[Free] 2018(May) EnsurePass Dumpsleader Microsoft 70-980 Dumps with VCE and PDF 271-280

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-980
100% Free Download! 100% Pass Guaranteed!

Recertification for MCSE: Server Infrastructure

Question No: 271 – (Topic 11)

You need to recommend a server deployment strategy for the main office that meets the server deployment requirements.

What should you recommend installing in the main office?

  1. Windows Deployment Services (WDS)

  2. The Windows Automated Installation Kit (Windows AIK)

  3. The Express Deployment Tool (EDT)

  4. The Windows Assessment and Deployment Kit (Windows ADK)

Answer: A

Explanation: WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation.

This means that you do not have to install each operating system directly from a CD, USB drive, or DVD.

Reference: What#39;s New in Windows Deployment Services in Windows Server

Question No: 272 – (Topic 11)

You need to recommend a solution that meets the security requirements. Which schema attribute properties should you recommend modifying?

  1. isIndexed

  2. searchFlags

  3. isCriticalSystemObject

  4. schemaFlagsEx

Answer: B Explanation:

  • Scenario: Confidential attributes must not be replicated to the Chicago office.

  • Applies To: Windows Server 2008, Windows Server 2012

    This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema.

  • Determine and then modify the current searchFlags value of an attribute

  • Verify that an attribute is added to the RODC FAS

    – Determine and then modify the current searchFlags value of an attribute

    To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags:

  • To add the attribute to the RODC FAS, set the 10th bit to 0x200.

  • To mark the attribute as confidential, set the 7th bit to 0x080.

  • Reference: Adding Attributes to the RODC Filtered Attribute Set http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx

    Question No: 273 – (Topic 11)

    You need to recommend a Group Policy strategy to support the company#39;s planned changes.

    What should you include in the recommendation?

    1. Link a Group Policy object (GPO) to the AllComputers OU in each domain.

    2. Link a Group Policy object (GPO) to litwareinc.com and configure filtering.

    3. Link a Group Policy object (GPO) to each domain.

    4. Link a Group Policy object (GPO) to the Boston site.

    Answer: D Explanation:

    We link a GPO, which implements folder redirection and deploys App1 for the Boston Users.

    • Scenario:

      Implement Folder Redirection in the Boston office only.

      Deploy an application named Appl to all of the users in the Boston office only.

      Question No: 274 – (Topic 11)

      You need to recommend a remote access solution that meets the VPN requirements. Which role service should you include in the recommendation?

      1. Routing

      2. Network Policy Server

      3. DirectAccess and VPN (RAS)

      4. Host Credential Authorization Protocol

      Answer: B Explanation: Scenario:

      A server that runs Windows Server 2012 will perform RADIUS authentication for all of the VPN connections.

      Ensure that NAP with IPSec enforcement can be configured.

      Network Policy Server

      Network Policy Server (NPS) allows you to create and enforce organization-wide network access policies for client health, connection request authentication, and connection request authorization. In addition, you can use NPS as a Remote Authentication Dial-In User Service

      (RADIUS) proxy to forward connection requests to a server running NPS or other RADIUS servers that you configure in remote RADIUS server groups.

      NPS allows you to centrally configure and manage network access authentication, authorization, are client health policies with the following three features: RADIUS server. NPS performs centralized authorization, authorization, and accounting for wireless, authenticating switch, remote access dial-up and virtual private network (VNP)

      connections. When you use NPS as a RADIUS server, you configure network access servers, such as wireless access points and VPN servers, as RADIUS clients in NPS. You also configure network policies that NPS uses to authorize connection requests, and you can configure RADIUS accounting so that NPS logs accounting information to log files on the local hard disk or in a Microsoft SQL Server database.

      Reference: Network Policy Server http://technet.microsoft.com/en-us/library/cc732912.aspx

      Question No: 275 – (Topic 11)

      You need to recommend a server virtualization strategy that meets the technical requirements and the virtualization requirements.

      What should you include in the recommendation?

      1. Windows Server Backup

      2. The Microsoft Virtual Machine Converter

      3. Microsoft System Center 2012 Virtual Machine Manager (VMM)

      4. Disk2vhd

      Answer: C Explanation:

    • Scenario:

    Virtualize the application servers.

    Automatically distribute the new virtual machines to Hyper-V hosts based on the current resource usage of the Hyper-V hosts.

    The main office has the following servers: Five physical Hyper-V hosts that run Windows Server 2012

    • System Center Virtual Machine Manager 2012: VMM Gets Major Upgrade

      Expanded hypervisor support, virtual application support and a myriad of other upgrades are coming in the new VMM 2012.

      Note: There#39;s no doubt that Microsoft is making System Center Virtual Machine Manager (VMM) a key component of the System Center suite. The scope of the product is being

      expanded so much that it could be renamed quot;System Center Virtual Datacenter Manager.quot; The new version of

      VMM is currently in beta and is scheduled for release in the second half of 2011.

      VMM can now do bare-metal installations on fresh hardware, create Hyper-V clusters instead of just managing them, and communicate directly with your SAN arrays to provision storage for your virtual machines (VMs). The list of supported hypervisors has also arown-it includes not only Hyper-V and VMware vSphere Hvpervisor, but

      Reference: System Center Virtual Machine Manager 2012: VMM Gets Major Upgrade http://technet.microsoft.com/en-gb/magazine/hh300651.aspx

      Question No: 276 – (Topic 11)

      You need to ensure that NAP meets the technical requirements. Which role services should you install?

      1. Network Policy Server, Health Registration Authority and Host Credential Authorization Protocol

      2. Health Registration Authority, Host Credential Authorization Protocol and Online Responder

      3. Certification Authority, Network Policy Server and Health Registration Authority

      4. Online Responder, Certification Authority and Network Policy Server

      Answer: C Explanation:

    • Scenario:

      Implement Network Access Protection (NAP).

      Ensure that NAP with IPSec enforcement can be configured.

    • Health Registration Authority

      Applies To: Windows Server 2008 R2, Windows Server 2012

      Health Registration Authority (HRA) is a component of a Network Access Protection (NAP) infrastructure that plays a central role in NAP Internet Protocol security (IPsec) enforcement.

      HRA obtains health certificates on behalf of NAP clients when they are compliant with network health requirements. These health certificates authenticate NAP clients for IPsec-

      protected communications with other NAP clients on an intranet. If a NAP client does not have a health certificate, the IPsec peer authentication fails and the NAP client cannot initiate communication with other IPsec-protected computers on the network.

      HRA is installed on a computer that is also running Network Policy Server (NPS) and Internet

      Information Services (IIS). If they are not already installed, these services will be added when you install HRA.

      Reference: Health Registration Authority

      Question No: 277 – (Topic 11)

      You need to implement the technical requirements for the boston.litwareinc.com domain. Which tools should you use?

      1. Gpfixup and Gpupdate

      2. Rendom and Gpfixup

      3. Gpupdate and Dcgpofix

      4. Adprep and Rendom

      Answer: B Explanation:

    • Scenario, technical requirements include:

      Minimize the amount of administrative effort whenever possible Rename boston.litwareinc.com domain to bos.litwareinc.com

    • Rendom.exe is a command-line tool that is used to rename Active Directory domains. Gpfixup fixes domain name dependencies in Group Policy Objects and Group Policy links after a domain rename operation.

    Reference: Rendom

    http://technet.microsoft.com/en-us/library/cc732097(v=ws.10).aspx Reference: Gpfixup

    https://technet.microsoft.com/en-us/library/hh852336.aspx

    Question No: 278 – (Topic 11)

    You need to recommend a migration strategy for the DHCP servers. The strategy must meet the technical requirements.

    Which Windows PowerShell cmdlet should you recommend running on the physical DHCP servers?

    1. Import-SmigServerSetting

    2. Export-SmigServerSetting

    3. Receive-SmigServerData

    4. Send-SmigServerData

    Answer: B Explanation: * Scenario:

    / Main office: One physical DHCP server that runs Windows Server 2008 R2

    / each branch office: One physical DHCP server that runs Windows Server 2008 R2

    / The IPAM server in the main office gathers data from the DNS servers and the DHCP servers in all of the offices.

    * Example:

    Command Prompt: C:\PSgt;

    Export-SmigServerSetting -Feature quot;DHCPquot; -User All -Group -Path quot;c:\temp\storequot; – Verbose

    This sample command exports the Dynamic Host Configuration Protocol (DHCP) Server and all other Windows features that are required by DHCP Server.

    Reference: DHCP Server Migration: Migrating the DHCP Server Role https://technet.microsoft.com/en-us/library/dd379483(v=ws.10).aspx

    Topic 12, Northwind Traders A

    Overview

    Northwind Traders is a retail company.

    The company has offices in Montreal and San Diego. The office in Montreal has 1,000 client computers. The office in San Diego has 100 computers. The computers in the San Diego office are often replaced. The offices connect to each other by using a slow WAN link. Each office connects directly to the Internet.

    Existing Environment

    Active Directory Environment

    The network contains an Active Directory forest named northwindtraders.com. The forest contains two domains named northwindtraders.com and west.northwindtraders.com. All servers run Windows Server 2012 R2.

    All client computers run Windows 7.

    Each office is configured as an Active Directory site. The site in the Montreal office is named Site1. The site in the San Diego office is named Site2.

    The forest contains four domain controllers. The domain controllers are configured as shown in the following table.

    Ensurepass 2018 PDF and VCE

    DC1, DC2, and DC3 are writable domain controllers. R0DC1 is read-only domain controller (RODC). All DNS zones are Active Directory-integrated. All zones replicate to all of the domain controllers.

    All of the computers in the San Diego office are configured to use RODC1 as their only DNS server.

    The northwindtraders.com domain contains a Group Policy object (GPO) named GPO1. GP01 is applied to all of the users in the Montreal office.

    All of the user accounts for the Montreal users are in the northwindtraders.com domain. All of the user accounts for the San Diego users are in the west.northwindtraders.com domain.

    Network Environment

    Site1 contains the member servers in the northwindtraders.com domain shown in the following table.

    Ensurepass 2018 PDF and VCE

    Server1 connects to SAN storage that supports Offloaded Data Transfer (ODX). All virtual hard disks (VHDs) are stored on the SAN.

    A web application named App1 is installed on Servers.

    Server3 has a shared folder that contains sales reports. The sales reports are read frequently by the users in both offices. The reports are generated automatically once per week by an enterprise resource planning (ERP) system.

    A perimeter network in the Montreal office contains two standalone servers. The servers are configured as shown in the following table.

    Ensurepass 2018 PDF and VCE

    The servers in the perimeter network are accessible from the Internet by using a domain name suffix of public.northwindtraders.com.

    Each administrator has a management computer that runs Windows 8.1.

    Requirements Planned Changes

    Northwind Traders plans to implement the following changes:

    On Server1, create four virtual machines that run Windows Server 2012 R2. The servers will be configured as shown in the following table.

    Ensurepass 2018 PDF and VCE

    -> Configure IP routing between Site1 and the network services that Northwind Traders hosts in Windows Azure.

    -> Place a domain controller for the northwindtraders.com domain in Windows Azure.

    -> Upgrade all of the computers in the Montreal office to Windows 8.1.

    -> Purchase a subscription to Microsoft Office 365.

    -> Configure a web application proxy on Server6.

    -> Configure integration between VMM and IPAM.

    -> Apply GPO1 to all of the San Diego users.

    -> Connect Site1 to Windows Azure.

    Technical Requirements

    Northwind Traders must meet the following technical requirements:

    -> All virtual machines must use ODX.

    -> Users must be able to access App1 from the Internet.

    -> GPO1 must not be applied to computers that run Windows 8.1.

    -> All DNS zones must replicate only to DC1, DC2, and DC3.

    -> All computers must be able to resolve names by using a local DNS server.

    -> If a WAN link fails, users must be able to access all of the sales reports.

    -> The credentials for accessing Windows Azure must be permanently stored.

    -> The on-premises network must be connected to Windows Azure by using Server4.

    -> The administrators must be able to manage Windows Azure by using Windows PowerShell.

    -> The number of servers and services deployed in the San Diego office must be minimized.

    -> Active Directory queries for the objects in the forest must not generate WAN traffic, whenever possible.

    Security Requirements

    Northwind Traders identifies the following security requirements:

    -> Ensure that all DNS zone data is encrypted when it is replicated.

    -> Minimize the number of permissions assigned to users and administrators, whenever possible. Prevent an Active Directory Domain Services (AD DS) attribute named SSNumber from replicating to Site2.

    -> Ensure that users can use their northwindtraders.com user account to access the resources hosted in Office 365.

    -> Prevent administrators from being required to re-enter their credentials when they manage Windows Azure from approved management computers.

    Question No: 279 HOTSPOT – (Topic 12)

    You are evaluating the virtual machine environment.

    In the table below, identify which virtual machines currently support ODX and which virtual machines require a configuration change to support ODX. Make only one selection in each row.

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    Explanation:

    Ensurepass 2018 PDF and VCE

    • VM1 uses IDE and does not support ODX. The other VMs are ok.

    • ID requirements include:

    Must be connected by using one of the following protocols: iSCSI

    Fibre Channel

    Fibre Channel over Ethernet Serial Attached SCSI (SAS)

    Note: Windows Offloaded Data Transfer (ODX) functionality in Windows maximizes an enterprise’s investment in intelligent storage arrays by enabling the arrays to directly transfer data within or between compatible storage devices, bypassing the host computer.

    Question No: 280 HOTSPOT – (Topic 12)

    You need to recommend a solution for communicating to Windows Azure services.

    What should you recommend? To answer, select the appropriate options in the answer area.

    Ensurepass 2018 PDF and VCE

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    100% Ensurepass Free Download!
    Download Free Demo:70-980 Demo PDF
    100% Ensurepass Free Guaranteed!
    Download 2018 EnsurePass 70-980 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.