Examcollection 70 980 pdf Questions are updated and all exam 70 980 answers are verified by experts. Once you have completely prepared with our 70 980 vce exam prep kits you will be ready for the real 70 980 dump exam without a problem. We have Updated Microsoft 70 980 vce dumps study guide. PASSED 70 980 pdf First attempt! Here What I Did.

Q71. - (Topic 9) 

Your network contains an Active Directory forest that has two domains named contoso.com and europe.contoso.com. The forest contains five servers. The servers are configured as shown in the following table. 

You plan to manage the DHCP settings and the DNS settings centrally by using IP Address Management (IPAM). 

You need to ensure that you can use IPAM to manage the DHCP and DNS settings in both domains. The solution must use the minimum amount of administrative effort. 

What should you do? 

A. Upgrade DCE1 and DCE2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Set-IpamConfiguration cmdlet for each domain. 

B. Upgrade DCE1 and DCE2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Invoke-IpamGpoProvisioning cmdlet for each domain. 

C. Upgrade DC1 and DC2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Invoke-IpamGpoProvisioning cmdlet for each domain. 

D. Upgrade DC1 and DC2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Set-IpamConfiguration cmdlet for each domain. 

Answer:

Explanation: Invoke-IpamGpoProvisioning Creates and links group policies in the specified domain for provisioning required access settings on the servers managed by the computer running the IP Address Management (IPAM) server. http://technet.microsoft.com/en-us/library/jj553805.aspx 

Set-IpamConfiguration Sets the configuration for the computer running the IP Address Management (IPAM) server, including the TCP port number over which the computer running the IPAM Remote Server Administration Tools (RSAT) client connects with the computer running the IPAM server. http://technet.microsoft.com/en-us/library/jj590816.aspx 


Q72. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

Your company has an enterprise root certification authority (CA) named CA1. 

You plan to deploy Active Directory Federation Services (AD FS) to a server named Server1. 

The company purchases a Microsoft Office 365 subscription. 

You plan to register the company's SMTP domain for Office 365 and to configure single sign-on for all users. 

You need to identify which certificate or certificates are required for the planned deployment. 

Which certificate or certificates should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com 

B. a server authentication certificate that is issued by CA1 and that contains the subject name Server1 

C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1 

D. a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com 

E. self-signed server authentication certificates for server1.contoso.com 

Answer:


Q73. - (Topic 4) 

You need to implement a solution for DNS replication. 

Which cmdlets should you run? 

A. Set-DnsServer and Invoke-DnsServerZoneSign 

B. ConvertTo-DnsServerPrimaryZone and Register-DnsServerDirectoryPartition 

C. UnRegister-DnsServerDirectoryPartition and Add-DnsServerForwarder 

D. Set-DnsServerDnsSecZoneSetting and Invoke-DnsServerZoneSign 

Answer:


Q74. HOTSPOT - (Topic 10) 

You plan to deploy a certification authority (CA) infrastructure that contains the following servers: 

. An offline standalone root CA named CA1 

. An enterprise subordinate CA named CA2 

On all of the computers, you import the root CA certificate from CA1 to the Trusted Root Certification Authorities Certificates store. 

You need to ensure that CA2 can issue certificates for the CA hierarchy. 

What should you do? To answer, select the appropriate options in the answer area. 

Answer: 


Q75. - (Topic 6) 

You need to implement a solution for the email attachments. 

Both organizations exchange root CA certificates and install the certificates in the relevant stores. 

You duplicate the Enrollment Agent certificate template and generate a certificate based on the new template. 

Which additional two actions should you perform? Each correct answer presents part of the solution. 

A. Request cross-certification authority certificates. 

B. Create Capolicy.inf files. 

C. Request subordinate CA certificates. 

D. Create Policy.inf files. 

Answer: A,D 


Q76. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either Windows Server 2012 or Windows Server 2008 R2. 

The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008. 

The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin. 

You need to recommend changes to the current environment to meet the compliance policy. 

Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Raise the forest functional level to Windows Server 2008 R2. 

B. Run the Enable-ADOptionalFeaturecmdlet. 

C. Run the New-ADObject cmdlet. 

D. Run the Set-Server cmdlet 

E. Raise the domain functional level to Windows Server 2012. 

Answer: A,B 

Explanation: You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2. 

B: Enabling Active Directory Recycle Bin After the forest functional level of your environment is set to Windows Server 2008 R2, you can enable Active Directory Recycle Bin by using the following methods: / Enable-ADOptionalFeature Active Directory module cmdlet (This is the recommended method.) / Ldp.exe 

Note: By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled. 

Reference: Enable Active Directory Recycle Bin 


Q77. DRAG DROP - (Topic 7) 

You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 

Topic 8, A.Datum Corporation 

Overview 

A. Datum Corporation is an accounting company. 

The company has a main office and two branch offices. The main office is located in Miami. 

The branch offices are located in New York and Seattle. 

Existing Environment 

Network Infrastructure 

The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2. The main office has the following servers and client computers: 

Two domain controllers configured as DNS servers and DHCP servers 

One file server that has multiples shares 

One thousand client computers that run Windows 7 

Each branch office has the following servers and client computers: 

One domain controller configured as a DNS server and a DHCP server 

Five hundred to 800 client computers that run Windows XP 

Each office has multiple subnets. The network speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a WAN link. The main office is connected to the Internet. 

Current Issues 

The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link will not be replaced for another year. 

Requirements 

Application Requirements 

The company is developing an application named App1. App1 is a multi-tier application that will be sold as a service to customers. 

Each instance of App1 is comprised of the following three tiers: 

A web front end 

A middle tier that uses Windows Communication Foundation (WCF) 

A Microsoft SQL Server 2008 R2 database on the back end 

Each tier will be hosted on one or more virtual machines. Multiple tiers cannot coexist on the same virtual machine. 

When customers purchase App1, they can select from one of the following service levels: 

Standard: Uses a single instance of each virtual machine required by App1. If a virtual machine becomes unresponsive, the virtual machine must be restarted. Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and fault tolerance. 

All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server fails. 

You plan to deploy an application named App2. App2 is comprised of the following two tiers: 

A web front end 

A dedicated SQL Server 2008 R2 database on the back end 

App2 will be hosted on a set of virtual machines in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the App2 virtual machines will be maintained in the Seattle office. 

App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory Federation Services server role and all of the Active Directory Federation Services (AD FS) role services installed. 

Planned Changes 

A. Datum plans to implement the following changes: 

Replace all of the servers with new servers that run Windows Server 2012. 

Implement a private cloud by using Microsoft System Center 2012 to host instances of App1. 

In the Miami office, deploy four new Hyper-V hosts to the perimeter network. 

In the Miami office, deploy two new Hyper-V hosts to the local network. 

In the Seattle office, deploy two new Hyper-V hosts. 

In the Miami office, implement a System Center 2012 Configuration Manager primary site that has all of the system roles installed. 

Implement a public key infrastructure (PKI). 

Notification Requirements 

A. Datum identifies the following notification requirements: 

Help desk tickets must be created and assigned automatically when an instance of App1 becomes unresponsive. Customers who select the Enterprise service level must receive an email notification each time a help desk ticket for their instance of App1 is opened or closed. 

Technical Requirements 

A. Datum identifies the following technical requirements: 

Minimize costs whenever possible. 

Minimize the amount of WAN traffic 

Minimize the amount of administrative effort whenever possible. 

Provide the fastest possible failover for the virtual machines hosting App2. 

Ensure that administrators can view a consolidated report about the software updates in all of the offices. 

Ensure that administrators in the Miami office can approve updates for the client computers in all of the offices. 

Security Requirements 

A. Datum identifies the following security requirements: 

An offline root certification authority (CA) must be configured. 

Client computers must be issued certificates by a server in their local office. 

Changes to the CA configuration settings and the CA security settings must be logged. 

Client computers must be able to renew certificates automatically over the Internet. 

The number of permissions and privileges assigned to users must be minimized whenever possible. 

. Users from a group named Group1 must be able to create new instances of App1 in the private cloud. 

. Client computers must be issued new certificates when the computers are connected to the local network only. 

. The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker). 

. Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com. 


Q78. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012. 

The forest contains an Active Directory domain. The domain contains a global security group named GPO_Admins that is responsible for managing Group Policies in the forest. 

A second forest named fabrikam.com contains three domains. The forest functional level is Windows Server 2003. 

You need to design a trust infrastructure to ensure that the GPO_Admins group can create, edit, and link Group Policies in every domain of the fabrikam.com forest. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. A two-way forest trust 

B. A one-way forest trust 

C. Three external trusts 

D. Three shortcut trusts 

Answer:


Q79. HOTSPOT - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine Manager (VMM) is deployed to the domain. 

In VMM, you create a host group named HostGroup1. You add a 16-node Hyper-V failover cluster to HostGroup1. From Windows PowerShell, you run the following commands: 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer: 


Q80. - (Topic 10) 

Your network contains 500 client computers that run Windows 7 and a custom application named App1. App1 uses data stored in a shared folder. 

You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2. 

Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area Network (SAN). 

You plan to move the shared folder to Cluster1. 

You need to recommend which cluster resource must be created to ensure that the shared folder can be accessed from Cluster1. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. The Generic Application cluster role 

B. The DFS Namespace Server cluster role 

C. The clustered File Server role of the File Server for general use type 

D. The clustered File Server role of the File Server for scale-out application data type 

Answer: