♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-980 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-980 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-980-exam-dumps.html

Q61. - (Topic 1) 

You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation? 

A. Microsoft Baseline Security Analyzer (MBSA) 

B. Microsoft Desktop Optimization Pack (MDOP) 

C. Microsoft System Center 2012 Operations Manager 

D. Microsoft System Center 2012 Data Protection Manager (DPM) 

Answer:

Explanation: 

D:Documents and SettingsuseralboDesktop1.jpg 

Microsoft Desktop Optimization Pack Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution. What is the Microsoft Desktop Optimization Pack? The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services. MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies— available only to Windows Software Assurance customers. http://technet.microsoft.com/en-us/library/cc507880.aspx 


Q62. - (Topic 6) 

You need to recommend changes to the virtual desktop infrastructure (VDI) environment. 

What should you recommend? 

A. Implement Hyper-V replication between VDI1 and VDI2. 

B. Create new VDI virtual machines that are Generation 2 virtual machines. 

C. Convert the existing VHDs to .vhdx format. 

D. Move the VHDs to a Cluster Shared Volume (CSV) and implement Data Deduplication on the CSV. 

Answer:


Q63. - (Topic 4) 

You need to recommend a solution for GPO1. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. In west.northwindtraders.com, create a copy of GPO1 and link the new GPO to Site2. Apply a WMI filter to the new GPO. 

B. In west.northwindtraders.com, create a copy of GPO1 and link the new GPO to west.northwindtraders.com. Configure security filtering on the new GPO. 

C. Link GPO1 to west.northwindtraders.com and configure security filtering on GPO1. 

D. Link GPO1 to Site2 and apply a WMI filter to GPO1. 

Answer:


Q64. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. 

The domain contains the organization units (OUs) configured as shown in the following table. 

Users and computers at the company change often. 

You create a Group Policy object (GPO) named GPO6. GPO6 contains user settings. 

You need to ensure that GPO6 applies to users when they log on to the kiosk computers 

only. The solution must minimize administrative effort. 

What should you do? 

A. Link GPO6 to OU4 and configure loopback processing in GPO6. 

B. Link GPO6 to OU1 and configure WMI filtering on GPO3. 

C. Link GPO6 to OU1 and configure loopback processing in GPO6. 

D. Link GPO6 to OU1 and configure loopback processing in GPO5. 

Answer:


Q65. - (Topic 4) 

You need to recommend a solution for the replication of Active Directory. 

What should you recommend modifying? 

A. The Active Directory Schema 

B. The properties of Site1 

C. The RODC1 computer account 

D. The properties of Site2 

Answer:


Q66. - (Topic 9) 

Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012. 

The forest contains an Active Directory domain. The domain contains a global security group named GPO_Admins that is responsible for managing Group Policies in the forest. 

A second forest named fabrikam.com contains three domains. The forest functional level is Windows Server 2003. 

You need to design a trust infrastructure to ensure that the GPO_Admins group can create, edit, and link Group Policies in every domain of the fabrikam.com forest. 

What should you include in the design? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. A two-way forest trust 

B. A one-way forest trust 

C. Three external trusts 

D. Three shortcut trusts 

Answer:


Q67. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. 

Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2. 

The certification authority (CA) infrastructure of both companies is configured as shown in the following table. 

You need to recommend a certificate solution that meets the following requirements: 

. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com. 

. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com. 

What should you include in the recommendation? 

A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate. 

D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing. 

Answer:


Q68. - (Topic 10) 

Your network contains the following roles and applications: 

Microsoft SQL Server 2012 

Distributed File System (DFS) Replication 

Active Directory Domain Services (AD DS) 

Active Directory Rights Management Services (AD RMS) 

Active Directory Lightweight Directory Services (AD LDS) 

You plan to deploy Active Directory Federation Services (AD FS). 

You need to identify which deployed services or applications can be used as attribute stores for the planned AD FS deployment. 

What should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. DFS 

B. AD RMS 

C. Microsoft SQL Server 2012 

D. AD LDS 

E. AD DS 

Answer: C,D,E 


Q69. - (Topic 6) 

You need to implement a solution for the email attachments. 

Both organizations exchange root CA certificates and install the certificates in the relevant stores. 

You duplicate the Enrollment Agent certificate template and generate a certificate based on the new template. 

Which additional two actions should you perform? Each correct answer presents part of the solution. 

A. Request cross-certification authority certificates. 

B. Create Capolicy.inf files. 

C. Request subordinate CA certificates. 

D. Create Policy.inf files. 

Answer: A,D 


Q70. DRAG DROP - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains five servers. The servers are configured as shown in the following table. 

You plan to implement Network Access Protection (NAP) with IPSec enforcement on all client computers. 

You need to identify on which servers you must perform the configurations for the NAP deployment. 

Which servers should you identify? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer: