Want to Pass 70-980 Exam In Next HOURS? Get it now →
September 6, 2017

10 tips on 70 980 pdf

we provide Vivid Microsoft 70 980 pdf exam question which are the best for clearing 70 980 dump test, and to get certified by Microsoft Recertification for MCSE: Server Infrastructure. The 70 980 pdf Questions & Answers covers all the knowledge points of the real exam 70 980 exam. Crack your Microsoft exam 70 980 Exam with latest dumps, guaranteed!

Q141. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012. 

Your company plans to deploy an application that will provide a search interface to users in the company. The application will query the global catalog for the Employee-Number attribute. 

You need to recommend a solution to ensure that the application can retrieve the Employee-Number value from the global catalog. 

What should you include in the recommendation? 

A. the Dsmod command 

B. the Ldifde command 

C. the Enable-ADOptionalFeaturecmdlet 

D. the Csvde command 

Answer:

Explanation: http://technet.microsoft.com/en-us/library/ee617209.aspx - Enable-AdOptionalFeature http://technet.microsoft.com/en-us/library/ee617218.aspx - Get-ADOptionalFeature (as of W2012R2, only OptionalFeature is ActiveDirectory Recycle Bin). 


Q142. - (Topic 9) 

Your network contains an Active Directory forest named adatum.com. All domain controllers run Windows Server 2008 R2. The functional level of the domain and the forest is Windows Server 2008. 

You deploy a new Active Directory forest named contoso.com. All domain controllers run Windows Server 2012 R2. The functional level of the domain and the forest is Windows Server 2012 R2. 

You establish a two-way, forest trust between the forests. Both networks contain member servers that run either Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 or Windows Server 2008. 

You plan to use the Active Directory Migration Tool 3.2 (ADMT 3.2) to migrate user accounts from adatum.com to contoso.com. SID history will be used in contoso.com and passwords will be migrated by using a Password Export Server (PES). 

You need to recommend which changes must be implemented to support the planned migration. 

Which two changes should you recommend? Each correct answer presents part of the solution. 

A. In the contoso.com forest, deploy a domain controller that runs Windows Server 2008 R2. 

B. In the adatum.com forest, upgrade the functional level of the forest and the domain. 

C. In the contoso.com forest, downgrade the functional level of the forest and the domain. 

D. In the adatum.com forest, deploy a domain controller that runs Windows Server 2012 R2. 

Answer: A,C 


Q143. - (Topic 10) 

You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM). 

You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node. 

What should you do? 

A. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines. 

B. Set the Priority property of the virtual machine cluster role. 

C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines. 

D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines. 

Answer:


Q144. - (Topic 6) 

You need to implement a solution for the email attachments. 

Both organizations exchange root CA certificates and install the certificates in the relevant stores. 

You duplicate the Enrollment Agent certificate template and generate a certificate based on the new template. 

Which additional two actions should you perform? Each correct answer presents part of the solution. 

A. Request cross-certification authority certificates. 

B. Create Capolicy.inf files. 

C. Request subordinate CA certificates. 

D. Create Policy.inf files. 

Answer: A,D 


Q145. - (Topic 10) 

Your network contains an Active Directory Rights Management Services (AD RMS) cluster named Cluster1. 

You plan to change Cluster1 to a new AD RMS cluster named Cluster2. 

You need to ensure that all users retrieve the location of the AD RMS templates from Cluster2. 

What should you do? 

A. Modify the Service Connection Point (SCP). 

B. Modify the exclusion policies. 

C. Modify the templates file location of the rights policy templates. 

D. Create an alias (CNAME) record named Cluster1.contoso.com that points to Cluster2. 

Answer:


Q146. - (Topic 3) 

You need to recommend changes to the Active Directory environment to support the virtualization requirements. 

What should you include in the recommendation? 

A. Raise the functional level of the domain and the forest. 

B. Upgrade the domain controller that has the domain naming master role to Windows Server 2012. 

C. Implement Administrator Role Separation. 

D. Upgrade the domain controllers that have the PDC emulator master role to Windows Server 2012. 

Answer:

Explanation: From case study: 

* Ensure that the additional domain controllers for the branch offices can be deployed by using domain controller cloning. 


Q147. - (Topic 8) 

You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements. 

Solution: You recommend a scale-out file server that uses an SMB share. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q148. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. 

All client computers run either Windows 7 or Windows 8. 

The corporate security policy states that all of the client computers must have the latest security updates installed. You need to implement a solution to ensure that only the client computers that have all of 

the required security updates installed can connect to VLAN 1. The solution must ensure 

that all other client computers connect to VLAN 3. 

Solution: You implement the IPsec enforcement method. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q149. - (Topic 9) 

Your company has a main office and a branch office. 

The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table. 

The domain contains two global groups. The groups are configured as shown in the following table. 

You need to ensure that the RODC is configured to meet the following requirements: 

. Cache passwords for all of the members of Branch1Users. 

. Prevent the caching of passwords for the members of Helpdesk. 

What should you do? 

A. Modify the membership of the Denied RODC Password Replication group. 

B. Install the BranchCache feature on RODC1. 

C. Modify the delegation settings of RODC1. 

D. Create a Password Settings object (PSO) for the Helpdesk group. 

Answer:


Q150. HOTSPOT - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains four servers. The servers are configured as shown in the following table. 

You plan to provide users with the ability to use Workplace Join for their personal device when they connect to the internal network. 

You need to recommend a certificate configuration for the planned deployment. 

What should you include in the recommendation? To answer, select the appropriate names in the answer area. 

Answer: 



see more http://www.ubraindumps.com/70-980-dumps/