Want to Pass 70-980 Exam In Next HOURS? Get it now →
July 5, 2017

Today Big Q: 70 980 dump?

It is impossible to pass Microsoft 70 980 dump exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Microsoft exam 70 980 practice questions. You will get a surprising result by our Latest Recertification for MCSE: Server Infrastructure practice guides.

Q51. - (Topic 9) 

Your company has a main office and four branch offices. The main office is located in London. 

The network contains an Active Directory domain named contoso.com. The network is configured as shown in the exhibit. (Click the Exhibit button.) 

Each office contains several servers that run Windows Server 2012. 

In each branch office, you plan to deploy an additional 20 servers that will run Windows Server 2012. Some of the servers will have a Server Core installation of Windows Server 2012. 

You identify the following requirements for the deployment of the new servers: 

Operating system images must be administered centrally. 

The operating system images must be deployed by using PXE. 

The WAN traffic caused by the deployment of each operating system must be 

minimized. 

You need to recommend a solution for the deployment of the new servers. 

What should you recommend? 

Exhibits 

A. Deploy Windows Deployment Services (WDS) in each office. Replicate the images by using Distributed File System (DFS) Replication, 

B. Deploy Windows Deployment Services (WDS) in the main office only. Replicate the images by using Distributed File System (DFS) Replication. 

C. Deploy Windows Deployment Services (WDS) in each office. Copy the images by using BranchCache. 

D. Deploy Windows Deployment Services (WDS) in the main office only. Copy the images by using BranchCache. 

Answer:


Q52. HOTSPOT - (Topic 7) 

You need to recommend a configuration for the CA extensions of Northwind Traders that meets the certificate revocation requirement of Customer1. 

What should you recommend? To answer, select the appropriate prefix of the target location for the each extension settings in the answer area. 

Answer: 


Q53. - (Topic 10) 

Your network contains multiple servers that run Windows Server 2012. 

The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections. 

You have two failover clusters. The failover clusters are configured as shown in the following table. 

Only the members of Cluster1 can connect to the SAN. 

You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder. 

You need to ensure that the VHD files of the virtual machines can be stored on the SAN. 

What should you do? (Each correct answer presents a complete solution. Choose all that apply.) 

A. From a node in Cluster2, create a Virtual Fibre Channel SAN. 

B. From a node in Cluster1, create a Virtual Fibre Channel SAN. 

C. From Cluster1, add the iSCSI Target Server cluster role. 

D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type. 

Answer: C,D 

Explanation: 

* After the virtual machines are connected to the storage system using the virtual Fibre Channel components shared storage can be used by each VM, which enables Hyper-V guest clustering. Before the virtual Fibre Channel features were available, Hyper-V guest machines were limited to iSCSI connections to enable shared storage for guest clustering. 

* A new feature in Windows Server 2012 Hyper-V is the ability to create a virtual Fibre Channel SAN. Each guest VM created on Windows Server 2012 includes a new option Add hardware Fibre Channel cards, which can be attributed to World Wide node names (WWNN) and select the virtual combine Virtual SAN Fibre Channel adapters. 


Q54. - (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q55. - (Topic 10) 

Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM) server named Server1. 

You use Server1 to manage 20 Hyper-V hosts. 

The network also contains five Citrix XenServer virtualization hosts. 

You need to recommend which installation is required to manage the XenServer servers from Server1. 

What should you recommend installing? 

A. The Citrix XenServer - Microsoft System Center Integration Pack on the Citrix XenServer hosts 

B. The Citrix XenServer - Microsoft System Center Integration Pack on Server1 

C. Citrix Essentials for Hyper-V on Server1 

D. Citrix Essentials for Hyper-V on the Citrix XenServer hosts 

Answer:


Q56. DRAG DROP - (Topic 9) 

Your company plans to deploy a remote access solution to meet the following requirements: 

. Ensure that client computers that are connected to the Internet can be managed remotely without requiring that the user log on. 

. Ensure that client computers that run Windows Vista or earlier can connect remotely. 

. Ensure that non-domain-joined computers can connect remotely by using TCP port 443. 

You need to identify which remote access solutions meet the requirements. 

Which solutions should you identify? 

To answer, drag the appropriate solution to the correct requirement in the answer area. Each solution may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q57. - (Topic 9) 

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed. 

All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1. 

You plan to add another DHCP server named Server2 to Subnet1. 

You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Create a Network Load Balancing (NLB) cluster. 

B. Configure Failover for the scope. 

C. Create a DHCP failover cluster. 

D. Create a split scope. 

Answer:

Explanation: 

http://blogs.technet.com/b/keithmayer/archive/2012/10/28/step-by-step-scoping-out-the-new-dhcpfailover-inwindows-server-2012-31-days-of-favorite-features-part-28-of-31.aspx#.UQhW-b-jbK0 

D:\\Documents and Settings\\useralbo\\Desktop\\1.jpg 


Q58. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either Windows Server 2012 or Windows Server 2008 R2. 

The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008. 

The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin. 

You need to recommend changes to the current environment to meet the compliance policy. 

Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Raise the forest functional level to Windows Server 2008 R2. 

B. Run the Enable-ADOptionalFeaturecmdlet. 

C. Run the New-ADObject cmdlet. 

D. Run the Set-Server cmdlet 

E. Raise the domain functional level to Windows Server 2012. 

Answer: A,B 

Explanation: You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2. 

B: Enabling Active Directory Recycle Bin After the forest functional level of your environment is set to Windows Server 2008 R2, you can enable Active Directory Recycle Bin by using the following methods: / Enable-ADOptionalFeature Active Directory module cmdlet (This is the recommended method.) / Ldp.exe 

Note: By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled. 

Reference: Enable Active Directory Recycle Bin 


Q59. HOTSPOT - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database. 

The network contains four subnets. 

You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node. 

You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1. 

What should you modify from the port settings? 

To answer, select the appropriate setting in the answer area. 

Answer: 


Q60. - (Topic 3) 

You need to recommend a solution that meets the security requirements. 

Which schema attribute properties should you recommend modifying? 

A. isIndexed 

B. searchFlags 

C. isCriticalSystemObject 

D. schemaFlagsEx 

Answer:

Explanation: 

D:\\Documents and Settings\\useralbo\\Desktop\\1.jpg 

Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema. 

. Determine and then modify the current searchFlags value of an attribute 

. Verify that an attribute is added to the RODC FAS 

-Determine and then modify the current searchFlags value of an attribute To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags: 

. To add the attribute to the RODC FAS, set the 10th bit to 0x200. 

. To mark the attribute as confidential, set the 7th bit to 0x080. http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx 



see more http://www.ubraindumps.com/70-980-dumps/