Apr 2021 updated: Ucertify Microsoft 70-980 vce 31-40


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-980 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-980-exam-dumps.html

Q31. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. 

Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2. 

The certification authority (CA) infrastructure of both companies is configured as shown in the following table. 

You need to recommend a certificate solution that meets the following requirements: 

. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com. 

. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com. 

What should you include in the recommendation? 

A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

Answer:


Q32. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains 10 sites. The sites are located in different cities and connect to each other by using low-latency WAN links. 

In each site, you plan to implement Microsoft System Center 2012 Configuration Manager and to deploy multiple servers. 

You need to recommend which Configuration Manager component must be deployed to each site for the planned deployment. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. A management point 

B. A software update point 

C. A distribution group point 

D. A secondary site server that has all of the Configuration Manager roles installed 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh427335.aspx Distribution point groups provide a logical grouping of distribution points and collections for content distribution. A Distribution point group is not limited to distribution points from a single site, and can contain one or more distribution points from any site in the hierarchy. When you distribute content to a distribution point group, all distribution points that are members of the distribution point group receive the content. 


Q33. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. 

The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. 

You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement. 

What should you include in the recommendation? 

A. Set the ISATAP State to state enabled. 

B. Enable split tunneling. 

C. Set the ISATAP State to state disabled. 

D. Enable force tunneling. 

Answer:

Explanation: 

http://blogs.technet.com/b/csstwplatform/archive/2009/12/15/directaccess-how-to-configure-forcetunneling-forda-so-that-client-are-forced-to-use-ip-https.aspx You can configure DirectAccess clients to send all of their traffic through the tunnels to the DirectAccess server with force tunneling. When force tunneling is configured, DirectAccess clients that detect that they are on the Internet modify their IPv4 default route so that default route IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the DirectAccess server. 


Q34. DRAG DROP - (Topic 9) 

Your network contains an Active Directory forest named corp.contoso.com. All servers run Windows Server 2012. 

The network has a perimeter network that contains servers that are accessed from the Internet by using the contoso.com namespace. 

The network contains four DNS servers. The servers are configured as shown in the following table. 

All of the client computers on the perimeter network use Server1 and Server2 for name resolution. 

You plan to add DNS servers to the corp.contoso.com domain. 

You need to ensure that the client computers automatically use the additional name servers. The solution must ensure that only computers on the perimeter network can resolve names in the corp.contoso.com domain. 

Which DNS configuration should you implement on Server1 and Server2? 

To answer, drag the appropriate DNS configuration to the correct location in the answer area. Each DNS configuration may be used once, more than once, or not at all. 

Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q35. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012. 

The forest contains an Active Directory domain. The domain contains a global security group named GPO_Admins that is responsible for managing Group Policies in the forest. 

A second forest named fabrikam.com contains three domains. The forest functional level is Windows Server 2003. 

You need to design a trust infrastructure to ensure that the GPO_Admins group can create, edit, and link Group Policies in every domain of the fabrikam.com forest. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. A two-way forest trust 

B. A one-way forest trust 

C. Three external trusts 

D. Three shortcut trusts 

Answer:


Q36. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2008 R2. All domain controllers are installed on physical servers. The network contains several Hyper-V hosts. 

The network contains a Microsoft System Center 2012 infrastructure. 

You plan to use domain controller cloning to deploy several domain controllers that will run Windows Server 2012. 

You need to recommend which changes must be made to the network infrastructure before you can use domain controller cloning. 

What should you recommend? 

A. Upgrade a global catalog server to Windows Server 2012. Deploy Virtual Machine Manager (VMM). 

B. Upgrade a global catalog server to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012. 

C. Upgrade the domain controller that has the PDC emulator operations master role to Windows Server 2012. Deploy a Hyper-V host that runs Windows Server 2012. 

D. Upgrade the domain controller that has the infrastructure master operations master role to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012. 

Answer:


Q37. - (Topic 3) 

You need to recommend an IPAM management solution for the Operators groups. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. Add the computers used by the members of the Operators group to the IPAM server. 

B. Modify the membership of the IPAM Administrators group and the WinRMRemoteWMIUsers_ group on the IPAM server. 

C. Run the Set-IpamConfigurationcmdlet and modify the membership of the WinRMRemoteWMRJsers_ group on the IPAM server. 

D. Run the Set-IpamConfigurationcmdlet on the IPAM server. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. 

Answer:

Explanation: 

D:Documents and SettingsuseralboDesktop1.jpg 


Q38. - (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q39. - (Topic 2) 

You run the Get-DNSServercmdlet on DC01 and receive the following output: 

You need to recommend changes to DC01. Which attribute should you recommend modifying? 

A. EnablePollutionProtection 

B. isReadOnly 

C. Locking Percent 

D. ZoneType 

Answer:


Q40. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. The forest contains multiple servers that run Windows Server 2012. The network contains 1,000 client computers that run Windows 7. Two hundred remote users have laptop computers and only work from home. 

The network does not provide remote access to users. 

You need to recommend a monitoring solution to meet the following requirements: 

Generate a list of updates that are applied successfully to all computers. 

Minimize the amount of bandwidth used to download updates. 

An administrator must approve the installation of an update on any client computer. 

What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Microsoft Asset Inventory Service (AIS) 

B. Windows InTune 

C. Windows Server Update Services (WSUS) 

D. Active Directory Federation Services (AD FS) 

E. Microsoft System Center 2012 Service Manager 

Answer: A,B,C