how to use 70 980 vce

we provide Real Microsoft 70 980 vce exam guide which are the best for clearing 70 980 dump test, and to get certified by Microsoft Recertification for MCSE: Server Infrastructure. The 70 980 vce Questions & Answers covers all the knowledge points of the real exam 70 980 exam. Crack your Microsoft 70 980 dump Exam with latest dumps, guaranteed!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-980 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-980-exam-dumps.html

Q111. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains servers that run either Windows Server 2008 R2 or Windows Server 2012. 

All client computers on the internal network are joined to the domain. Some users establish VPN connections to the network by using Windows computers that do not belong to the domain. 

All client computers receive IP addresses by using DHCP. 

You need to recommend a Network Access Protection (NAP) enforcement method to meet the following requirements: 

Verify whether the client computers have up-to-date antivirus software. 

Provides a warning to users who have virus definitions that are out-of-date. 

Ensure that client computers that have out-of-date virus definitions can connect to 

the network. 

Which NAP enforcement method should you recommend? 

A. DHCP 

B. IPSec 

C. VPN 

D. 802.1x 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc733020(v=ws.10).aspx 

NAP enforcement for DHCP 

DHCP enforcement is deployed with a DHCP Network Access Protection (NAP) enforcement server component, a DHCP enforcement client component, and Network Policy Server (NPS). 

Using DHCP enforcement, DHCP servers and NPS can enforce health policy when a computer attempts to lease or renew an IP version 4 (IPv4) address. However, if client computers are configured with a static IP address or are otherwise configured to circumvent the use of DHCP, this enforcement method is not effective. 


Q112. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings. 

You need to design a Group Policy strategy to meet the following requirements: 

. The security settings in GPO1 must be applied to all client computers. 

. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1. 

B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1. 

C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1. 

D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1. 

Answer:


Q113. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. 

Your company plans to open a branch office. The branch office will have 10 client computers that run Windows 8 and at least one server that runs Windows Server 2012. The server will host 

BranchCache files and manage print queues for the network print devices in the branch office. 

You need to recommend a solution to ensure that the users in the branch office can print if the branch office server fails. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Printer pooling 

B. Branch Office Direct Printing 

C. A standby print server 

D. A print server cluster 

E. A secure Web Services on Devices (WSD) printer 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/jj134156.aspx Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. This feature requires a print server running Windows Server 2012 and clients running Windows 

8. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. 


Q114. - (Topic 9) 

You deploy an Active Directory domain named contoso.com to the network. The domain is configured as an Active Directory-integrated zone. All domain controllers run Windows Server 

2012 and are DNS servers. 

You plan to deploy a child domain named operations.contoso.com. 

You need to recommend changes to the DNS infrastructure to ensure that users in the operations department can access the servers in the contoso.com domain. 

What should you include in the recommendation? 

A. A zone delegation for _msdcs.contoso.com 

B. Changes to the replication scope of contoso.com 

C. Changes to the replication scope of _msdcs.contoso.com 

D. Changes to the replication scope of operations.contoso.com 

Answer:

Explanation: 

http://support.microsoft.com/kb/255248 Manually Create a Delegation for the Child Domain on the Parent (Root) DNS Server 

1. Right-click the root zone, click New Delegation, and then click Next. 

2. Type the domain name for the child domain, and then click Next. 

3. Add the child DNS server to host the new zone, and then click Next. NOTE: A domain controller that is a DNS server should have a static Transport Control Protocol/Internet Protocol (TCP/IP) address. Verify that this step is performed before you install DNS on the child domain controller. If no DNS TCP/IP address exists, DNS is installed as a root server. If you see that a "." folder is created after you install DNS, you must remove the root configuration. For additional information about how to do this, click the article number below to view the article in the Microsoft Knowledge Base: 229840 DNS Server's Root Hints and Forwarder Pages Are Unavailable 

4. On the child domain DNS server, right-click My Network Places, and then click Properties. 

5. Right-click the appropriate local connection, and then click Properties. 

6. Under Components checked are used by this connection, click Internet Protocol (TCP/IP), and then click Properties. 

7. Click Use the following DNS server addresses:, and then type the TCP/IP address of the parent (root) DNS server. 


Q115. - (Topic 10) 

Your network contains five Active Directory forests. 

You plan to protect the resources in one of the forests by using Active Directory Rights 

Management Services (AD RMS). 

Users in all of the forests will access the protected resources. 

You need to identify the minimum number of AD RMS clusters required for the planned 

deployment. 

What should you identify? 

A. Five root clusters 

B. Five licensing clusters 

C. One licensing cluster and five root clusters 

D. One root cluster and five licensing clusters 

Answer:


Q116. - (Topic 9) 

Your company has a main office. 

The network contains an Active Directory domain named contoso.com. The main office contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Access server role installed and is configured to accept incoming SSTP-based VPN connections. 

All client computers run Windows 7. 

The company plans to open a temporary office that will contain a server named Server2 that runs 

Windows Server 2012 and has the DHCP Server server role installed. The office will also have 50 client computers and an Internet connection. 

You need to recommend a solution to provide the users in the temporary office with access to the resources in the main office. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Use the Connection Manager Administration Kit (CMAK) to create a connection package that specifies Server1 as the target for SSTP-based VPN connections. Manually distribute the CMAK package to each client computer in the temporary office. 

B. Install the Remote Access server role on Server2. From Routing and Remote Access on Server2, add a SSTP-based VPN port. From DHCP on Server2, configure the default gateway server option. 

C. Uses the Connection Manager Administration Kit (CMAK) to create a connection package that specifies Server1 as the target for SSTP-based VPN connections. Use a Group Policy object (GPO) to distribute the CMAK package to each client computer in the temporary office. 

D. Install the Remote Access server role on Server2. From Routing and Remote Access on Server2, configure a demand-dial interface. From DHCP on Server2, configure the default gateway server option. 

Answer:

Explanation: 

See link for an article on both Routing and Remote Access server role and the DHCP default gateway option. http://blogs.technet.com/b/rrasblog/archive/2009/03/25/remote-access-deployment-part-2-configuringrras-asa-vpn-server.aspx 


Q117. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network contains two servers named Server1 and Server2. 

You deploy Active Directory Certificate Services (AD CS). The certification authority (CA) is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can issue certificates based on certificate templates. 

What should you do? 

A. On Server1, install the Network Device Enrollment Service role service. 

B. Configure Server2 as a standalone subordinate CA. 

C. On Server1, uninstall, and then reinstall AD CS. 

D. On Server1, run the Add-CertificateEnrollmentPolicyServer cmdlet. 

Answer:

Explanation: In a typical CA infrastructure the Stand-alone CAs are primarily intended to be used as Trusted Offline RootCAs in a CA hierarchy or when extranets and the Internet are involved. In a stand-alone CA Certificatetemplates are not used. An enterprise CA uses certificate types, which are based on a certificate template 


Q118. - (Topic 8) 

You need to recommend a solution to maintain a copy of App2. The solution must meet the application requirements and must minimize additional hardware purchases. 

What should you include in the recommendation? 

A. Single-site Failover Clustering 

B. Hyper-V replicas 

C. Multi-site Failover Clustering 

D. Distributed File System (DFS) Replication 

Answer:


Q119. - (Topic 3) 

You need to recommend a remote access solution that meets the VPN requirements. 

Which role service should you include in the recommendation? 

A. Routing 

B. Network Policy Server 

C. DirectAccess and VPN (RAS) 

D. Host Credential Authorization Protocol 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Updated: March 29, 2012 Applies To: Windows Server 2008 R2, Windows Server 2012 Network Policy Server Network Policy Server (NPS) allows you to create and enforce organization-wide network access policies for client health, connection request authentication, and connection request authorization. In addition, you can use NPS as a Remote Authentication Dial-In User Service (RADIUS) proxy to forward connection requests to a server running NPS or other RADIUS servers that you configure in remote RADIUS server groups. NPS allows you to centrally configure and manage network access authentication, authorization, are client health policies with the following three features: RADIUS server. NPS performs centralized authorization, authorization, and accounting for wireless, authenticating switch, remote access dial-up and virtual private network (VNP) connections. When you use NPS as a RADIUS server, you configure network access servers, such as wireless access points and VPN servers, as RADIUS clients in NPS. You also configure network policies that NPS uses to authorize connection requests, and you can configure RADIUS accounting so that NPS logs accounting information to log files on the local hard disk or in a Microsoft SQL Server database. For more information, see RADIUS Server. http://technet.microsoft.com/en-us/library/cc732912.aspx 


Q120. DRAG DROP - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server. 

You plan to delegate the administration of IPAM as shown in the following table. 

You need to recommend which IPAM security group must be used for each department. The solution must minimize the number of permissions assigned to each group. 

What should you recommend? 

To answer, drag the appropriate group to the correct department in the answer area. Each group may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: