aiotestking uk

70-980 Exam Questions - Online Test


70-980 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. DRAG DROP - (Topic 7) 

You need to prepare the required Hyper-V virtual network components for Customer2. 

Which four objects should you create and configure in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order. 

Answer:  

Q2. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The Active Directory site topology is configured as shown in the exhibit. (Click the Exhibit button.) 

DC1 and DC2 run Windows Server 2003 R2. All FSMO roles are located on DC2. 

You plan to deploy a read-only domain controller (RODC) to Site3. 

You need to recommend changes to the network to support the planned RODC 

implementation. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. To Site1, add an RODC that runs Windows Server 2012. 

B. Replace DC2 with a domain controller that runs Windows Server 2012. 

C. To Site2, add an RODC that runs Windows Server 2012. 

D. Replace DC1 with a domain controller that runs Windows Server 2012. 

Answer:

Explanation: http://technet.microsoft.com/en-us/library/cc772065%28v=ws.10%29.aspx Each RODC requires a writable domain controller running Windows Server 2008 for the same domain from which the RODC can directly replicate. Typically, this requires that a writable domain controller running Windows Server 2008 be placed in the nearest site in the topology. 

Q3. HOTSPOT - (Topic 9) 

You run the ldifde command and receive the following output: 

The command completes successfully. 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer:  

Q4. - (Topic 10) 

Your company has an office in New York. 

Many users connect to the office from home by using the Internet. 

You deploy an Active Directory Certificate Services (AD CS) infrastructure that contains an enterprise certification authority (CA) named CA1. CA1 is only available from hosts on the internal network. 

You need to ensure that the certificate revocation list (CRL) is available to all of the users. 

What should you do? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Create a scheduled task that copies the CRL files to a Web server. 

B. Run the Install-ADCSWebEnrollment cmdlet. 

C. Run the Install-EnrollmentPolicyWebService cmdlet. 

D. Deploy a Web server that is accessible from the Internet and the internal network. 

E. Modify the location of the Authority Information Access (AIA). 

F. Modify the location of the CRL distribution point (CDP). 

Answer: A,D,F 

Explanation: 

CRLs will be located on Web servers which are Internet facing. 

CRLs will be accessed using the HTTP retrieval protocol. 

CRLs will be accessed using an external URL of http://dp1.pki.contoso.com/pki 

F: To successfully authenticate an Internet Protocol over Secure Hypertext Transfer Protocol (IP-HTTPS)-based connection, DirectAccess clients must be able to check for certificate revocation of the secure sockets layer (SSL) certificate submitted by the DirectAccess server. To successfully perform intranet detection, DirectAccess clients must be able to check for certificate revocation of the SSL certificate submitted by the network 

location server. This procedure describes how to do the following: 

Create a Web-based certificate revocation list (CRL) distribution point using Internet 

Information Services (IIS) 

Configure permissions on the CRL distribution shared folder 

Publish the CRL in the CRL distribution shared folder 

Reference: Configure a CRL Distribution Point for Certificates 

Q5. - (Topic 10) 

Your network contains multiple servers that run Windows Server 2012. 

The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections. 

You have two failover clusters. The failover clusters are configured as shown in the following table. 

Only the members of Cluster1 can connect to the SAN. 

You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder. 

You need to ensure that the VHD files of the virtual machines can be stored on the SAN. 

What should you do? (Each correct answer presents a complete solution. Choose all that apply.) 

A. From a node in Cluster2, create a Virtual Fibre Channel SAN. 

B. From a node in Cluster1, create a Virtual Fibre Channel SAN. 

C. From Cluster1, add the iSCSI Target Server cluster role. 

D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type. 

Answer: C,D 

Explanation: 

* After the virtual machines are connected to the storage system using the virtual Fibre Channel components shared storage can be used by each VM, which enables Hyper-V guest clustering. Before the virtual Fibre Channel features were available, Hyper-V guest machines were limited to iSCSI connections to enable shared storage for guest clustering. 

* A new feature in Windows Server 2012 Hyper-V is the ability to create a virtual Fibre Channel SAN. Each guest VM created on Windows Server 2012 includes a new option Add hardware Fibre Channel cards, which can be attributed to World Wide node names (WWNN) and select the virtual combine Virtual SAN Fibre Channel adapters. 

Q6. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. 

Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2. 

The certification authority (CA) infrastructure of both companies is configured as shown in the following table. 

You need to recommend a certificate solution that meets the following requirements: 

. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com. 

. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com. 

What should you include in the recommendation? 

A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

Answer:

Q7. - (Topic 5) 

You need to recommend a solution that resolves the current file server issue. The solution must meet the business requirements. 

What should you include in the recommendation? 

A. BranchCache in hosted cache mode 

B. BranchCache in distributed cache mode 

C. A storage pool 

D. Distributed File System (DFS) 

Answer:

Q8. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012. 

Your company plans to deploy an application that will provide a search interface to users in the company. The application will query the global catalog for the Employee-Number attribute. 

You need to recommend a solution to ensure that the application can retrieve the Employee-Number value from the global catalog. 

What should you include in the recommendation? 

A. the Dsmod command 

B. the Ldifde command 

C. the Enable-ADOptionalFeaturecmdlet 

D. the Csvde command 

Answer:

Explanation: http://technet.microsoft.com/en-us/library/ee617209.aspx - Enable-AdOptionalFeature http://technet.microsoft.com/en-us/library/ee617218.aspx - Get-ADOptionalFeature (as of W2012R2, only OptionalFeature is ActiveDirectory Recycle Bin). 

Q9. HOTSPOT - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine Manager (VMM) is deployed to the domain. 

In VMM, you create a host group named HostGroup1. You add a 16-node Hyper-V failover cluster to HostGroup1. From Windows PowerShell, you run the following commands: 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer:  

Q10. - (Topic 9) 

Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. 

You plan to implement Windows Server 2012. 

You need to create a report that includes the following information: 

. The servers that run applications and services that can be moved to Windows 

Server 2012 . The servers that have hardware that can run Windows Server 2012 . The servers that are suitable to be converted to virtual machines hosted on Hyper-

V hosts that run Windows Server 2012 

What should you do? 

A. From an existing server, run the Microsoft Application Compatibility Toolkit (ACT). 

B. Install Windows Server 2012 on a new server, and then run the Windows Server Migration Tools. 

C. Install Windows Server 2012 on a new server, and then run Microsoft Deployment Toolkit (MDT) 2012. 

D. From an existing server, run the Microsoft Assessment and Planning (MAP) Toolkit. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/bb977556.aspx The Microsoft Assessment and Planning Toolkit (MAP) is an agentless, automated, multiproduct planning and assessment tool for quicker and easier desktop, server and cloud migrations. MAP provides detailed readiness assessment reports and executive proposals with extensive hardware and software information, and actionable recommendations to help organizations accelerate their IT infrastructure planning process, and gather more detail on assets that reside within their current environment. MAP also provides server utilization data for Hyper-V server virtualization planning; identifying server placements, and performing virtualization candidate assessments, including ROI analysis for server consolidation with Hyper-V. The latest version of the MAP Toolkit adds new scenarios to help you plan your IT future while supporting your current business needs. Included scenarios help you to: Plan your deployment of Windows 8 and Windows Server 2012 with hardware and infrastructure readiness assessments Assess your environment for Office 2013 Plan your migration to Windows Azure Virtual Machines Track Lync Enterprise/Plus usage Size your desktop virtualization needs for both Virtual Desktop Infrastructure (VDI) and session based virtualization using Remote Desktop Services Ready your information platform for the cloud with SQL Server 2012 Virtualize your existing Linux servers onto Hyper-V Identify opportunities to lower your virtualization costs with Hyper-V using the VMware migration assessment MAP is just one of the tools provided by the Microsoft Solution Accelerators team. The Microsoft Assessment and Planning Toolkit, Microsoft Deployment Toolkit, and Security Compliance Manager provide tested guidance and automated tools to help organizations plan, securely deploy, and manage new Microsoft technologies—easier, faster, and at less cost. All are freely available, and fully-supported by Microsoft.