15 tips on 70-515 video training

100% Correct of 70-980 free download materials and pdf for Microsoft certification for IT professionals, Real Success Guaranteed with Updated 70-980 pdf dumps vce Materials. 100% PASS Recertification for MCSE: Server Infrastructure exam Today!

2016 Apr 70-980 Study Guide Questions:

Q136. - (Topic 1) 

You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation? 

A. Microsoft Baseline Security Analyzer (MBSA) 

B. Microsoft Desktop Optimization Pack (MDOP) 

C. Microsoft System Center 2012 Operations Manager 

D. Microsoft System Center 2012 Data Protection Manager (DPM) 

Answer: B 

Explanation: 


D:\Documents and Settings\useralbo\Desktop\1.jpg 

Microsoft Desktop Optimization Pack Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution. What is the Microsoft Desktop Optimization Pack? The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services. MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies— available only to Windows Software Assurance customers. http://technet.microsoft.com/en-us/library/cc507880.aspx 


Q137. - (Topic 9) 

Your company has a main office and a branch office. 

The network contains an Active Directory domain named contoso.com. The main office contains domain controllers that run Windows Server 2012. The branch office contains a read-only domain controller (RODC) that runs Windows Server 2012. 

You need to recommend a solution to control which Active Directory attributes are replicated to the RODC. 

What should you include in the recommendation? 

A. The partial attribute set 

B. The filtered attribute set 

C. Application directory partitions 

D. Constrained delegation 

Answer: B 


Q138. - (Topic 10) 

Your network contains multiple servers that run Windows Server 2012. 

The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections. 

You have two failover clusters. The failover clusters are configured as shown in the following table. 


Only the members of Cluster1 can connect to the SAN. 

You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder. 

You need to ensure that the VHD files of the virtual machines can be stored on the SAN. 

What should you do? (Each correct answer presents a complete solution. Choose all that apply.) 

A. From a node in Cluster2, create a Virtual Fibre Channel SAN. 

B. From a node in Cluster1, create a Virtual Fibre Channel SAN. 

C. From Cluster1, add the iSCSI Target Server cluster role. 

D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type. 

Answer: C,D 

Explanation: 

* After the virtual machines are connected to the storage system using the virtual Fibre Channel components shared storage can be used by each VM, which enables Hyper-V guest clustering. Before the virtual Fibre Channel features were available, Hyper-V guest machines were limited to iSCSI connections to enable shared storage for guest clustering. 

* A new feature in Windows Server 2012 Hyper-V is the ability to create a virtual Fibre Channel SAN. Each guest VM created on Windows Server 2012 includes a new option Add hardware Fibre Channel cards, which can be attributed to World Wide node names (WWNN) and select the virtual combine Virtual SAN Fibre Channel adapters. 


Q139. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains four computers that are configured as shown in the following table. 

You plan to use domain controller cloning. 

You need to identify on which computers you can clone domain controllers that run Windows Server 2012. 

Which computers should you identify? (Each correct answer presents part of the solution. 

Choose all that apply.) 

A. Server1 

B. Server2 

C. Server3 

D. Client1 

Answer: A,D 

Explanation: 

DC cloning can be done from either Hyper-V on Server 2012 and Hyper-V on Windows 8. 


Q140. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications: 

. Microsoft Exchange Server 2013 

. Microsoft SQL Server 2014 

System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed. 

You need to recommend a monitoring strategy for the domain that meets the following requirements: 

. A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013. 

. A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. From Operations Manager, enable audit collection. 

B. From Operations Manager, implement two monitors. 

C. From Computer Management, implement one event subscription. 

D. From Operations Manager, implement two rules. 

Answer: D 


70-980 exam price

Abreast of the times latest dumps for mcts 70-515:

Q141. DRAG DROP - (Topic 4) 

You need to recommend a solution for managing Windows Azure. 

Which three actions should you recommend performing in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Q142. - (Topic 6) 

You need to recommend changes to the existing environment to meet the web server requirement. 

Which two actions should you recommend? Each correct answer presents part of the solution. 

A. On one web server, run the Start-DSCConfiguration cmdlet. Create and run a configuration script. 

B. On all of the web servers, install the Windows PowerShell Web Access feature, and then run the Set-DscLocalConfigurationManager cmdlet. 

C. On all of the web servers, configure the Local Configuration Manager settings, and then run the Set-DscLocalConfigurationManager cmdlet. 

D. On one web server, install the Windows PowerShell Desired State Configuration (DSC) 

feature. Create and run a configuration script. 

Answer: C,D 


Q143. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2008 R2. All domain controllers are installed on physical servers. The network contains several Hyper-V hosts. 

The network contains a Microsoft System Center 2012 infrastructure. 

You plan to use domain controller cloning to deploy several domain controllers that will run Windows Server 2012. 

You need to recommend which changes must be made to the network infrastructure before you can use domain controller cloning. 

What should you recommend? 

A. Upgrade a global catalog server to Windows Server 2012. Deploy Virtual Machine Manager (VMM). 

B. Upgrade a global catalog server to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012. 

C. Upgrade the domain controller that has the PDC emulator operations master role to Windows Server 2012. Deploy a Hyper-V host that runs Windows Server 2012. 

D. Upgrade the domain controller that has the infrastructure master operations master role to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012. 

Answer: C 


Q144. HOTSPOT - (Topic 4) 

On Server2, you create a Run As Account named Account1. Account1 is associated to an Active Directory account named VMMIPAM. 

You need to implement an IPAM solution. 

What should you do? To answer, select the appropriate configuration for each server in the answer area. 



Answer: 



Q145. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network contains a perimeter network. The perimeter network and the internal network are separated by a firewall. 

On the perimeter network, you deploy a server named Server1 that runs Windows Server 2012. 

You deploy Active Directory Certificate Services (AD CS). 

Each user is issued a smart card. 

Users report that when they work remotely, they are unable to renew their smart card certificate. 

You need to recommend a solution to ensure that the users can renew their smart card certificate from the Internet. 

What should you recommend implementing on Server1? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role service 

B. The Active Directory Federation Services server role 

C. An additional certification authority (CA) and the Online Responder role service 

D. The Certification Authority Web Enrollment role service and the Online Responder role service 

Answer: A 


70-980 pdf exam

Free 2013 dumps for 70-515:

Q146. DRAG DROP - (Topic 7) 

You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Topic 8, A.Datum Corporation 

Overview 

A. Datum Corporation is an accounting company. 

The company has a main office and two branch offices. The main office is located in Miami. 

The branch offices are located in New York and Seattle. 

Existing Environment 

Network Infrastructure 

The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2. The main office has the following servers and client computers: 

Two domain controllers configured as DNS servers and DHCP servers 

One file server that has multiples shares 

One thousand client computers that run Windows 7 

Each branch office has the following servers and client computers: 

One domain controller configured as a DNS server and a DHCP server 

Five hundred to 800 client computers that run Windows XP 

Each office has multiple subnets. The network speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a WAN link. The main office is connected to the Internet. 

Current Issues 

The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link will not be replaced for another year. 

Requirements 

Application Requirements 

The company is developing an application named App1. App1 is a multi-tier application that will be sold as a service to customers. 

Each instance of App1 is comprised of the following three tiers: 

A web front end 

A middle tier that uses Windows Communication Foundation (WCF) 

A Microsoft SQL Server 2008 R2 database on the back end 

Each tier will be hosted on one or more virtual machines. Multiple tiers cannot coexist on the same virtual machine. 

When customers purchase App1, they can select from one of the following service levels: 

Standard: Uses a single instance of each virtual machine required by App1. If a virtual machine becomes unresponsive, the virtual machine must be restarted. Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and fault tolerance. 

All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server fails. 

You plan to deploy an application named App2. App2 is comprised of the following two tiers: 

A web front end 

A dedicated SQL Server 2008 R2 database on the back end 

App2 will be hosted on a set of virtual machines in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the App2 virtual machines will be maintained in the Seattle office. 

App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory Federation Services server role and all of the Active Directory Federation Services (AD FS) role services installed. 

Planned Changes 

A. Datum plans to implement the following changes: 

Replace all of the servers with new servers that run Windows Server 2012. 

Implement a private cloud by using Microsoft System Center 2012 to host instances of App1. 

In the Miami office, deploy four new Hyper-V hosts to the perimeter network. 

In the Miami office, deploy two new Hyper-V hosts to the local network. 

In the Seattle office, deploy two new Hyper-V hosts. 

In the Miami office, implement a System Center 2012 Configuration Manager primary site that has all of the system roles installed. 

Implement a public key infrastructure (PKI). 

Notification Requirements 

A. Datum identifies the following notification requirements: 

Help desk tickets must be created and assigned automatically when an instance of App1 becomes unresponsive. Customers who select the Enterprise service level must receive an email notification each time a help desk ticket for their instance of App1 is opened or closed. 

Technical Requirements 

A. Datum identifies the following technical requirements: 

Minimize costs whenever possible. 

Minimize the amount of WAN traffic 

Minimize the amount of administrative effort whenever possible. 

Provide the fastest possible failover for the virtual machines hosting App2. 

Ensure that administrators can view a consolidated report about the software updates in all of the offices. 

Ensure that administrators in the Miami office can approve updates for the client computers in all of the offices. 

Security Requirements 

A. Datum identifies the following security requirements: 

An offline root certification authority (CA) must be configured. 

Client computers must be issued certificates by a server in their local office. 

Changes to the CA configuration settings and the CA security settings must be logged. 

Client computers must be able to renew certificates automatically over the Internet. 

The number of permissions and privileges assigned to users must be minimized whenever possible. 

. Users from a group named Group1 must be able to create new instances of App1 in the private cloud. 

. Client computers must be issued new certificates when the computers are connected to the local network only. 

. The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker). 

. Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com. 


Q147. HOTSPOT - (Topic 9) 

Your network contains an Active Directory forest named northwindtraders.com. 

The client computers in the finance department run either Windows 8.1, Windows 8, or Windows 7. All of the client computers in the marketing department run Windows 8.1. 

You need to design a Network Access Protection (NAP) solution for northwindtraders.com that meets the following requirements: 

. The client computers in the finance department that run Windows 7 must have a firewall enabled and the antivirus software must be up-to-date. 

. The finance computers that run Windows 8.1 or Windows 8 must have automatic updating enabled and the antivirus software must be up-to-date. 

. The client computers in the marketing department must have automatic updating enabled and the antivirus software must be up-to-date. 

. If a computer fails to meet its requirements, the computers must be provided access to a limited set of resources on the network. 

. If a computer meets its requirements, the computer must have full access to the network. 

What is the minimum number of objects that you should create to meet the requirements? To answer, select the appropriate number for each object type in the answer area. 



Answer: 



Q148. - (Topic 9) 

Your company is a hosting provider that provides cloud-based services to multiple customers. 

Each customer has its own Active Directory forest located in your company's datacenter. 

You plan to provide VPN access to each customer. The VPN solution will use RADIUS for authentication services and accounting services. 

You need to recommend a solution to forward authentication and accounting messages from the perimeter network to the Active Directory forest of each customer. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. One RADIUS proxy for each customer and Active Directory Federation Services (AD FS) 

B. A RADIUS server for each customer and one RADIUS proxy 

C. One RADIUS proxy and one Active Directory Lightweight Directory Services (AD LDS) instance for each customer 

D. A RADIUS server for each customer and a RADIUS proxy for each customer 

Answer: B 


Q149. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. 

You need to issue a certificate to users to meet the following requirements: 

. Ensure that the users can encrypt files by using Encrypting File System (EFS). 

. Ensure that all of the users reenroll for their certificate every six months. 

Solution: From the properties of the Basic EFS template, you assign the Allow - Enroll permission to the Authenticated Users group. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: B 


Q150. HOTSPOT - (Topic 10) 

Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami. 

Users access all of the web-based resources by using web proxy servers. The IP addresses of the web proxies at each office are configured as shown in the following table. 


The connections to the web proxies are balanced by using round-robin DNS. 

The company plans to deploy a new application. The new application has a farm of front-end web servers that connect to a back-end application server. When a session to a web server is established, the web server stores data until the session closes. Once the session closes, the data is sent to the application server. 

You need to ensure that the incoming sessions to the web server farm are distributed among the web servers. The solution must ensure that if a web server fails, the users are NOT directed to the failed server. 

How should you configure the port rule? To answer, select the appropriate options in the answer area. 



Answer: 




see more 70-980 - Recertification for MCSE: Server Infrastructure

Microsoft 70-980 Certification Sample Questions and Answers: http://www.braindumpsall.net/70-980-dumps/

P.S. New 70-980 dumps PDF: http://www.4easydumps.com/70-980-dumps-download.html