[Free] 2018(May) EnsurePass Dumpsleader Microsoft 70-980 Dumps with VCE and PDF 241-250

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-980
100% Free Download! 100% Pass Guaranteed!

Recertification for MCSE: Server Infrastructure

Question No: 241 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System center 2012 infrastructure. The domain contains the computers configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to implement a monitoring solution that gathers the security logs from all of the computers in the domain.

Which monitoring solution should you implement? More than one answer choice may achieve the goal. Select the BEST answer.

  1. Data Collector Sets (DCSs)

  2. Event subscriptions

  3. Desired Configuration Management in Configuration Manager

  4. Audit Collection Services (ACS) in Operations Manager

Answer: D

Reference: http://technet.microsoft.com/en-us/library/bb381373.aspx

Question No: 242 – (Topic 8)

Your company has a human resources department and a finance department.

You are planning an administrative model for both departments to meet the following requirements:

-> Provide human resources managers with the ability to view the audit logs for the files of their department.

-> Ensure that only domain administrators can view the audit logs for the files of the

finance department.

You need to recommend a solution for the deployment of file servers for both departments.

What should you recommend?

More than one answer choice may achieve the goal. Select the BEST answer.

  1. Deploy one file server. Add the human resources managers to the local Administrators group.

  2. Deploy one file server. Add the human resources managers to the local Event Log Readers group.

  3. Deploy two file servers. Add the human resources managers to the local Administrators group on one of the servers.

  4. Deploy two file servers. Add the human resources managers to the local Event Log Readers group on one of the servers.

Answer: D

Question No: 243 – (Topic 8)

Your network contains an Active Directory domain named adatum.com. The domain contains a server named ADFS1.

You plan to deploy Active Directory Federation Services (AD FS) to ADFS1.

You plan to register the company’s SMTP domain for Office 365 and to configure single sign-on for all users.

You need to identify which certificate or certificates are required for the planned deployment.

Which certificate or certificates should you identify? (Each correct answer presents a

complete solution. Choose all that apply.)

  1. a certificate that is issued by an internal certification authority and that contains the subject name ADFS1

  2. a certificate that is issued by an internal certification authority and that contains the subject name adfs1.adatum.com.

  3. a certificate that is issued by a trusted third-party root certification authority and that contains the subject name ADFS1

  4. self-signed certificates for adfs1.adatum.com

  5. a certificate that is issued by a trusted third-party root certification authority and that contains the subject name adfs1.adatum.com

Answer: A,E

Explanation: E (not C, not D): Setting up AD FS requires the use of a third party SSL certificate. Make sure you match the certificate’s subject name with the Fully Qualified Domain Name of the server.

Reference: Geek of All Trades: Office 365 SSO: A Simplified Installation Guide https://technet.microsoft.com/en-us/magazine/jj631606.aspx

Question No: 244 – (Topic 8)

Your network contains a server named Hyperl that runs Windows Server 2012. Hyperl is configured as a Hyper-V host and runs System Center 2012 Virtual Machine Manager (VMM).

Hyperl hosts a virtual machine named Guestl. Guestl is configured as a file server that runs Windows Server 2012. Guestl connects to a shared storage device by using the iSCSI Initiator.

You need to back up the files and the folders in the shared storage used by Guestl. The solution must ensure that the backup is successful even if Guestl is in a saved state. What should you do? O

  1. From Hyper-V Manager, create a snapshot of Guestl.

  2. From Hyperl, configure an iSCSI initiator to the shared storage and perform a backup by using Windows Server Backup.

  3. From Guestl, schedule regular backups by using Windows Server Backup.

  4. From Microsoft System Center 2012 Virtual Machine Manager (VMM), create a copy of Guestl.

Answer: B

Topic 9, Contoso Ltd Case E Overview

Contoso, Ltd., is a healthcare company in Europe that has 2,000 users. The company is migrating to Windows Server 2012.

The company has two main offices and two branch offices. The main offices are located in Paris and Amsterdam. One of the branch offices is a sales office located in Berlin. The other branch office is a research office located in Brussels.

The offices connect to each other by using a WAN link.

Current Environment Active Directory

The network contains an Active Directory forest named contoso.com. An Active Directory site exists for each office.

The forest contains a child domain named research.contoso.com. The functional level of both the domains is Windows Server 2008.

In each site, there are two domain controllers for the contoso.com domain and two domain controllers for the research.contoso.com domain. The domain controllers run Windows Server 2008 R2.

All of the domain controllers are global catalog servers.

The FSMO roles were not moved since the domains were deployed.

Network Infrastructure

All servers run Windows Server 2008 R2.

Each user has a laptop computer that runs Windows 7.

The company has 10 print servers. Each print server contains several shared printers. The company has 10 file servers that have the following disk configurations:

-> A simple volume named C that is the System and Boot volume and is formatted NTFS

-> A mounted virtual hard disk (VHD) named DATA that is formatted NTFS

-> A simple volume named D that is formatted FAT32

-> A simple volume named E that is formatted NTFS

-> A Clustered Shared Volume (CSV)

The Paris office contains a server named PA1. The Amsterdam office contains a server named AM1.

Both servers have the following server roles installed:

-> DNS Server

-> DHCP Server

-> Remote Access

The DNS servers are configured to use the DNS servers of the company#39;s Internet Service Provider (ISP) as forwarders.

Users often work remotely. The users access the internal network by using an SSTP-based VPN connection.

Requirements Planned Changes

The company plans to implement the following changes:

-> Create a child domain named sales.contoso.com. Only the domain controllers in sales.contoso.com will host a zone for the sales.contoso.com domain. The domain controllers in sales.contoso.com will run Windows Server 2012. The client computers in sales.contoso.com will use the sales.contoso.com domain controllers as their DNS servers.

-> Implement two servers in the Amsterdam office and two servers in the Paris office to replace PA1 and AMI. These new servers will run Windows Server 2012 and will not have shared storage.

-> Decommission the research.contoso.com domain. All of the users and the Group Policy objects (GPOs) in research.contoso.com will be migrated to contoso.com.

-> Migrate the existing print queues to virtualized instances of Windows Server 2012.

-> Migrate the file servers to new servers that run Windows Server 2012.

-> Implement RADIUS authentication for VPN connections.

-> Deploy Windows Server 2012 to all new servers.

Technical Requirements

The company identifies following technical requirements:

-> All changes to Group Policies must be logged.

-> Network Access Protection (NAP) policies must be managed centrally.

-> Core networking services in each office must be redundant if a server fails.

-> The possibility of IP address conflicts during the DHCP migration must be minimized.

-> A central log of the IP address leases and the users associated to those leases must be created.

-> All of the client computers must be able to resolve internal names and internet names.

-> Administrators in the Paris office need to deploy a series of desktop restrictions to

the entire company by using Group Policy.

-> The new sales.contoso.com domain will contain a web application that will access data from a Microsoft SQL Server located in the contoso.com domain. The web application must use integrated Windows authentication. Users#39; credentials must be passed from the web applications to the SQL Server.

Question No: 245 – (Topic 9)

You are planning the decommissioning of research.contoso.com.

You need to ensure that an administrator named Admin5 in the research department can manage the user accounts that are migrated to contoso.com. The solution must minimize the number of permissions assigned to Admin5.

What should you do before you migrate the user accounts?

  1. Run the New-Object cmdlet, and then run the Add- ADPrincipalGroupMembershipcmdlet.

  2. Create a new organizational unit (OU), and then add Admin5 to the Account Operators group.

  3. Create a new organizational unit (OU), and then run the Delegation of Control Wizard.

  4. Run the New-Object cmdlet, and then run the Add- ADCentralAccessPolicyMembercmdlet.

Answer: C Explanation:

  • Scenario: Decommission the research.contoso.com domain. All of the users and the Group Policy objects (GPOs) in research.contoso.com will be migrated to contoso.com.

    Reference: Delegation of Control Wizard http://technet.microsoft.com/en-us/library/dd145344.aspx

    Question No: 246 – (Topic 9)

    You need to recommend a solution for DHCP logging. The solution must meet the technical requirement.

    What should you include in the recommendation?

    1. Event subscriptions

    2. IP Address Management (IPAM)

    3. DHCP audit logging

    4. DHCP filtering

    Answer: B

    Explanation: * Scenario: A central log of the IP address leases and the users associated to those leases must be created.

  • Feature description

    IPAM in Windows Server 2012 is a new built-in framework for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS). IPAM includes components for:

  • Automatic IP address infrastructure discover)#39;: IPAM discovers domain controllers, DHCP servers, and DNS servers in the domains you choose. You can enable or disable management of these servers by IPAM.

  • Custom IP address space display, reporting, and management: The display of IP addresses is highly customizable and detailed tracking and utilization data is available. IPv4 and IPv6 address space is organized into IP address blocks, IP address ranges, and individual IP addresses. IP addresses are assigned built-in or user-defined fields that can be used to further organize IP address space into hierarchical, logical groups.

  • Audit of server configuration changes and tracking of IP address usage: Operational events are displayed for the IPAM server and managed DHCP servers. IPAM also enables IP address tracking using DHCP lease events and user logon events collected from Network Policy Server (NPS), domain controllers, and DHCP servers. Tracking is available by IP address, client ID, host name, or user name.

  • Monitoring and management of DHCP and DNS services: IPAM enables automated service availability monitoring for Microsoft DHCP and DNS servers across the forest. DNS zone health is displayed, and detailed DHCP server and scope management is available using the IPAM console.

    Reference: IP Address Management (IPAM) Overview

    Question No: 247 – (Topic 9)

    You are planning the implementation of two new servers that will be configured as RADIUS servers.

    You need to recommend which configuration must be performed on the VPN servers. The solution must meet the technical requirements.

    What should you do on each VPN server?

    1. Add a RADIUS client.

    2. Install the Health Registration Authority role service.

    3. Enable DirectAccess.

    4. Modify the authentication provider.

    Answer: D Explanation:

    • Implement RADIUS authentication for VPN connections.

    • The new sales.contoso.com domain will contain a web application that will access data from a Microsoft SQL Server located in the contoso.com domain. The web application must use integrated Windows authentication. Users#39; credentials must be passed from the web applications to the SQL Server.

      Question No: 248 – (Topic 9)

      You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation?

      1. Microsoft Baseline Security Analyzer (MBSA)

      2. Microsoft Desktop Optimization Pack (MDOP)

      3. Microsoft System Center 2012 Operations Manager

      4. Microsoft System Center 2012 Data Protection Manager (DPM)

      Answer: B Explanation:

    • Scenario:

      / All changes to Group Policies must be logged.

      / Administrators in the Paris office need to deploy a series of desktop restrictions to the entire company by using Group Policy.

    • Microsoft Desktop Optimization Pack

      Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution.

      What is the Microsoft Desktop Optimization Pack?

      The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services.

      MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies- available only to Windows Software Assurance customers.

      Reference: Microsoft Desktop Optimization Pack

      URL: http://technet.microsoft.com/en-us/library/cc507880.aspx

      Question No: 249 – (Topic 9)

      You implement and authorize the new DHCP servers. You import the server configurations and the scope configurations from PA1 and AM1.

      You need to ensure that clients can obtain DHCP address assignments after you shut down PA1 and AM1. The solution must meet the technical requirements.

      What should you do?

      1. Run the Get-DhcpServerv4Lease cmdlet and the Remove-DhcpServerv4Lease cmdlet. Run the Windows Server Migration Tools.

      2. Run the Get-DhcpServerv4Lease cmdlet and the Add-DhcpServerv4Lease cmdlet. Activate the scopes.

      3. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke- DhcpServerv4FailoverReplication cmdlet. Run the Windows Server Migration Tools.

      4. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke- DhcpServerv4FailoverReplication cmdlet Activate the scopes.

      Answer: B

      Explanation: The Get-DhcpServerv4Lease cmdlet gets one or more lease records from the Dynamic Host Configuration Protocol (DHCP) server service.

      The Add-DhcpServerv4Lease cmdlet adds a new IPv4 address lease on the Dynamic Host Configuration Protocol (DHCP) server service. This cmdlet is only supported for DHCP server service running on Windows Server庐 2012.

      Question No: 250 – (Topic 9)

      You need to recommend a fault-tolerant solution for the VPN. The solution must meet the technical requirements.

      What should you include in the recommendation?

      1. Network adapter teaming

      2. Network Load Balancing (NLB)

      3. Failover Clustering

      4. DirectAccess

      Answer: B Explanation:

    • Scenario: Core networking services in each office must be redundant if a server fails.

    • The Network Load Balancing (NLB) feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or more computers that are running applications into a single virtual cluster, NLB provides reliability and performance for web servers and other mission-critical servers.

      Reference: Network Load Balancing Overview http://technet.microsoft.com/en-us/library/hh831698.aspx

      100% Ensurepass Free Download!
      Download Free Demo:70-980 Demo PDF
      100% Ensurepass Free Guaranteed!
      Download 2018 EnsurePass 70-980 Full Exam PDF and VCE

      EnsurePass ExamCollection Testking
      Lowest Price Guarantee Yes No No
      Up-to-Dated Yes No No
      Real Questions Yes No No
      Explanation Yes No No
      PDF VCE Yes No No
      Free VCE Simulator Yes No No
      Instant Download Yes No No

  • Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.