70-980 Premium Bundle

70-980 Premium Bundle

Recertification for MCSE: Server Infrastructure Certification Exam

4.5 
(37335 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-980 Free Practice Questions

Q1. - (Topic 4) 

You need to recommend an Office 365 integration solution. What should you include in the recommendation? 

A. Active Directory directory synchronization 

B. The Active Directory Migration Tool (ADMT) 

C. Windows Identity Foundation (WIF) 3.5 

D. The Sync Framework Toolkit 

Answer:

Q2. - (Topic 9) 

Your company has a main office that contains several servers and several users. The main 

office contains a file server named Server1 that runs Windows Server 2012. 

The users access a large report file that is created on Server1 each day. 

The company plans to open a new branch office. The branch office will contain only client computers. 

You need to implement a solution to reduce the amount of bandwidth used by the client computers in the branch office to download the report each day. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Install the BranchCache for network files role service on Server1. Configure the client computers to use BranchCache in hosted cache mode. 

B. Configure the offline settings of the shared folder that contains the report. 

C. Install the BranchCache for network files role service on Server1. Configure the client computers to use Branchcache in distributed mode. 

D. Enable the Background Intelligent Transfer Service (BITS) feature on Server1 and on each client computer in the branch office. Move the report to a web folder. 

Answer:

Explanation: 

http://technet.microsoft.com/library/ee649232(WS.10).aspx Distributed cache mode. In this mode, branch office client computers download content from the content servers in the main office and then cache the content for other computers in the same branch office. Distributed cache mode does not require a server computer in the branch office. 

Q3. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q4. - (Topic 4) 

You need to recommend a solution for the replication of Active Directory. 

What should you recommend modifying? 

A. The Active Directory Schema 

B. The properties of Site1 

C. The RODC1 computer account 

D. The properties of Site2 

Answer:

Q5. HOTSPOT - (Topic 4) 

You are evaluating the virtual machine environment. 

In the table below, identify which virtual machines currently support ODX and which virtual machines require a configuration change to support ODX. Make only one selection in each row. 

Answer:  

Q6. DRAG DROP - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008 R2. Server1 is a file server. 

You deploy a new member server named Server2 that runs Windows Server 2012. 

You plan to migrate file shares from Server1 to Server2. File share and NTFS permissions 

are assigned only to domain local groups. 

You need to identify which actions are required to perform the migration. 

Which five actions should you identify? 

To answer, move the five appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q7. - (Topic 9) 

Your network contains an Active Directory domain. 

You plan to implement a remote access solution that will contain three servers that run 

Windows Server 2012. The servers will be configured as shown in the following table. 

Server1 will support up to 200 concurrent VPN connections. 

You need to ensure that all VPN connection requests are authenticated and authorized by either Server2 or Server3. The solution must ensure that the VPN connections can be authenticated if either Server2 or Server3 fails. 

What should you do? 

A. On Server1, configure a RADIUS proxy. On Server2 and Server3, add a RADIUS client. 

B. On Server2 and Server3, add a RADIUS client. On Server1, modify the Authentication settings. 

C. On Server1, configure a RADIUS proxy. Add Server2 and Server3 to a failover cluster. 

D. Add Server2 and Server3 to a Network Load Balancing (NLB) cluster. On Server1, modify the Authentication settings. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc754033.aspx 

Q8. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The Active Directory site topology is configured as shown in the exhibit. (Click the Exhibit button.) 

DC1 and DC2 run Windows Server 2003 R2. All FSMO roles are located on DC2. 

You plan to deploy a read-only domain controller (RODC) to Site3. 

You need to recommend changes to the network to support the planned RODC 

implementation. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. To Site1, add an RODC that runs Windows Server 2012. 

B. Replace DC2 with a domain controller that runs Windows Server 2012. 

C. To Site2, add an RODC that runs Windows Server 2012. 

D. Replace DC1 with a domain controller that runs Windows Server 2012. 

Answer:

Explanation: http://technet.microsoft.com/en-us/library/cc772065%28v=ws.10%29.aspx Each RODC requires a writable domain controller running Windows Server 2008 for the same domain from which the RODC can directly replicate. Typically, this requires that a writable domain controller running Windows Server 2008 be placed in the nearest site in the topology. 

Q9. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,C 

Explanation: 

Creating a New Object: Resulting in multiple Event ID 5137 entries containing all attributes provided explicitly by the security principal that invoked the operation (but not those automatically generated by the system). Note that similar information also gets recorded if audit of User Account Management or Directory Service Access is enabled. 

Q10. DRAG DROP - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts. 

You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table. 

You need to identify which network must be added to each virtual machine. 

Which network types should you identify? 

To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q11. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains four computers that are configured as shown in the following table. 

You plan to use domain controller cloning. 

You need to identify on which computers you can clone domain controllers that run Windows Server 2012. 

Which computers should you identify? (Each correct answer presents part of the solution. 

Choose all that apply.) 

A. Server1 

B. Server2 

C. Server3 

D. Client1 

Answer: A,D 

Explanation: 

DC cloning can be done from either Hyper-V on Server 2012 and Hyper-V on Windows 8. 

Q12. DRAG DROP - (Topic 7) 

You need to prepare for the migration of virtual machines across the Hyper-V hosts of Customer2. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q13. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications: 

. Microsoft Exchange Server 2013 

. Microsoft SQL Server 2014 

System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed. 

You need to recommend a monitoring strategy for the domain that meets the following requirements: 

. A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013. 

. A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. From Operations Manager, enable audit collection. 

B. From Operations Manager, implement two monitors. 

C. From Computer Management, implement one event subscription. 

D. From Operations Manager, implement two rules. 

Answer:

Q14. - (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q15. - (Topic 7) 

You need to recommend a monitoring solution for Northwind Traders. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. Three Operations Manager management servers and two Operations Manager gateway servers 

B. One Operations Manager management server 

C. Two Operations Manager management servers and three Operations Manager gateway servers 

D. Five Operations Manager management servers 

Answer:

START 70-980 EXAM