Our pass rate is high to 98.9% and the similarity percentage between our 70 980 dump study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft exam 70 980 exam in just one try? I am currently studying for the Microsoft exam 70 980 exam. Latest Microsoft 70 980 dump Test exam practice questions and answers, Try Microsoft 70 980 dump Brain Dumps First.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-980 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-980-exam-dumps.html
Q61. HOTSPOT - (Topic 10)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine Manager (VMM) is deployed to the domain.
In VMM, you create a host group named HostGroup1. You add a 16-node Hyper-V failover cluster to HostGroup1. From Windows PowerShell, you run the following commands:
Use the drop-down menus to select the answer choice that completes each statement.
Answer:
Q62. - (Topic 9)
Your network contains an Active Directory domain named contoso.com.
You deploy several servers that have the Remote Desktop Session Host role service installed.
You have two organizational units (OUs). The OUs are configured as shown in the following table.
GPO1 contains the Folder Redirection settings for all of the users.
You need to recommend a solution to prevent the sales users' folders from being redirected when the users log on to a Remote Desktop session.
What should you include in the recommendation?
A. FromGPO2, set the loopback processing mode.
B. From GPO1, set the loopback processing mode.
C. Configure security filtering for GPO1.
D. Apply a WMI filter to GPO2.
Answer: A Explanation:
http://support.microsoft.com/kb/231287
Q63. - (Topic 10)
Your network contains an Active Directory domain named contoso.com.
You plan to implement Microsoft System Center 2012.
You need to identify which solution automates the membership of security groups for contoso.com. The solution must use workflows that provide administrators with the ability to
approve the addition of members to the security groups.
Which System Center 2012 roles should you identify?
A. Configuration Manager and Orchestrator
B. Service Manager and Virtual Machine Manager (VMM)
C. Orchestrator and Service Manager
D. Operations Manager and Orchestrator
Answer: C
Q64. - (Topic 6)
You need to recommend changes to the existing environment to meet the web server requirement.
Which two actions should you recommend? Each correct answer presents part of the solution.
A. On one web server, run the Start-DSCConfiguration cmdlet. Create and run a configuration script.
B. On all of the web servers, install the Windows PowerShell Web Access feature, and then run the Set-DscLocalConfigurationManager cmdlet.
C. On all of the web servers, configure the Local Configuration Manager settings, and then run the Set-DscLocalConfigurationManager cmdlet.
D. On one web server, install the Windows PowerShell Desired State Configuration (DSC)
feature. Create and run a configuration script.
Answer: C,D
Q65. - (Topic 9)
Your company has a main office and four branch offices. The main office is located in London.
The network contains an Active Directory domain named contoso.com. The network is configured as shown in the exhibit. (Click the Exhibit button.)
Each office contains several servers that run Windows Server 2012.
In each branch office, you plan to deploy an additional 20 servers that will run Windows Server 2012. Some of the servers will have a Server Core installation of Windows Server 2012.
You identify the following requirements for the deployment of the new servers:
Operating system images must be administered centrally.
The operating system images must be deployed by using PXE.
The WAN traffic caused by the deployment of each operating system must be
minimized.
You need to recommend a solution for the deployment of the new servers.
What should you recommend?
Exhibits
A. Deploy Windows Deployment Services (WDS) in each office. Replicate the images by using Distributed File System (DFS) Replication,
B. Deploy Windows Deployment Services (WDS) in the main office only. Replicate the images by using Distributed File System (DFS) Replication.
C. Deploy Windows Deployment Services (WDS) in each office. Copy the images by using BranchCache.
D. Deploy Windows Deployment Services (WDS) in the main office only. Copy the images by using BranchCache.
Answer: A
Q66. - (Topic 8)
You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements.
Solution: You recommend a scale-out file server that uses an NFS share.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q67. - (Topic 6)
You need to ensure that RESEARCH1 only contains the required virtual machines.
What should you do?
A. Create an availability set.
B. Create a custom placement rule.
C. Set RESEARCH1 as a possible owner.
D. Set RESEARCH1 as a preferred owner.
Answer: B
Q68. DRAG DROP - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1.
Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q69. DRAG DROP - (Topic 9)
Your network contains an Active Directory forest named corp.contoso.com. All servers run Windows Server 2012.
The network has a perimeter network that contains servers that are accessed from the Internet by using the contoso.com namespace.
The network contains four DNS servers. The servers are configured as shown in the following table.
All of the client computers on the perimeter network use Server1 and Server2 for name resolution.
You plan to add DNS servers to the corp.contoso.com domain.
You need to ensure that the client computers automatically use the additional name servers. The solution must ensure that only computers on the perimeter network can resolve names in the corp.contoso.com domain.
Which DNS configuration should you implement on Server1 and Server2?
To answer, drag the appropriate DNS configuration to the correct location in the answer area. Each DNS configuration may be used once, more than once, or not at all.
Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q70. - (Topic 2)
You need to recommend a trust model.
What should you include in the recommendation?
A. A one-way, forest trust that has selective authentication.
B. A one-way, external trust
C. A two-way, external trust
D. A one-way, forest trust that has domain-wide authentication.
Answer: A
Explanation:
From case study:
Users in the Montreal office must only be allowed to access shares that are located on
File01 and File02. The Montreal users must be prevented from accessing any other servers
in the proseware.com forest regardless of the permissions on the resources.