When you finally invest in each of our Ucertify 70-980 system, we will deliver cost-free replace in time for just one twelve months. Level of quality as well as Valuation for that 70-980 Audit, 100% Make sure to secure Your own 70-980 Audit, Down-loadable, Interactive 70-980 Examining motor, Established The answers Explored by simply Industry Experts, Pull as well as Shed problems because experienced in the very Assessments, 70-980, Practice Evaluation Queries together with indicates. Our own 70-980 Practice Evaluation Queries are guaranteed by simply each of our 100% Refund policy.

2017 Mar 70-980 exam question

Q121. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. 

You plan to deploy 200 new physical servers during the next 12 months by using Windows Deployment Services (WDS). You identify four server builds for the 200 servers as shown in the following table. 

You need to recommend the minimum number of images that must be created for the planned deployment. 

How many images should you recommend? 

A. 1 

B. 2 

C. 3 

D. 4 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh831764.aspx 


Q122. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings. 

You need to design a Group Policy strategy to meet the following requirements: 

. The security settings in GPO1 must be applied to all client computers. 

. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1. 

B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1. 

C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1. 

D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1. 

Answer:


Q123. HOTSPOT - (Topic 4) 

You need to recommend a solution for communicating to Windows Azure services. 

What should you recommend? To answer, select the appropriate options in the answer area. 

Answer: 


Q124. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

You plan to implement Microsoft System Center 2012. 

You need to identify which solution automates the membership of security groups for contoso.com. The solution must use workflows that provide administrators with the ability to 

approve the addition of members to the security groups. 

Which System Center 2012 roles should you identify? 

A. Configuration Manager and Orchestrator 

B. Service Manager and Virtual Machine Manager (VMM) 

C. Orchestrator and Service Manager 

D. Operations Manager and Orchestrator 

Answer:


Q125. DRAG DROP - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3 and Server4 that run Windows Server 2012. 

Server1 and Server2 are configured as file servers and are part of a failover cluster named Cluster1. Server3 and Server4 have Microsoft SQL Server 2012 installed and are part of a failover cluster named Cluster2. 

You add a disk named Disk1 to the nodes in Cluster1. Disk1 will be used to store the data files and log files used by SQL Server 2012. 

You need to configure the environment so that access to Disk1 remains available when a node on Cluster1 fails over or fails back. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Updated 70-980 sample question:

Q126. DRAG DROP - (Topic 10) 

You have a failover cluster named Cluster1 that contains four Hyper-V hosts. Cluster1 hosts 20 virtual machines. 

You deploy a new failover cluster named Cluster2. 

You plan to replicate the virtual machines from Cluster1 to Cluster2. 

You need to recommend which actions must be performed on Cluster2 for the planned deployment. 

Which three actions should you recommend? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q127. - (Topic 8) 

You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements. 

Solution: You recommend a scale-out file server that uses an NFS share. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q128. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. 

Your company has 100 users in the sales department. Each sales user has a domain-joined laptop computer that runs either Windows 7 or Windows 8. The sales users rarely travel to the company's offices to connect directly to the corporate network. 

You need to recommend a solution to ensure that you can manage the sales users' laptop computers when the users are working remotely. 

What solution should you include in the recommendation? 

A. Deploy the Remote Access server role on a server on the internal network. 

B. Deploy the Network Policy and Access Services server role on a server on the internal network. 

C. Deploy a Microsoft System Center 2012 Service Manager infrastructure. 

D. Deploy a Microsoft System Center 2012 Operations Manager infrastructure. 

Answer:


Q129. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. 

All client computers run either Windows 7 or Windows 8. 

Goal: You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3. 

Solution: You implement the 802.1x Network Access Protection (NAP) enforcement method. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q130. - (Topic 9) 

Your company is a hosting provider that provides cloud-based services to multiple customers. 

Each customer has its own Active Directory forest located in your company's datacenter. 

You plan to provide VPN access to each customer. The VPN solution will use RADIUS for authentication services and accounting services. 

You need to recommend a solution to forward authentication and accounting messages from the perimeter network to the Active Directory forest of each customer. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. One RADIUS proxy for each customer and Active Directory Federation Services (AD FS) 

B. A RADIUS server for each customer and one RADIUS proxy 

C. One RADIUS proxy and one Active Directory Lightweight Directory Services (AD LDS) instance for each customer 

D. A RADIUS server for each customer and a RADIUS proxy for each customer 

Answer: