Skip to content

Top Quality Microsoft 70-980 exam

Proper study guides for Up to the minute Microsoft Recertification for MCSE: Server Infrastructure certified begins with Microsoft 70 980 vce preparation products which designed to deliver the Virtual 70 980 vce questions by making you pass the 70 980 vce test at your first time. Try the free exam 70 980 demo right now.

2018 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-980 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-980-dumps.html

Q41. – (Topic 10) 

You have a Windows Server 2012 R2 failover cluster that contains four nodes. Each node has four network adapters. The network adapters on each node are configured as shown in the following table. 

NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS). The cluster networks are configured as shown in the following table. 

You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic. 

What should you do? 

A. Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel. 

B. On each server, replace NIC4 with a 1-Gbps network adapter. 

C. Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel. 

D. On each server, enable RDMA on NIC4. 

Answer:

Q42. – (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q43. – (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012. 

Your company uses IP Address Management (IPAM) to manage multiple DHCP servers. A user named User1 is a member of the IPAM Users group and is a member of the local Administrators group on each DHCP server. 

When User1 edits a DHCP scope by using IPAM, the user receives the error message 

shown in the exhibit. (Click the Exhibit button.) 

You need to prevent User1 from receiving the error message when editing DHCP scopes by using IPAM. 

What should you do? 

A. Add User1 to the DHCP Administrators group on each DHCP server. 

B. Add User1 to the IPAM Administrators group. 

C. Run the Set-IpamServerConfig cmdlet. 

D. Run the Invoke-IpamGpoProvisioning cmdlet. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh831622.aspx IPAM Administrators: IPAM Administrators have the privileges to view all IPAM data and perform all IPAM tasks. 

Q44. – (Topic 9) 

Your network contains an Active Directory forest. The forest contains two Active Directory domains named contoso.com and child.contoso.com. The forest functional level is Windows Server 2003. The functional level of both domains is Windows Server 2008. 

The forest contains three domain controllers. The domain controllers are configured as shown in the following table. 

DC1 and DC2 have the DNS Server server role installed and are authoritative for both contoso.com and child.contoso.com. 

The child.contoso.com domain contains a server named serverl.child.contoso.com that runs Windows Server 2012. 

You plan to deploy server1.child.contoso.com as a read-only domain controller (RODC). 

You run the adprep.exe /rodcprep command on DC3 and receive the following error message: 

You need to identify what prevents you from successfully running Adprep /rodcprep on DC3. 

What should you identify? 

A. The domain functional level of child.contoso.com is set to the wrong level. 

B. DC3 cannot connect to the infrastructure master on DC2. 

C. DC3 cannot connect to the domain naming master on DC1. 

D. The forest functional level is set to the wrong level. 

Answer:

Q45. – (Topic 3) 

You need to recommend a change to the Active Directory environment to support the company's planned changes. 

What should you include in the recommendation? 

A. Raise the functional level of the domain and the forest. 

B. Implement Administrator Role Separation. 

C. Upgrade the domain controllers that have the PDC emulator master role to Windows Server 2012. 

D. Upgrade the domain controller that has the domain naming master role to Windows Server 2012. 

Answer:

Explanation: 

D:\\Documents and Settings\\useralbo\\Desktop\\1.jpg 

Q46. – (Topic 7) 

You plan to implement a solution that meets the certificate requirements of Customer1. You need to identify which role services must be deployed to the hosting environment. 

Which two role services should you identify? Each correct answer presents part of the solution. 

A. Certification Authority Web Enrollment 

B. Online Responder 

C. Certificate Enrollment Policy Web Service 

D. Certificate Enrollment Web Service 

Answer: C,D 

Q47. – (Topic 5) 

You need to recommend a solution that meets the technical requirements for DHCP. 

What should you include in the recommendation for each office? 

A. DHCP failover 

B. Network Load Balancing (NLB) 

C. DHCP server policies 

D. IP Address Management (IPAM) 

Answer:

Q48. DRAG DROP – (Topic 7) 

You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 

Topic 8, A.Datum Corporation 

Overview 

A. Datum Corporation is an accounting company. 

The company has a main office and two branch offices. The main office is located in Miami. 

The branch offices are located in New York and Seattle. 

Existing Environment 

Network Infrastructure 

The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2. The main office has the following servers and client computers: 

Two domain controllers configured as DNS servers and DHCP servers 

One file server that has multiples shares 

One thousand client computers that run Windows 7 

Each branch office has the following servers and client computers: 

One domain controller configured as a DNS server and a DHCP server 

Five hundred to 800 client computers that run Windows XP 

Each office has multiple subnets. The network speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a WAN link. The main office is connected to the Internet. 

Current Issues 

The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link will not be replaced for another year. 

Requirements 

Application Requirements 

The company is developing an application named App1. App1 is a multi-tier application that will be sold as a service to customers. 

Each instance of App1 is comprised of the following three tiers: 

A web front end 

A middle tier that uses Windows Communication Foundation (WCF) 

A Microsoft SQL Server 2008 R2 database on the back end 

Each tier will be hosted on one or more virtual machines. Multiple tiers cannot coexist on the same virtual machine. 

When customers purchase App1, they can select from one of the following service levels: 

Standard: Uses a single instance of each virtual machine required by App1. If a virtual machine becomes unresponsive, the virtual machine must be restarted. Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and fault tolerance. 

All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server fails. 

You plan to deploy an application named App2. App2 is comprised of the following two tiers: 

A web front end 

A dedicated SQL Server 2008 R2 database on the back end 

App2 will be hosted on a set of virtual machines in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the App2 virtual machines will be maintained in the Seattle office. 

App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory Federation Services server role and all of the Active Directory Federation Services (AD FS) role services installed. 

Planned Changes 

A. Datum plans to implement the following changes: 

Replace all of the servers with new servers that run Windows Server 2012. 

Implement a private cloud by using Microsoft System Center 2012 to host instances of App1. 

In the Miami office, deploy four new Hyper-V hosts to the perimeter network. 

In the Miami office, deploy two new Hyper-V hosts to the local network. 

In the Seattle office, deploy two new Hyper-V hosts. 

In the Miami office, implement a System Center 2012 Configuration Manager primary site that has all of the system roles installed. 

Implement a public key infrastructure (PKI). 

Notification Requirements 

A. Datum identifies the following notification requirements: 

Help desk tickets must be created and assigned automatically when an instance of App1 becomes unresponsive. Customers who select the Enterprise service level must receive an email notification each time a help desk ticket for their instance of App1 is opened or closed. 

Technical Requirements 

A. Datum identifies the following technical requirements: 

Minimize costs whenever possible. 

Minimize the amount of WAN traffic 

Minimize the amount of administrative effort whenever possible. 

Provide the fastest possible failover for the virtual machines hosting App2. 

Ensure that administrators can view a consolidated report about the software updates in all of the offices. 

Ensure that administrators in the Miami office can approve updates for the client computers in all of the offices. 

Security Requirements 

A. Datum identifies the following security requirements: 

An offline root certification authority (CA) must be configured. 

Client computers must be issued certificates by a server in their local office. 

Changes to the CA configuration settings and the CA security settings must be logged. 

Client computers must be able to renew certificates automatically over the Internet. 

The number of permissions and privileges assigned to users must be minimized whenever possible. 

. Users from a group named Group1 must be able to create new instances of App1 in the private cloud. 

. Client computers must be issued new certificates when the computers are connected to the local network only. 

. The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker). 

. Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com. 

Q49. – (Topic 10) 

Your Active Directory currently contains five virtualized domain controllers that run Windows Server 2012 R2. 

The system state of each domain controller is backed up daily. The backups are shipped to a remote location weekly. 

Your company recently implemented a disaster recovery site that contains several servers. The servers run Windows Server 2012 R2 and have the Hyper-V server role installed. The disaster recovery site has a high-speed WAN link to the main office. 

You need to create an Active Directory recovery plan that meets the following requirements: 

. Restores the Active Directory if a catastrophe prevents all access to the main office. 

. Minimizes data loss. 

What should you include in the plan? 

A. Hyper-V replicas 

B. Live migration 

C. Virtual machine checkpoints 

D. System state restores 

Answer:

Q50. – (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

You plan to implement Microsoft System Center 2012. 

You need to identify which solution automates the membership of security groups for contoso.com. The solution must use workflows that provide administrators with the ability to 

approve the addition of members to the security groups. 

Which System Center 2012 roles should you identify? 

A. Configuration Manager and Orchestrator 

B. Service Manager and Virtual Machine Manager (VMM) 

C. Orchestrator and Service Manager 

D. Operations Manager and Orchestrator 

Answer: