aiotestking uk

70-980 Exam Questions - Online Test


70-980 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 1) 

You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation? 

A. Microsoft Baseline Security Analyzer (MBSA) 

B. Microsoft Desktop Optimization Pack (MDOP) 

C. Microsoft System Center 2012 Operations Manager 

D. Microsoft System Center 2012 Data Protection Manager (DPM) 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Microsoft Desktop Optimization Pack Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution. What is the Microsoft Desktop Optimization Pack? The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services. MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies— available only to Windows Software Assurance customers. http://technet.microsoft.com/en-us/library/cc507880.aspx 

Q2. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2008 R2. All domain controllers are installed on physical servers. The network contains several Hyper-V hosts. 

The network contains a Microsoft System Center 2012 infrastructure. 

You plan to use domain controller cloning to deploy several domain controllers that will run Windows Server 2012. 

You need to recommend which changes must be made to the network infrastructure before you can use domain controller cloning. 

What should you recommend? 

A. Upgrade a global catalog server to Windows Server 2012. Deploy Virtual Machine Manager (VMM). 

B. Upgrade a global catalog server to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012. 

C. Upgrade the domain controller that has the PDC emulator operations master role to Windows Server 2012. Deploy a Hyper-V host that runs Windows Server 2012. 

D. Upgrade the domain controller that has the infrastructure master operations master role to Windows Server 2012. Install the Windows Deployment Services server role on a server that runs Windows Server 2012. 

Answer:

Q3. - (Topic 1) 

You need to recommend a fault-tolerant solution for the VPN. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. Network adapter teaming 

B. Network Load Balancing (NLB) 

C. Failover Clustering 

D. DirectAccess 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg http://technet.microsoft.com/en-us/library/hh831698.aspx 

Q4. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,C 

Explanation: 

Creating a New Object: Resulting in multiple Event ID 5137 entries containing all attributes provided explicitly by the security principal that invoked the operation (but not those automatically generated by the system). Note that similar information also gets recorded if audit of User Account Management or Directory Service Access is enabled. 

Q5. HOTSPOT - (Topic 4) 

You need to recommend a solution for communicating to Windows Azure services. 

What should you recommend? To answer, select the appropriate options in the answer area. 

Answer:  

Q6. - (Topic 10) 

Your network contains a Microsoft System Center 2012 infrastructure. 

You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts. 

You deploy a Windows Server Update Services (WSUS) server. 

You need to automate the remediation of non-compliant Hyper-V hosts. The solution must 

minimize the amount of time that virtual machines are unavailable. 

What should you do first? 

A. Configure the Hyper-V hosts to download Windows updates from the WSUS server by using a Group Policy object (GPO). 

B. Install the WSUS Administration console on the VMM server, and then add the WSUS server to the fabric. 

C. Install the Virtual Machine Manager console on the WSUS server, and then add the WSUS server to the fabric. 

D. Configure the Hyper-V hosts to download Windows updates from the VMM server by using a Group Policy object (GPO). 

Answer:

Q7. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest is managed by using Microsoft System Center 2012. 

You plan to create virtual machine templates to deploy servers by using the Virtual Machine 

Manager Self-service Portal (VMMSSP). 

To the Virtual Machine Manager (VMM) library, you add a VHD that has a generalized image of Windows Server 2012. 

You need to identify which VMM components must be associated with the image. 

Which components should you identify? (Each correct answer presents part of the solution. 

Choose all that apply.) 

A. A guest OS profile 

B. A hardware profile 

C. A capability profile 

D. A host profile 

Answer: A,B 

Explanation: 

http://technet.microsoft.com/en-us/library/jj860424.aspx Profiles VMM provides the following profiles: Hardware profile—A hardware profile defines hardware configuration settings such as 

CPU, memory, network adapters, a video adapter, a DVD drive, a floppy drive, COM ports, 

and the priority given the virtual machine when allocating resources on a virtual machine 

host. 

Guest operating system profile—A guest operating system profile defines operating system 

configured settings which will be applied to a virtual machine created from the template. It 

defines common operating system settings such as the type of operating system, the 

computer name, administrator password, domain name, product key, and time zone, 

answer file and run once file. 

NOTE: VMM also includes host profiles. Host profiles are not used for virtual machine 

creation. 

They are used during the conversion of a bare-metal computer to a Hyper-V host. 

(http://technet.microsoft.com/en-us/library/hh368987.aspx) 

Q8. - (Topic 10) 

Your company has a main office and a branch office. 

You plan to implement a failover cluster named Cluster1 to host an application named App1. The data of App1 will replicate to all of the nodes in Cluster1. 

Cluster1 will contain two servers. The servers will be configured as shown in the following table. 

The cluster nodes will not use shared storage. 

The branch office contains two file servers named Server3 and Server4. 

You need to ensure that App1 fails over automatically to another server if a single node in Cluster1 fails. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Add Server3 as a node in Cluster1. 

B. Add Server1, Server2, and Server3 to a Network Load Balancing (NLB) cluster. 

C. Add Server3 and Server4 to a new failover cluster named Cluster2. Install App1 on Cluster2. 

D. Add Server3 as a file share witness for Cluster1. 

Answer:

Q9. HOTSPOT - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. You plan to implement multiple DHCP servers. 

An administrator named Admin1 will authorize the DHCP servers. You need to ensure that Admin1 can authorize the planned DHCP servers. 

To which container should you assign Admin1 permissions? To answer, select the appropriate node in the answer area. 

Answer:  

Q10. - (Topic 10) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: