70-980 Premium Bundle

70-980 Premium Bundle

Recertification for MCSE: Server Infrastructure Certification Exam

4.5 
(10845 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-980 Free Practice Questions

Q1. - (Topic 10) 

Your network contains multiple servers that run Windows Server 2012. 

The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections. 

You have two failover clusters. The failover clusters are configured as shown in the following table. 

Only the members of Cluster1 can connect to the SAN. 

You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder. 

You need to ensure that the VHD files of the virtual machines can be stored on the SAN. 

What should you do? (Each correct answer presents a complete solution. Choose all that apply.) 

A. From a node in Cluster2, create a Virtual Fibre Channel SAN. 

B. From a node in Cluster1, create a Virtual Fibre Channel SAN. 

C. From Cluster1, add the iSCSI Target Server cluster role. 

D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type. 

Answer: C,D 

Explanation: 

* After the virtual machines are connected to the storage system using the virtual Fibre Channel components shared storage can be used by each VM, which enables Hyper-V guest clustering. Before the virtual Fibre Channel features were available, Hyper-V guest machines were limited to iSCSI connections to enable shared storage for guest clustering. 

* A new feature in Windows Server 2012 Hyper-V is the ability to create a virtual Fibre Channel SAN. Each guest VM created on Windows Server 2012 includes a new option Add hardware Fibre Channel cards, which can be attributed to World Wide node names (WWNN) and select the virtual combine Virtual SAN Fibre Channel adapters. 

Q2. - (Topic 5) 

You are planning the deployment of System Center 2012 Virtual Machine Manager (VMM). 

You need to identify which additional System Center 2012 product is required to meet the virtualization requirements. 

What should you include in the recommendation? 

A. App Controller 

B. Operations Manager 

C. Configuration Manager 

D. Service Manager 

Answer:

Topic 6, Proseware Inc (B) 

General Overview 

Proseware Inc., is a manufacturing company that has 4,000 employees. 

Proseware works with a trading partner named Fabrikam, Inc. 

Physical Locations 

Proseware has a main office and two branch offices. The main office is located in London. The branch offices are located in Madrid and Berlin. Proseware has a sales department based in the London office and a research department based in the Berlin office. The offices connect to each other by using a WAN link. Each office connects directly to the Internet. 

Proseware rents space at a hosting company. All offices have a dedicated WAN link to the hosting company. Web servers that are accessible from the Internet are located at the hosting company. 

Active Directory 

The Proseware network contains an Active Directory forest named proseware.com. The forest contains a single domain. The forest functional level is Windows Server 2012. 

Each office contains three domain controllers. An Active Directory site is configured for each office. 

System state backups are performed every day on the domain controllers by using System Center 2012 R2 Data Protection Manager (DPM). 

Virtualization 

Proseware has Hyper-V hosts that run Windows Server 2012 R2. Each Hyper-V host manages eight to ten virtual machines. The Hyper-V hosts are configured as shown in the following table. 

All of the Hyper-V hosts store virtual machines on direct-attached storage (DAS). 

Servers 

All servers run Windows Server 2012 R2. All of the servers are virtualized, except for the Hyper-V hosts. 

VDI1 and VDI2 use locally attached storage to host virtual hard disk (VHD) files. The VHDs use the .vhd format. 

A line-of-business application named SalesApp is used by the sales department and runs on a server named APP1. APP1 is hosted on HyperV2. 

A server named CA1 has the Active Directory Certificate Services server role installed and is configured as an enterprise root certification authority (CA) named ProsewareCA. 

Ten load-balanced web servers hosted on HyperV7 and HyperV8 run the Internet-facing web site that takes orders from Internet customers. 

System Center 2012 R2 Operations Manager is used to monitor the health of the servers on the network. 

All of the servers are members of the proseware.com domain, except for the servers located in the perimeter network. 

Client Computers 

All client computers run either Windows 8.1 or Windows 7. Some of the users in the London office connect to pooled virtual desktops hosted on VDI1 and VDI2. 

Problem Statements 

Proseware identifies the following issues on the network: 

Virtualization administrators report that the load on the Hyper-V hosts is inconsistent. The virtualization administrators also report that administrators fail to account for host utilization when creating new virtual machines. 

Users in the sales department report that they experience issues when they attempt to access SalesApp from any other network than the one in the London office. 

Sometimes, configuration changes are not duplicated properly across the web servers, resulting in customer ordering issues. Web servers are regularly changed. 

Demand for virtual desktops is increasing. Administrators report that storage space is becoming an issue as they want to add more virtual machines. 

In the past, some personally identifiable information (PII) was exposed when paper shredding procedures were not followed. 

Requirements 

Planned Changes 

Proseware plans to implement the following changes on the network: Implement a backup solution for Active Directory. Relocate the sales department to the Madrid office. Implement System Center 2012 R2 components, as required. Protect email attachments sent to Fabrikam that contain PII data so that the attachments cannot be printed. Implement System Center 2012 R2 Virtual Machine Manager (VMM) to manage the virtual machine infrastructure. Proseware does not plan to use private clouds in the near future. Deploy a new Hyper-V host named RESEARCH1 to the Berlin office. RESEARCH1 will be financed by the research department. All of the virtual machines deployed to RESEARCH1 will use VMM templates. 

Technical Requirements 

Proseware identifies the following virtualization requirements: 

. The increased demand for virtual desktops must be met. 

. Once System Center is deployed, all of the Hyper-V hosts must be managed by using VMM. 

. If any of the Hyper-V hosts exceeds a set number of virtual machines, an administrator must be notified by email. 

. Network administrators in each location must be responsible for managing the Hyper-V hosts in their respective location. The management of the hosts must be performed by using VMM. 

. The network technicians in each office must be able to create virtual machines in their respective office. The network technicians must be prevented from modifying the host server settings. 

. New virtual machines must be deployed to RESEARCH1 only if the virtual machine template used to create the machine has a value specified for a custom property named CostCenter' that matches Research'. 

The web site configurations must be identical on all web servers. 

Security Requirements 

Proseware identifies the following security requirements: 

. All email messages sent to and from Fabrikam must be encrypted by using digital certificates issued to users by the respective CA of their company. No other certificates must be trusted between the organizations. 

. Microsoft Word documents attached to email messages sent from Proseware to Fabrikam must be protected. 

. Privileges must be minimized, whenever possible. 

Q3. - (Topic 9) 

Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. 

You plan to implement Windows Server 2012 R2. 

You need to create a report that includes the following information: 

. The servers that run applications and services that can be moved to Windows 

Server 2012 R2 

. The servers that have hardware that can run Windows Server 2012 R2 

. The servers that are suitable to be converted to virtual machines hosted on Hyper-

V hosts that run Windows Server 2012 R2 

Solution: You install Windows Server 2012 R2 on a new server, and then you run the Windows Server Migration Tools. Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q4. - (Topic 9) 

Your company plans to hire 100 sales representatives who will work remotely. 

Each sales representative will be given a laptop that will run Windows 7. A corporate image of Windows 7 will be applied to each laptop. 

While the laptops are connected to the corporate network, they will be joined to the domain. The sales representatives will not be local administrators. 

Once the laptops are configured, each laptop will be shipped by courier to a sales representative. 

The sales representative will use a VPN connection to connect to the corporate network. 

You need to recommend a solution to deploy the VPN settings for the sales representatives. The solution must meet the following requirements: 

. Ensure that the VPN settings are the same for every sales representative. 

. Ensure that when a user connects to the VPN, an application named App1 starts. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. VPN auto triggering 

B. The Add-VpnConnectioncmdlet 

C. The Connection Manager Administration Kit (CMAK) 

D. Group Policy preferences 

Answer:

Q5. - (Topic 4) 

You need to recommend a solution for GPO1. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. In west.northwindtraders.com, create a copy of GPO1 and link the new GPO to Site2. Apply a WMI filter to the new GPO. 

B. In west.northwindtraders.com, create a copy of GPO1 and link the new GPO to west.northwindtraders.com. Configure security filtering on the new GPO. 

C. Link GPO1 to west.northwindtraders.com and configure security filtering on GPO1. 

D. Link GPO1 to Site2 and apply a WMI filter to GPO1. 

Answer:

Q6. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. 

The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. 

You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement. 

What should you include in the recommendation? 

A. Set the ISATAP State to state enabled. 

B. Enable split tunneling. 

C. Set the ISATAP State to state disabled. 

D. Enable force tunneling. 

Answer:

Explanation: 

http://blogs.technet.com/b/csstwplatform/archive/2009/12/15/directaccess-how-to-configure-forcetunneling-forda-so-that-client-are-forced-to-use-ip-https.aspx You can configure DirectAccess clients to send all of their traffic through the tunnels to the DirectAccess server with force tunneling. When force tunneling is configured, DirectAccess clients that detect that they are on the Internet modify their IPv4 default route so that default route IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the DirectAccess server. 

Q7. HOTSPOT - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. You plan to implement multiple DHCP servers. 

An administrator named Admin1 will authorize the DHCP servers. You need to ensure that Admin1 can authorize the planned DHCP servers. 

To which container should you assign Admin1 permissions? To answer, select the appropriate node in the answer area. 

Answer:  

Q8. HOTSPOT - (Topic 9) 

You run the ldifde command and receive the following output: 

The command completes successfully. 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer:  

Q9. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings. 

You need to design a Group Policy strategy to meet the following requirements: 

. The security settings in GPO1 must be applied to all client computers. 

. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1. 

B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1. 

C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1. 

D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1. 

Answer:

Q10. - (Topic 2) 

You need to recommend a trust model. 

What should you include in the recommendation? 

A. A one-way, forest trust that has selective authentication. 

B. A one-way, external trust 

C. A two-way, external trust 

D. A one-way, forest trust that has domain-wide authentication. 

Answer:

Explanation: 

From case study: 

Users in the Montreal office must only be allowed to access shares that are located on 

File01 and File02. The Montreal users must be prevented from accessing any other servers 

in the proseware.com forest regardless of the permissions on the resources. 

Q11. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012. Server1 has the Active Directory Certificate Services server role installed. Server1 is configured as an offline standalone root certification authority (CA). 

You install the Active Directory Certificate Services server role on Server2 and configure the server as an enterprise subordinate CA. 

You need to ensure that the certificate issued to Server2 is valid for 10 years. 

What should you do first? 

A. Modify the subordinate CA certificate template. 

B. Modify the registry on Server2. 

C. Modify the registry on Server1. 

D. Modify the CAPolicy.inf file on Server2. 

E. Modify the CAPolicy.inf file on Server1. 

Answer:

Q12. - (Topic 10) 

Your network contains five Active Directory forests. 

You plan to protect the resources in one of the forests by using Active Directory Rights 

Management Services (AD RMS). 

Users in all of the forests will access the protected resources. 

You need to identify the minimum number of AD RMS clusters required for the planned 

deployment. 

What should you identify? 

A. Five root clusters 

B. Five licensing clusters 

C. One licensing cluster and five root clusters 

D. One root cluster and five licensing clusters 

Answer:

Q13. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three Active Directory sites. The Active Directory sites are configured as shown in the following table. 

The sites connect to each other by using the site links shown in the following table. 

Site link name Connected sites 

You need to design the Active Directory site topology to meet the following requirements: 

. Ensure that all replication traffic between Site2 and Site3 replicates through Site1 if a domain controller in Site1 is available. 

. Ensure that the domain controllers between Site2 and Site3 can replicate if all of the domain controllers in Site1 are unavailable. 

What should you do? 

A. Delete Link1. 

B. Delete Link2. 

C. Delete Link3. 

D. Disable site link bridging. 

E. Create one site link bridge. 

F. Modify the cost of Link2. 

G. Create one SMTP site link between Site2 and Site3. 

H. Create one SMTP site link between Site1 and Site3. Create one SMTP site link between Site1 and Site2. 

Answer:

Q14. DRAG DROP - (Topic 6) 

You need to recommend a monitoring solution for Proseware. 

Which three actions should you recommend performing in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q15. - (Topic 10) 

Your network contains a Hyper-V cluster named Cluster1. 

You install Microsoft System Center 2012 Virtual Machine Manager (VMM). 

You create a user account for another administrator named User1. 

You plan to provide User1 with the ability to manage only the virtual machines that User1 

creates. 

You need to identify what must be created before you delegate the required permissions. 

What should you identify? 

A. A service template 

B. A Delegated Administrator 

C. A cloud 

D. A host group 

Answer:

START 70-980 EXAM