Cause all that matters here is passing the Microsoft 70 980 vce exam. Cause all that you need is a high score of exam 70 980 Recertification for MCSE: Server Infrastructure exam. The only one thing you need to do is downloading Testking 70 980 dump exam study guides now. We will not let you down with our money-back guarantee.
Q131. - (Topic 7)
You need to recommend a monitoring solution for Northwind Traders.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Three Operations Manager management servers and two Operations Manager gateway servers
B. One Operations Manager management server
C. Two Operations Manager management servers and three Operations Manager gateway servers
D. Five Operations Manager management servers
Q132. - (Topic 5)
You are planning the deployment of System Center 2012 Virtual Machine Manager (VMM).
You need to identify which additional System Center 2012 product is required to meet the virtualization requirements.
What should you include in the recommendation?
A. App Controller
B. Operations Manager
C. Configuration Manager
D. Service Manager
Topic 6, Proseware Inc (B)
Proseware Inc., is a manufacturing company that has 4,000 employees.
Proseware works with a trading partner named Fabrikam, Inc.
Proseware has a main office and two branch offices. The main office is located in London. The branch offices are located in Madrid and Berlin. Proseware has a sales department based in the London office and a research department based in the Berlin office. The offices connect to each other by using a WAN link. Each office connects directly to the Internet.
Proseware rents space at a hosting company. All offices have a dedicated WAN link to the hosting company. Web servers that are accessible from the Internet are located at the hosting company.
The Proseware network contains an Active Directory forest named proseware.com. The forest contains a single domain. The forest functional level is Windows Server 2012.
Each office contains three domain controllers. An Active Directory site is configured for each office.
System state backups are performed every day on the domain controllers by using System Center 2012 R2 Data Protection Manager (DPM).
Proseware has Hyper-V hosts that run Windows Server 2012 R2. Each Hyper-V host manages eight to ten virtual machines. The Hyper-V hosts are configured as shown in the following table.
All of the Hyper-V hosts store virtual machines on direct-attached storage (DAS).
All servers run Windows Server 2012 R2. All of the servers are virtualized, except for the Hyper-V hosts.
VDI1 and VDI2 use locally attached storage to host virtual hard disk (VHD) files. The VHDs use the .vhd format.
A line-of-business application named SalesApp is used by the sales department and runs on a server named APP1. APP1 is hosted on HyperV2.
A server named CA1 has the Active Directory Certificate Services server role installed and is configured as an enterprise root certification authority (CA) named ProsewareCA.
Ten load-balanced web servers hosted on HyperV7 and HyperV8 run the Internet-facing web site that takes orders from Internet customers.
System Center 2012 R2 Operations Manager is used to monitor the health of the servers on the network.
All of the servers are members of the proseware.com domain, except for the servers located in the perimeter network.
All client computers run either Windows 8.1 or Windows 7. Some of the users in the London office connect to pooled virtual desktops hosted on VDI1 and VDI2.
Proseware identifies the following issues on the network:
Virtualization administrators report that the load on the Hyper-V hosts is inconsistent. The virtualization administrators also report that administrators fail to account for host utilization when creating new virtual machines.
Users in the sales department report that they experience issues when they attempt to access SalesApp from any other network than the one in the London office.
Sometimes, configuration changes are not duplicated properly across the web servers, resulting in customer ordering issues. Web servers are regularly changed.
Demand for virtual desktops is increasing. Administrators report that storage space is becoming an issue as they want to add more virtual machines.
In the past, some personally identifiable information (PII) was exposed when paper shredding procedures were not followed.
Proseware plans to implement the following changes on the network: Implement a backup solution for Active Directory. Relocate the sales department to the Madrid office. Implement System Center 2012 R2 components, as required. Protect email attachments sent to Fabrikam that contain PII data so that the attachments cannot be printed. Implement System Center 2012 R2 Virtual Machine Manager (VMM) to manage the virtual machine infrastructure. Proseware does not plan to use private clouds in the near future. Deploy a new Hyper-V host named RESEARCH1 to the Berlin office. RESEARCH1 will be financed by the research department. All of the virtual machines deployed to RESEARCH1 will use VMM templates.
Proseware identifies the following virtualization requirements:
. The increased demand for virtual desktops must be met.
. Once System Center is deployed, all of the Hyper-V hosts must be managed by using VMM.
. If any of the Hyper-V hosts exceeds a set number of virtual machines, an administrator must be notified by email.
. Network administrators in each location must be responsible for managing the Hyper-V hosts in their respective location. The management of the hosts must be performed by using VMM.
. The network technicians in each office must be able to create virtual machines in their respective office. The network technicians must be prevented from modifying the host server settings.
. New virtual machines must be deployed to RESEARCH1 only if the virtual machine template used to create the machine has a value specified for a custom property named CostCenter' that matches Research'.
The web site configurations must be identical on all web servers.
Proseware identifies the following security requirements:
. All email messages sent to and from Fabrikam must be encrypted by using digital certificates issued to users by the respective CA of their company. No other certificates must be trusted between the organizations.
. Microsoft Word documents attached to email messages sent from Proseware to Fabrikam must be protected.
. Privileges must be minimized, whenever possible.
Q133. - (Topic 10)
Your network contains a Hyper-V cluster named Cluster1.
You install Microsoft System Center 2012 Virtual Machine Manager (VMM).
You create a user account for another administrator named User1.
You plan to provide User1 with the ability to manage only the virtual machines that User1
You need to identify what must be created before you delegate the required permissions.
What should you identify?
A. A service template
B. A Delegated Administrator
C. A cloud
D. A host group
Q134. - (Topic 10)
Your network contains multiple servers that run Windows Server 2012.
The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections.
You have two failover clusters. The failover clusters are configured as shown in the following table.
Only the members of Cluster1 can connect to the SAN.
You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder.
You need to ensure that the VHD files of the virtual machines can be stored on the SAN.
What should you do? (Each correct answer presents a complete solution. Choose all that apply.)
A. From a node in Cluster2, create a Virtual Fibre Channel SAN.
B. From a node in Cluster1, create a Virtual Fibre Channel SAN.
C. From Cluster1, add the iSCSI Target Server cluster role.
D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type.
* After the virtual machines are connected to the storage system using the virtual Fibre Channel components shared storage can be used by each VM, which enables Hyper-V guest clustering. Before the virtual Fibre Channel features were available, Hyper-V guest machines were limited to iSCSI connections to enable shared storage for guest clustering.
* A new feature in Windows Server 2012 Hyper-V is the ability to create a virtual Fibre Channel SAN. Each guest VM created on Windows Server 2012 includes a new option Add hardware Fibre Channel cards, which can be attributed to World Wide node names (WWNN) and select the virtual combine Virtual SAN Fibre Channel adapters.
Q135. DRAG DROP - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1.
Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Q136. - (Topic 10)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches.
Does this meet the goal?
Q137. - (Topic 9)
Your company has two divisions named Division1 and Division2.
The network contains an Active Directory domain named contoso.com. The domain
contains two child domains named divisionl.contoso.com and division2.contoso.com.
The company sells Division1 to another company.
You need to prevent administrators in contoso.com and division2.contoso.com from gaining
administrative access to the resources in divisionl.contoso.com. What should you recommend?
A. Create a new tree in the forest named contoso.secure. Migrate the resources and the accounts in divisionl.contoso.com to contoso.secure.
B. On the domain controller accounts in divisionl.contoso.com, deny the Enterprise Admins group the Allowed to Authenticate permission.
C. Create a new forest and migrate the resources and the accounts in divisionl.contoso.com to the new forest.
D. In divisionl.contoso.com, remove the Enterprise Admins group from the Domain Admins group and remove the Enterprise Admins group from the access control list (ACL) on the divisionl.contoso.com domain object.
Q138. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess.
The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network.
You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement.
What should you include in the recommendation?
A. Set the ISATAP State to state enabled.
B. Enable split tunneling.
C. Set the ISATAP State to state disabled.
D. Enable force tunneling.
http://blogs.technet.com/b/csstwplatform/archive/2009/12/15/directaccess-how-to-configure-forcetunneling-forda-so-that-client-are-forced-to-use-ip-https.aspx You can configure DirectAccess clients to send all of their traffic through the tunnels to the DirectAccess server with force tunneling. When force tunneling is configured, DirectAccess clients that detect that they are on the Internet modify their IPv4 default route so that default route IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the DirectAccess server.
Q139. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The network contains a perimeter network. The perimeter network and the internal network are separated by a firewall.
On the perimeter network, you deploy a server named Server1 that runs Windows Server 2012.
You deploy Active Directory Certificate Services (AD CS).
Each user is issued a smart card.
Users report that when they work remotely, they are unable to renew their smart card certificate.
You need to recommend a solution to ensure that the users can renew their smart card certificate from the Internet.
What should you recommend implementing on Server1?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role service
B. The Active Directory Federation Services server role
C. An additional certification authority (CA) and the Online Responder role service
D. The Certification Authority Web Enrollment role service and the Online Responder role service
Q140. - (Topic 9)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server server role installed.
You configure Server1 as part of a Network Access Protection (NAP) solution that uses the
802.lx enforcement method,
You add a new switch to the network and you configure the switch to use 802.lx authentication.
You need to ensure that only compliant client computers can access network resources through the new switch.
What should you do on Server1?
A. Add the IP address of each new switch to a remediation server group.
B. Add the IP address of each new switch to the list of RADIUS clients.
C. Add the IP address of each new switch to a connection request policy as an Access Client IPv4 Address.
D. Add the IP address of each new switch to a remote RADIUS server group.