Our pass rate is high to 98.9% and the similarity percentage between our 70 980 dump study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft exam 70 980 exam in just one try? I am currently studying for the Microsoft 70 980 dump exam. Latest Microsoft 70 980 vce Test exam practice questions and answers, Try Microsoft 70 980 dump Brain Dumps First.

Q11. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

All client computers have a custom application named App1 installed. App1 generates an Event ID 42 every time the application runs out of memory. 

Users report that when App1 runs out of memory, their client computer runs slowly until they manually restart App1. 

You need to recommend a solution that automatically restarts App1 when the application runs out of memory. The solution must use the least amount of administrative effort. 

What should you include in the recommendation? 

A. From Configurations Manager, create a desired configuration management baseline. 

B. From Windows System Resource Manager, create a resource allocation policy. 

C. From Event Viewer, attach a task to the event. 

D. From Operations Manager, create an alert. 

Answer:


Q12. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q13. - (Topic 1) 

You need to recommend which changes must be implemented to the network before you can deploy the new web application. 

What should you include in the recommendation? 

A. Change the forest functional level to Windows Server 2008 R2. 

B. Upgrade the DNS servers to Windows Server 2012. 

C. Change the functional level of both the domains to Windows Server 2008 R2. 

D. Upgrade the domain controllers to Windows Server 2012. 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 


Q14. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. 

Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2. 

The certification authority (CA) infrastructure of both companies is configured as shown in the following table. 

You need to recommend a certificate solution that meets the following requirements: 

. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com. 

. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com. 

What should you include in the recommendation? 

A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

Answer:


Q15. DRAG DROP - (Topic 10) 

You are planning to set up a proof-of-concept network virtualization environment. The environment will contain three servers. The servers will be configured as shown in the following table. 

You need to enable network connectivity between the virtual machines and Server3. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q16. - (Topic 6) 

You need to recommend changes to the existing environment to meet the email requirement. 

What should you recommend? 

A. Implement a two-way forest trust that has selective authentication. 

B. Implement qualified subordination. 

C. Deploy the FabrikamCA root certificate to all of the client computers. 

D. Deploy a user certificate from FabrikamCA to all of the users. 

Answer:

Topic 7, Northwind Traders (B) 

Overview 

Northwind Traders is an IT services and hosting provider. 

Northwind Traders has two main data centers in North America. The data centers are located in the same city. The data centers connect to each other by using high-bandwidth, low-latency WAN links. Each data center connects directly to the Internet. 

Northwind Traders also has a remote office in Asia that connects to both of the North American data centers by using a WAN link. The Asian office has 30 multipurpose servers. 

Each North American data center contains two separate network segments. One network segment is used to host the internal servers of Northwind Traders. The other network segment is used for the hosted customer environments. 

Existing Environment 

Active Directory 

The network contains an Active Directory forest named northwindtraders.com. The forest contains a single domain. All servers run Windows Server 2012 R2. 

Server Environment 

The network has the following technologies deployed: 

Service Provider Foundation 

Windows Azure Pack for Windows Server 

System Center 2012 R2 Virtual Machine Manager (VMM) 

An Active Directory Rights Management Services (AD RMS) cluster 

An Active Directory Certificate Services (AD CS) enterprise certification authority (CA) 

All newly deployed servers will include the following components: 

Dual 10-GbE Remote Direct Memory Access (RDMA)-capable network adapters 

Dual 1-GbE network adapters 

128 GB of RAM 

Requirements 

Business Goals 

Northwind Traders will provide hosting services to two customers named Customer1 and Customer2. The network of each customer is configured as shown in the following table. 

Planned Changes 

Northwind Traders plans to implement the following changes: 

Deploy System Center 2012 R2 Operations Manager. 

Deploy Windows Server 2012 R2 iSCSI and SMB-based storage. 

Implement Hyper-V Recovery Manager to protect virtual machines. 

Deploy a certificate revocation list (CRL) distribution point (CDP) on the internal network. 

For Customer 1, install server authentication certificates issued by the CA of Northwind Traders on the virtual machine in the hosting networks. 

General Requirements 

Northwind Traders identifies the following requirements: 

Storage traffic must use dedicated adapters. 

All storage and network traffic must be load balanced. 

The amount of network traffic between the internal network and the hosting network must be minimized. 

The publication of CRLs to CDPs must be automatic. 

Each customer must use dedicated Hyper-V hosts. 

Administrative effort must be minimized, whenever possible. 

All servers and networks must be monitored by using Operations Manager. 

Anonymous access to internal file shares from the hosting network must be prohibited. 

All Hyper-V hosts must use Cluster Shared Volume (CSV) shared storage to host virtual machines. 

All Hyper-V storage and network traffic must remain available if single network adapter fails. 

The Hyper-V hosts connected to the SMB-based storage must be able to make use of the RDMA technology. 

The number of servers and ports in the hosting environment to which the customer 

has access must be minimized. 

Customer1 Requirements 

Northwind Traders identifies the following requirements for Customer1: 

. Customer1 must use SMB-based storage exclusively. 

. Customer1 must use App Controller to manage hosted virtual machines. 

. The virtual machines of Customer1 must be recoverable if a single data center fails. 

. Customer1 must be able to delegate self-service roles in its hosted environment to its users. 

. Customer1 must be able to check for the revocation of certificates issued by the CA of Northwind Traders. 

. The users of Customer1 must be able to obtain use licenses for documents protected by the AD RMS of Northwind Traders. 

. Certificates issued to the virtual machines of Customer1 that reside on the hosted networks must be renewed automatically. 

Customer2 Requirements 

Northwind Traders identifies the following requirements for Customer2: 

. Customer2 must use iSCSI-based storage exclusively. 

. All of the virtual machines of Customer2 must be migrated by using a SAN transfer. 

. None of the metadata from the virtual machines of Customer2 must be stored in Windows Azure. 

. The network configuration of the Hyper-V hosts for Customer2 must be controlled by using logical switches. 

. The only VMM network port profiles and classifications allowed by Customer2 must be low-bandwidth, medium-bandwidth, or high-bandwidth. 

. The users at Northwind Traders must be able to obtain use licenses for documents protected by the AD RMS cluster of Customer2. Customer2 plans to decommission its AD RMS cluster during the next year. 


Q17. DRAG DROP - (Topic 4) 

You need to recommend a solution for managing Windows Azure. 

Which three actions should you recommend performing in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q18. - (Topic 6) 

You need to implement a solution for the email attachments. 

Both organizations exchange root CA certificates and install the certificates in the relevant stores. 

You duplicate the Enrollment Agent certificate template and generate a certificate based on the new template. 

Which additional two actions should you perform? Each correct answer presents part of the solution. 

A. Request cross-certification authority certificates. 

B. Create Capolicy.inf files. 

C. Request subordinate CA certificates. 

D. Create Policy.inf files. 

Answer: A,D 


Q19. - (Topic 9) 

Your company has a main office and a branch office. 

The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table. 

The domain contains two global groups. The groups are configured as shown in the following table. 

You need to ensure that the RODC is configured to meet the following requirements: . Cache passwords for all of the members of Branch1Users. . Prevent the caching of passwords for the members of Helpdesk. What should you do? 

A. Modify the password replication policy of RODC1. 

B. Modify the delegation settings of RODC1. 

C. Modify the membership of the Allowed RODC Password Replication group. 

D. Modify the membership of the Denied RODC Password Replication group. 

E. Modify the delegation settings of DC1 and DC2. 

F. Install the BranchCache feature on RODC1. 

G. Create a Password Settings object (PSO) for the Helpdesk group. 

H. Create a Password Settings object (PSO) for the Branch1Users group. 

Answer:


Q20. HOTSPOT - (Topic 9) 

Your network contains an Active Directory forest name fabrikam.com. The forest contains two domains named fabrikam.com and contoso.com. All servers run Windows Server 2012 R2. 

The forest contains a DHCP server named Server1 and a DNS server named Server2. 

You need to recommend a solution to ensure that any computers that are neither members of contoso.com nor fabrikam.com receive a DNS suffix of guest.fabrikam.com. 

What two commands should you run? To answer, select the appropriate options in the answer area. 

Answer: