Act now and download your Microsoft 70 980 pdf test today! Do not waste time for the worthless Microsoft exam 70 980 tutorials. Download Avant-garde Microsoft Recertification for MCSE: Server Infrastructure exam with real questions and answers and begin to learn Microsoft 70 980 vce with a classic professional.

Q41. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. 

All client computers run either Windows 7 or Windows 8. 

The corporate security policy states that all of the client computers must have the latest security updates installed. 

You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3. 

Solution: You implement the DHCP Network Access Protection (NAP) enforcement method. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q42. HOTSPOT - (Topic 9) 

Your network contains an Active Directory forest named northwindtraders.com. 

The client computers in the finance department run either Windows 8.1, Windows 8, or Windows 7. All of the client computers in the marketing department run Windows 8.1. 

You need to design a Network Access Protection (NAP) solution for northwindtraders.com that meets the following requirements: 

. The client computers in the finance department that run Windows 7 must have a firewall enabled and the antivirus software must be up-to-date. 

. The finance computers that run Windows 8.1 or Windows 8 must have automatic updating enabled and the antivirus software must be up-to-date. 

. The client computers in the marketing department must have automatic updating enabled and the antivirus software must be up-to-date. 

. If a computer fails to meet its requirements, the computers must be provided access to a limited set of resources on the network. 

. If a computer meets its requirements, the computer must have full access to the network. 

What is the minimum number of objects that you should create to meet the requirements? To answer, select the appropriate number for each object type in the answer area. 

Answer: 


Q43. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings. 

You need to design a Group Policy strategy to meet the following requirements: 

. The security settings in GPO1 must be applied to all client computers. 

. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1. 

B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1. 

C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1. 

D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1. 

Answer:


Q44. - (Topic 10) 

You have a Hyper-V host named Hyper1 that has Windows Server 2012 installed. Hyper1 hosts 20 virtual machines. 

Hyper1 has one physical network adapter. 

You need to implement a networking solution that evenly distributes the available bandwidth on Hyper1 to all of the virtual machines. 

What should you modify? 

A. The settings of the virtual switch 

B. The settings of the virtual network adapter 

C. The Quality of Service (QoS) Packet Scheduler settings of the physical network adapter 

D. The settings of the legacy network adapter 

Answer:


Q45. - (Topic 9) 

Your company has a main office. The main office is located in a building that has 10 floors. 

A datacenter on the ground floor contains a Windows Server 2012 failover cluster. The failover cluster contains a DHCP server resource named DHCP1. All client computers receive their IP addresses from DHCP1. All client computers are part of the 131.107.0.0/16 IPv4 subnet. 

You plan to implement changes to the network subnets to include a separate subnet for each floor of the office building. The subnets will connect by using routers. 

You need to recommend changes to the DHCP infrastructure to ensure that all of the client computers can receive their IP configuration by using DHCP. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Install a remote access server on each floor. Configure a DHCP relay agent on each new DHCP server. Create a scope for each subnet on DHCP1. 

B. Install a DHCP server on each floor. Create a scope for the local subnet on each new DHCP server. Enable DHCP Failover on each new DHCP server. 

C. Configure each router to forward requests for IP addresses to DHCP1. Create a scope for each subnet on DHCP1. 

D. Configure each router to forward requests for IP addresses to DHCP1. Create a scope for the 10.0.0.0/16 subnet on DHCP1. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc771390.aspx Excerpt: In TCP/IP networking, routers are used to interconnect hardware and software used on different physical network segments called subnets and forward IP packets between each of the subnets. To support and use DHCP service across multiple subnets, routers connecting each subnet should comply with DHCP/ BOOTP relay agent capabilities described in RFC 1542. 


Q46. - (Topic 1) 

You need to recommend a solution for DHCP logging. The solution must meet the technical requirement. 

What should you include in the recommendation? 

A. Event subscriptions 

B. IP Address Management (IPAM) 

C. DHCP audit logging 

D. DHCP filtering 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Feature description IPAM in Windows Server 2012 is a new built-in framework for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS). IPAM includes components for: 

. Automatic IP address infrastructure discover)': IPAM discovers domain controllers, DHCP servers, and DNS servers in the domains you choose. You can enable or disable management of these servers by IPAM. 

. Custom IP address space display, reporting, and management: The display of IP addresses is highly customizable and detailed tracking and utilization data is available. IPv4 and IPv6 address space is organized into IP address blocks, IP address ranges, and individual IP addresses. IP addresses are assigned built-in or user-defined fields that can be used to further organize IP address space into hierarchical, logical groups. 

. Audit of server configuration changes and tracking of IP address usage: Operational events are displayed for the IPAM server and managed DHCP servers. IPAM also enables IP address tracking using DHCP lease events and user logon events collected from Network Policy Server (NPS), domain controllers, and DHCP servers. Tracking is available by IP address, client ID, host name, or user name. 

. Monitoring and management of DHCP and DNS services: IPAM enables automated service availability monitoring for Microsoft DHCP and DNS servers across the forest. DNS zone health is displayed, and detailed DHCP server and scope management is available using the IPAM console. http://technet.microsoft.com/en-us/library/hh831353.aspx 


Q47. DRAG DROP - (Topic 9) 

Your network contains three servers named Server1, Server2, and Server3 that run Windows Server 2012. Server3 is connected to a disk storage array. 

You need to ensure that Server1 can store files on the storage array. The solution must ensure that Server1 can access the storage as a local disk. 

What should you configure on each server? 

To answer, drag the appropriate configuration to the correct location in the answer area. Each configuration may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q48. - (Topic 10) 

Your network contains a Hyper-V cluster named Cluster1. 

You install Microsoft System Center 2012 Virtual Machine Manager (VMM). 

You create a user account for another administrator named User1. 

You plan to provide User1 with the ability to manage only the virtual machines that User1 

creates. 

You need to identify what must be created before you delegate the required permissions. 

What should you identify? 

A. A service template 

B. A Delegated Administrator 

C. A cloud 

D. A host group 

Answer:


Q49. DRAG DROP - (Topic 10) 

Your network contains servers that run Windows Server 2012. The network contains two servers named Server1 and Server2 that are connected to a SAS storage device. The device only supports two connected computers. 

Server1 has the iSCSI Target Server role service installed. Ten application servers use their iSCSI Initiator to connect to virtual disks in the SAS storage device via iSCSI targets on Server1. 

Currently, Server2 is used only to run backup software. 

You install the iSCSI Target Server role service on Server2. 

You need to ensure that the iSCSI targets are available if Server1 fails. 

Which five actions should you perform? 

To answer, move the five appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q50. DRAG DROP - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3 and Server4 that run Windows Server 2012. 

Server1 and Server2 are configured as file servers and are part of a failover cluster named Cluster1. Server3 and Server4 have Microsoft SQL Server 2012 installed and are part of a failover cluster named Cluster2. 

You add a disk named Disk1 to the nodes in Cluster1. Disk1 will be used to store the data files and log files used by SQL Server 2012. 

You need to configure the environment so that access to Disk1 remains available when a node on Cluster1 fails over or fails back. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: