Exambible 70 980 pdf Questions are updated and all 70 980 vce answers are verified by experts. Once you have completely prepared with our exam 70 980 exam prep kits you will be ready for the real 70 980 pdf exam without a problem. We have Far out Microsoft 70 980 vce dumps study guide. PASSED exam 70 980 First attempt! Here What I Did.

Q1. DRAG DROP - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1. 

Server1 is a certification authority (CA). All servers run Windows Server 2012 R2. 

You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso. 

You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q2. DRAG DROP - (Topic 9) 

Your network contains an Active Directory forest named corp.contoso.com. All servers run Windows Server 2012. 

The network has a perimeter network that contains servers that are accessed from the Internet by using the contoso.com namespace. 

The network contains four DNS servers. The servers are configured as shown in the following table. 

All of the client computers on the perimeter network use Server1 and Server2 for name resolution. 

You plan to add DNS servers to the corp.contoso.com domain. 

You need to ensure that the client computers automatically use the additional name servers. The solution must ensure that only computers on the perimeter network can resolve names in the corp.contoso.com domain. 

Which DNS configuration should you implement on Server1 and Server2? 

To answer, drag the appropriate DNS configuration to the correct location in the answer area. Each DNS configuration may be used once, more than once, or not at all. 

Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q3. - (Topic 10) 

Your company has a main office and a branch office. 

You plan to implement a failover cluster named Cluster1 to host an application named App1. The data of App1 will replicate to all of the nodes in Cluster1. 

Cluster1 will contain two servers. The servers will be configured as shown in the following table. 

The cluster nodes will not use shared storage. 

The branch office contains two file servers named Server3 and Server4. 

You need to ensure that App1 fails over automatically to another server if a single node in Cluster1 fails. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Add Server3 as a node in Cluster1. 

B. Add Server1, Server2, and Server3 to a Network Load Balancing (NLB) cluster. 

C. Add Server3 and Server4 to a new failover cluster named Cluster2. Install App1 on Cluster2. 

D. Add Server3 as a file share witness for Cluster1. 

Answer:


Q4. - (Topic 10) 

Your network contains a data center named DataCenter1 that contains multiple servers. The servers are configured as Hyper-V hosts. 

Your company deploys a disaster recovery site. The disaster recovery site has a dedicated connection to DataCenter1. 

The network is connected to the disaster recovery site by using a dedicated link. 

DataCenter1 contains 10 business critical virtual machines that run a line-of-business application named App1. 

You need to recommend a business continuity solution to ensure that users can connect to App1 within two hours if DataCenter1 fails. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. From Microsoft System Center 2012 Virtual Machine Manager (VMM), implement live migration on the virtual machines. 

B. From Hyper-V Manager, implement Hyper-V replicas. 

C. From Microsoft System Center 2012 Data Protection Manager, implement a protection group. 

D. From Hyper-V Manager, create snapshots of the virtual machines. 

Answer:


Q5. HOTSPOT - (Topic 4) 

On Server2, you create a Run As Account named Account1. Account1 is associated to an Active Directory account named VMMIPAM. 

You need to implement an IPAM solution. 

What should you do? To answer, select the appropriate configuration for each server in the answer area. 

Answer: 


Q6. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012. Server1 has the Active Directory Certificate Services server role installed. Server1 is configured as an offline standalone root certification authority (CA). 

You install the Active Directory Certificate Services server role on Server2 and configure the server as an enterprise subordinate CA. 

You need to ensure that the certificate issued to Server2 is valid for 10 years. 

What should you do first? 

A. Modify the subordinate CA certificate template. 

B. Modify the registry on Server2. 

C. Modify the registry on Server1. 

D. Modify the CAPolicy.inf file on Server2. 

E. Modify the CAPolicy.inf file on Server1. 

Answer:


Q7. - (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new external virtual network switches. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q8. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,C 

Explanation: 

Creating a New Object: Resulting in multiple Event ID 5137 entries containing all attributes provided explicitly by the security principal that invoked the operation (but not those automatically generated by the system). Note that similar information also gets recorded if audit of User Account Management or Directory Service Access is enabled.