70-980 Premium Bundle

70-980 Premium Bundle

Recertification for MCSE: Server Infrastructure Certification Exam

4.5 
(11415 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-980 Free Practice Questions

Q1. - (Topic 8) 

You need to recommend a solution that meets the notification requirements. 

Which System Center 2012 components should you include in the recommendation? 

A. Service Manager, Orchestrator and App Controller 

B. Configuration Manager, Service Manager and Orchestrator 

C. App Controller, Configuration Manager and Operations Manager 

D. Operations Manager, Service Manager and Orchestrator 

Answer:

Q2. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. 

You plan to deploy 200 Hyper-V hosts by using Microsoft System Center 2012 Virtual 

Machine Manager (VMM) Service Pack 1 (SP1). 

You add a PXE server to the fabric. 

You need to identify which objects must be added to the VMM library for the planned deployment. 

What should you identify? (Each correct answer presents part of the solution. Choose all that apply.) 

A. A host profile 

B. A capability profile 

C. A hardware profile 

D. A generalized image 

E. A service template 

Answer: A,D 

Explanation: Templates and profiles are used to standardize the creation of virtual machines and services. These configurations are stored in the VMM database but are not represented by physical configuration files. There are several new types of templates and profiles in VMM, most of which are used for service creation. There are also host profiles, used for deploying a Hyper-V host from a bare-metal computer, and capability profiles, used to specify the capabilities of virtual machines on each type of supported hypervisor when virtual machines are deployed to a private cloud. 

Note: 

* host profile: 

A Virtual Machine Manager library resource that contains hardware and operating system 

configuration settings to convert a bare-metal computer to a managed Hyper-V host. 

*capability profile: 

A Virtual Machine Manager library resource that defines which resources (for example, 

number of processors or maximum memory) are available to a virtual machine that is 

created in a private cloud. 

Q3. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains four computers that are configured as shown in the following table. 

You plan to use domain controller cloning. 

You need to identify on which computers you can clone domain controllers that run Windows Server 2012. 

Which computers should you identify? (Each correct answer presents part of the solution. 

Choose all that apply.) 

A. Server1 

B. Server2 

C. Server3 

D. Client1 

Answer: A,D 

Explanation: 

DC cloning can be done from either Hyper-V on Server 2012 and Hyper-V on Windows 8. 

Q4. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. The domain contains two sites named Site1 and Site2. The sites connect to each other by using a 1-Mbps WAN link. 

The sites contain four servers. The servers are configured as shown in the following table. 

In Site2, you plan to deploy 50 Hyper-V hosts. 

You need to recommend a solution to deploy the Hyper-V hosts by using VMM. The solution must minimize the amount of traffic between Site1 and Site2 during deployment. What should you recommend? 

A. On Server4, install VMM. From the Virtual Machine Manager console, add Server1 as a PXE server and add Server4 as a library server. 

B. On Server4/ install VMM. From the Virtual Machine Manager console, add Server1 as a PXE server and a library server. 

C. On Server4, install WDS. From the Virtual Machine Manager console, add Server4 as a PXE server and a library server. 

D. On Server4, install WDS. From the Virtual Machine Manager console, add Server4 as a PXE server and add Server1 as a library server. 

Answer:

Q5. - (Topic 10) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM). 

Server1 and Server2 have identical hardware, software, and settings. 

You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table. 

You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20 

percent. 

You discover that none of the virtual machines hosted on Server2 are migrated to Server1. 

You need to ensure that the virtual machines hosted on Server2 are migrated to Server1. 

What should you modify from the Dynamic Optimization configuration? 

A. The Host Reserve threshold 

B. The Power Optimization threshold 

C. The Aggressiveness level 

D. The Dynamic Optimization threshold 

Answer:

Q6. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012. 

Your company uses IP Address Management (IPAM) to manage multiple DHCP servers. A user named User1 is a member of the IPAM Users group and is a member of the local Administrators group on each DHCP server. 

When User1 edits a DHCP scope by using IPAM, the user receives the error message 

shown in the exhibit. (Click the Exhibit button.) 

You need to prevent User1 from receiving the error message when editing DHCP scopes by using IPAM. 

What should you do? 

A. Add User1 to the DHCP Administrators group on each DHCP server. 

B. Add User1 to the IPAM Administrators group. 

C. Run the Set-IpamServerConfig cmdlet. 

D. Run the Invoke-IpamGpoProvisioning cmdlet. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh831622.aspx IPAM Administrators: IPAM Administrators have the privileges to view all IPAM data and perform all IPAM tasks. 

Q7. - (Topic 1) 

You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation? 

A. Microsoft Baseline Security Analyzer (MBSA) 

B. Microsoft Desktop Optimization Pack (MDOP) 

C. Microsoft System Center 2012 Operations Manager 

D. Microsoft System Center 2012 Data Protection Manager (DPM) 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Microsoft Desktop Optimization Pack Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution. What is the Microsoft Desktop Optimization Pack? The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services. MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies— available only to Windows Software Assurance customers. http://technet.microsoft.com/en-us/library/cc507880.aspx 

Q8. - (Topic 10) 

Your network contains a data center named DataCenter1 that contains multiple servers. The servers are configured as Hyper-V hosts. 

Your company deploys a disaster recovery site. The disaster recovery site has a dedicated connection to DataCenter1. 

The network is connected to the disaster recovery site by using a dedicated link. 

DataCenter1 contains 10 business critical virtual machines that run a line-of-business application named App1. 

You need to recommend a business continuity solution to ensure that users can connect to App1 within two hours if DataCenter1 fails. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. From Microsoft System Center 2012 Virtual Machine Manager (VMM), implement live migration on the virtual machines. 

B. From Hyper-V Manager, implement Hyper-V replicas. 

C. From Microsoft System Center 2012 Data Protection Manager, implement a protection group. 

D. From Hyper-V Manager, create snapshots of the virtual machines. 

Answer:

Q9. - (Topic 10) 

Your company has a human resources department a finance department, a sales department and an R&D department. 

The company audits the access of documents that contain department-specific sensitive information. 

You are planning an administrative model for the departments to meet the following requirements: 

. Provide R&D managers with the ability to back up all the files of their department only. 

. Provide finance managers with the ability to view the audit logs for the files of their department only. 

. Provide human resources managers with the ability to view the audit logs for the files of their department only. 

. Provide sales managers with the ability to modify the permissions on all the shared folders of their department only. 

You need to identify the minimum amount of file servers required on the network to meet the requirements of each department. 

How many file servers should you identify? 

A. 1 

B. 2 

C. 3 

D. 4 

Answer:

Q10. - (Topic 10) 

Your network contains the following roles and applications: 

Microsoft SQL Server 2012 

Distributed File System (DFS) Replication 

Active Directory Domain Services (AD DS) 

Active Directory Rights Management Services (AD RMS) 

Active Directory Lightweight Directory Services (AD LDS) 

You plan to deploy Active Directory Federation Services (AD FS). 

You need to identify which deployed services or applications can be used as attribute stores for the planned AD FS deployment. 

What should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. DFS 

B. AD RMS 

C. Microsoft SQL Server 2012 

D. AD LDS 

E. AD DS 

Answer: C,D,E 

Q11. - (Topic 4) 

You need to recommend a solution for the sales reports. 

What should you include in the recommendation? 

A. BranchCache in distributed cache mode 

B. Offline files 

C. BranchCache in hosted cache mode 

D. Distributed File System (DFS) 

Answer:

Topic 5, Contoso, Ltd (B) 

Overview 

Contoso, Ltd., is a recruiting and staffing company that has offices throughout North 

America. 

The company has a main office and six branch offices. The main office is located in Miami. 

The branch offices are located in New York. Seattle, Los Angeles, Montreal, Toronto, and 

Vancouver. 

Existing Environment 

Network Infrastructure 

The network contains one Active Directory domain named contoso.com. 

The main office has the following servers: 

One file server that maintains multiples shares 

Two domain controllers configured as DNS servers 

One Windows Server Update Services (WSUS) server 

Two DHCP servers that each have a scope for all of the subnets 

Two servers that have Failover Clustering configured and are used as virtualization hosts 

One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management (CRM) database 

Each branch office has the following servers: 

One domain controller configured as a DNS server 

One DHCP server that has a single scope for its respective office 

Each office has a single subnet. The network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed connection to the Internet. The offices connect to each other by using VPN appliances. 

Current Issues 

Users report that it can take a long time to download files from network shares in the main office. 

A root cause analysis identifies that network traffic peaks when the users experience this issue. 

Requirements 

Planned Changes 

The company plans to implement the following changes: 

. Replace all of the domain controllers with new servers that run Windows Server 2012. 

. Upgrade the CRM application to use a web-based application that connects to the current CRM database. The web application will store session data in the memory of each web server. 

. Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be deployed in the future. 

. Monitor the availability of the CRM application and create alerts when the overall availability is less than 99 percent. 

. Implement Microsoft System Center 2012 to manage the new environment. 

Business Requirements 

The company identifies the following business requirements: 

. Minimize hardware costs and software costs whenever possible. 

. Minimize the amount of network traffic over the VPN whenever possible. 

. Ensure that the users in the branch offices can access files currently on the main 

office file server if an Internet link fails. 

Technical Requirements 

The company identifies the following technical requirements: 

. Provide a highly available DHCP solution. 

. Maintain a central database that contains the security events from all of the servers. The database must be encrypted. 

. Ensure that an administrator in the main office can manage the approval of Windows updates and updates to third-party applications for all of the users. 

. Ensure that all of the domain controllers have the ReliableTimeSource registry value in HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\Services\W32Time\Parameters set to 1, even if an administrator changes that value manually. 

Virtualization Requirements 

The company identifies the following virtualization requirements: 

. Minimize the number of permissions and privileges assigned to users. 

. Ensure that the members of a group named Group2 can add a WSUS server to the fabric. 

. Ensure that a diagram view of the virtualization environment can be generated dynamically. 

. Minimize the amount of administrative effort required to manage the virtualization environment. 

. Prevent the failure of a front-end web server from affecting the availability of the CRM application. 

. Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles office only. 

. Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual Machine Manager (VMM) library. 

. On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization hosts without disrupting the virtual machines hosted on the virtualization hosts. 

Q12. - (Topic 9) 

Your company has a main office and a branch office. 

The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table. 

The domain contains two global groups. The groups are configured as shown in the following table. 

You need to ensure that the RODC is configured to meet the following requirements: . Cache passwords for all of the members of Branch1Users. . Prevent the caching of passwords for the members of Helpdesk. What should you do? 

A. Modify the password replication policy of RODC1. 

B. Modify the delegation settings of RODC1. 

C. Modify the membership of the Allowed RODC Password Replication group. 

D. Modify the membership of the Denied RODC Password Replication group. 

E. Modify the delegation settings of DC1 and DC2. 

F. Install the BranchCache feature on RODC1. 

G. Create a Password Settings object (PSO) for the Helpdesk group. 

H. Create a Password Settings object (PSO) for the Branch1Users group. 

Answer:

Q13. - (Topic 6) 

You are evaluating the use of VMM to migrate APP1 for the sales users. You need to identify the effects of the migration. 

What should you identify? 

A. The VHDs and the virtual machine configuration files will move. The sales users' access to APP1 will be interrupted. 

B. The VHDs will move but the virtual machine configuration files will remain in the original location. The sales users will continue to have uninterrupted access to APP1. 

C. The virtual machine configuration files will move but the VHDs will remain in the original location. The sales users' access to APP1 will be interrupted. 

D. The VHDs and the virtual machine configuration files will move. The sales users will continue to have uninterrupted access to APP1. 

Answer:

Q14. HOTSPOT - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. 

The domain has a certification authority (CA). You create four certificate templates. The templates are configured as shown in the following table: 

You install the Remote Access server role in the domain. 

You need to configure DirectAccess to use one-time password (OTP) authentication. 

What should you do? To answer, select the appropriate options in the answer area, 

Answer:  

Q15. - (Topic 3) 

You need to recommend a solution that meets the security requirements. 

Which schema attribute properties should you recommend modifying? 

A. isIndexed 

B. searchFlags 

C. isCriticalSystemObject 

D. schemaFlagsEx 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema. 

. Determine and then modify the current searchFlags value of an attribute 

. Verify that an attribute is added to the RODC FAS 

-Determine and then modify the current searchFlags value of an attribute To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags: 

. To add the attribute to the RODC FAS, set the 10th bit to 0x200. 

. To mark the attribute as confidential, set the 7th bit to 0x080. http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx 

START 70-980 EXAM