out of memory, their client computer runs slowly until they manually restart App1. 

You need to recommend a solution that automatically restarts App1 when the application runs out of memory. The solution must use the least amount of administrative effort. 

What should you include in the recommendation? 

A. From Configurations Manager, create a desired configuration management baseline. 

B. From Windows System Resource Manager, create a resource allocation policy. 

C. From Event Viewer, attach a task to the event. 

D. From Operations Manager, create an alert. 

Answer:


Q80. DRAG DROP - (Topic 7) 

You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 

Topic 8, A.Datum Corporation 

Overview 

A. Datum Corporation is an accounting company. 

The company has a main office and two branch offices. The main office is located in Miami. 

The branch offices are located in New York and Seattle. 

Existing Environment 

Network Infrastructure 

The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2. The main office has the following servers and client computers: 

Two domain controllers configured as DNS servers and DHCP servers 

One file server that has multiples shares 

One thousand client computers that run Windows 7 

Each branch office has the following servers and client computers: 

One domain controller configured as a DNS server and a DHCP server 

Five hundred to 800 client computers that run Windows XP 

Each office has multiple subnets. The network speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a WAN link. The main office is connected to the Internet. 

Current Issues 

The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link will not be replaced for another year. 

Requirements 

Application Requirements 

The company is developing an application named App1. App1 is a multi-tier application that will be sold as a service to customers. 

Each instance of App1 is comprised of the following three tiers: 

A web front end 

A middle tier that uses Windows Communication Foundation (WCF) 

A Microsoft SQL Server 2008 R2 database on the back end 

Each tier will be hosted on one or more virtual machines. Multiple tiers cannot coexist on the same virtual machine. 

When customers purchase App1, they can select from one of the following service levels: 

Standard: Uses a single instance of each virtual machine required by App1. If a virtual machine becomes unresponsive, the virtual machine must be restarted. Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and fault tolerance. 

All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server fails. 

You plan to deploy an application named App2. App2 is comprised of the following two tiers: 

A web front end 

A dedicated SQL Server 2008 R2 database on the back end 

App2 will be hosted on a set of virtual machines in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the App2 virtual machines will be maintained in the Seattle office. 

App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory Federation Services server role and all of the Active Directory Federation Services (AD FS) role services installed. 

Planned Changes 

A. Datum plans to implement the following changes: 

Replace all of the servers with new servers that run Windows Server 2012. 

Implement a private cloud by using Microsoft System Center 2012 to host instances of App1. 

In the Miami office, deploy four new Hyper-V hosts to the perimeter network. 

In the Miami office, deploy two new Hyper-V hosts to the local network. 

In the Seattle office, deploy two new Hyper-V hosts. 

In the Miami office, implement a System Center 2012 Configuration Manager primary site that has all of the system roles installed. 

Implement a public key infrastructure (PKI). 

Notification Requirements 

A. Datum identifies the following notification requirements: 

Help desk tickets must be created and assigned automatically when an instance of App1 becomes unresponsive. Customers who select the Enterprise service level must receive an email notification each time a help desk ticket for their instance of App1 is opened or closed. 

Technical Requirements 

A. Datum identifies the following technical requirements: 

Minimize costs whenever possible. 

Minimize the amount of WAN traffic 

Minimize the amount of administrative effort whenever possible. 

Provide the fastest possible failover for the virtual machines hosting App2. 

Ensure that administrators can view a consolidated report about the software updates in all of the offices. 

Ensure that administrators in the Miami office can approve updates for the client computers in all of the offices. 

Security Requirements 

A. Datum identifies the following security requirements: 

An offline root certification authority (CA) must be configured. 

Client computers must be issued certificates by a server in their local office. 

Changes to the CA configuration settings and the CA security settings must be logged. 

Client computers must be able to renew certificates automatically over the Internet. 

The number of permissions and privileges assigned to users must be minimized whenever possible. 

. Users from a group named Group1 must be able to create new instances of App1 in the private cloud. 

. Client computers must be issued new certificates when the computers are connected to the local network only. 

. The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker). 

. Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com. 



see more http://www.ubraindumps.com/70-980-dumps/