Your success in Microsoft 70 980 dump is our sole target and we develop all our 70 980 dump braindumps in a way that facilitates the attainment of this target. Not only is our 70 980 vce study material the best you can find, it is also the most detailed and the most updated. 70 980 vce Practice Exams for Microsoft 70 980 pdf are written to the highest standards of technical accuracy.

Q21. - (Topic 6) 

You need to recommend changes to the existing environment to meet the PII requirement. What should you recommend? 

A. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates from ProsewareCA. 

B. Create an AD RMS cluster in Proseware, and then provision the user accounts in Proseware for the Fabrikam users. 

C. Configure Active Directory Federation Services (AD FS) in Fabrikam, and then install a web application proxy in Proseware. 

D. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates from FabrikamCA. 

Answer:


Q22. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. 

All client computers run either Windows 7 or Windows 8. 

The corporate security policy states that all of the client computers must have the latest security updates installed. You need to implement a solution to ensure that only the client computers that have all of 

the required security updates installed can connect to VLAN 1. The solution must ensure 

that all other client computers connect to VLAN 3. 

Solution: You implement the IPsec enforcement method. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q23. - (Topic 9) 

Your company has a main office and a branch office. The main office contains 2,000 users. The branch office contains 800 users. Each office contains three IP subnets. 

The company plans to deploy an Active Directory forest. 

You need to recommend an Active Directory infrastructure to meet the following requirements: 

. Ensure that the users are authenticated by using a domain controller in their respective office. . Minimize the amount of Active Directory replication traffic between the offices. 

Which Active Directory infrastructure should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Two domains and one site 

B. Two domains and two sites 

C. One domain and two sites 

D. One domain and six sites 

Answer:

Explanation: 

To minimize the amount of replication traffic, create 2 sites. http://technet.microsoft.com/en-us/library/bb742457.aspx 


Q24. - (Topic 10) 

Your company has a human resources department and a finance department. 

You are planning an administrative model for both departments to meet the following requirements: 

. Provide human resources managers with the ability to view the audit logs for the files of their department.

. Ensure that only domain administrators can view the audit logs for the files of the finance department. 

You need to recommend a solution for the deployment of file servers for both departments. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Deploy one file server. Add the human resources managers to the local Administrators group. 

B. Deploy one file server. Add the human resources managers to the local Event Log Readers group. 

C. Deploy two file servers. Add the human resources managers to the local Administrators group on one of the servers. 

D. Deploy two file servers. Add the human resources managers to the local Event Log Readers group on one of the servers. 

Answer:


Q25. - (Topic 10) 

Your company has 10,000 users located in 25 different sites. 

All servers run Windows Server 2012. All client computers run either Windows 7 or Windows 8. 

You need to recommend a solution to provide self-service password reset for all of the users. 

What should you include in the recommendation? 

A. The Microsoft System Center 2012 Service Manager Self-Service Portal and Microsoft System Center 2012 Orchestrator runbooks 

B. Microsoft System Center 2012 Operations Manager management packs and Microsoft System Center 2012 Configuration Manager collections 

C. The Microsoft System Center 2012 Service Manager Self-Service Portal and Microsoft System Center 2012 Operation Manager management packs 

D. Microsoft System Center 2012 App Controller and Microsoft System Center 2012 Orchestrator runbooks 

Answer:


Q26. - (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q27. - (Topic 10) 

Your network contains the following roles and applications: 

Microsoft SQL Server 2012 

Distributed File System (DFS) Replication 

Active Directory Domain Services (AD DS) 

Active Directory Rights Management Services (AD RMS) 

Active Directory Lightweight Directory Services (AD LDS) 

You plan to deploy Active Directory Federation Services (AD FS). 

You need to identify which deployed services or applications can be used as attribute stores for the planned AD FS deployment. 

What should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. DFS 

B. AD RMS 

C. Microsoft SQL Server 2012 

D. AD LDS 

E. AD DS 

Answer: C,D,E 


Q28. DRAG DROP - (Topic 10) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are members of a failover cluster. 

The network contains a Storage Area Network (SAN) that has a LUN named LUN1. LUN1 is connected to a 12-TB disk on the SAN. 

You plan to host three new virtual machines on the failover cluster. Each virtual machine will store up to 4 TB of data on a single disk. The virtual machines will be backed up from the hosts by using the Volume Shadow Copy Service (VSS). 

You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q29. - (Topic 10) 

Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM) server named Server1. 

You use Server1 to manage 20 Hyper-V hosts. 

The network also contains five Citrix XenServer virtualization hosts. 

You need to recommend which installation is required to manage the XenServer servers from Server1. 

What should you recommend installing? 

A. The Citrix XenServer - Microsoft System Center Integration Pack on the Citrix XenServer hosts 

B. The Citrix XenServer - Microsoft System Center Integration Pack on Server1 

C. Citrix Essentials for Hyper-V on Server1 

D. Citrix Essentials for Hyper-V on the Citrix XenServer hosts 

Answer:


Q30. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. Client computers run either Windows 7 or Windows 8. 

You plan to implement several Group Policy settings that will apply only to laptop 

computers. 

You need to recommend a Group Policy strategy for the planned deployment. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Loopback processing 

B. WMI filtering 

C. Security filtering 

D. Block inheritance 

Answer:

Explanation: 

http://www.discoposse.com/index.php/2012/04/05/group-policy-wmi-filter-laptop-or-desktop-hardware/ Another method to detect hardware as laptop only is to look for the presence of a battery based on the BatteryStatus property of the Win32_Battery class. By using the Win32_Battery class, we can search to see if there is a battery present. If the battery status is not equal to zero (BatteryStatus <> 0 ) then you know that it is a laptop.