Microsoft 70-980 Practice Tests From People Who Created Microsoft 70-980 Exam(1-15)

QUESTION 1
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
 clip_image001_thumb_thumb_thumb_thumb_thumb
All client computers run either Windows 7 or Windows 8.
Goal: You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the 802.1x Network Access Protection (NAP) enforcement method.
Does this meet the goal?

A.    Yes
B.    No

Answer: A

QUESTION 2
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
 clip_image001[4]_thumb_thumb_thumb_thumb_thumb
All client computers run either Windows 7 or Windows 8. The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the VPN enforcement method.
Does this meet the goal?

A.    Yes
B.    No

Answer: B

QUESTION 3
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
 clip_image001[6]_thumb_thumb_thumb_thumb_thumb
All client computers run either Windows 7 or Windows 8. The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the DHCP Network Access Protection (NAP) enforcement method.
Does this meet the goal?

A.    Yes
B.    No

Answer: A

QUESTION 4
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains five servers. The servers are configured as shown in the following table.
 clip_image001[8]_thumb_thumb_thumb_thumb_thumb
You plan to implement Network Access Protection (NAP) with IPSec enforcement on all client computers.
You need to identify on which servers you must perform the configurations for the NAP deployment.
Which servers should you identify? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
 clip_image001[10]_thumb_thumb_thumb_thumb_thumb
Answer:
 clip_image001[12]_thumb_thumb_thumb_thumb_thumb

QUESTION 5
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access.
Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 clip_image002_thumb_thumb_thumb_thumb_thumb
Answer:
 clip_image002[4]_thumb_thumb_thumb_thumb_thumb
Explanation:
http://technet.microsoft.com/en-us/library/bb496429.aspx

QUESTION 6
Your network contains an Active Directory domain. All servers run Windows Server 2012 R2.
The domain contains the servers shown in the following table.
 clip_image002[6]_thumb_thumb_thumb_thumb_thumb
You need to recommend which servers will benefit most from implementing data deduplication.
Which servers should you recommend?

A.    Server1 and Server2
B.    Server1 and Server3
C.    Server1 and Server4
D.    Server2 and Server3
E.    Server2 and Server4
F.    Server3 and Server4

Answer: D

QUESTION 7
Your network contains an Active Directory forest named adatum.com. All domain controllers run Windows Server 2008 R2. The functional level of the domain and the forest is Windows Server 2008. You deploy a new Active Directory forest named contoso.com. All domain controllers run Windows Server 2012 R2. The functional level of the domain and the forest is Windows Server 2012 R2. You establish a two-way, forest trust between the forests. Both networks contain member servers that run either Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 or Windows Server 2008.
You plan to use the Active Directory Migration Tool 3.2 (ADMT 3.2) to migrate user accounts from adatum.com to contoso.com. SID history will be used in contoso.com and passwords will be migrated by using a Password Export Server (PES).
You need to recommend which changes must be implemented to support the planned migration. Which two changes should you recommend? Each correct answer presents part of the solution.

A.    In the contoso.com forest, deploy a domain controller that runs Windows Server 2008 R2.
B.    In the adatum.com forest, upgrade the functional level of the forest and the domain.
C.    In the contoso.com forest, downgrade the functional level of the forest and the domain.
D.    In the adatum.com forest, deploy a domain controller that runs Windows Server 2012 R2.

Answer: AC

QUESTION 8
Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008.
You plan to implement Windows Server 2012 R2.
You need to create a report that includes the following information:
The servers that run applications and services that can be moved to Windows Server 2012 R2 The servers that have hardware that can run Windows Server 2012 R2 The servers that are suitable to be converted to virtual machines hosted on Hyper-V hosts that run Windows Server 2012 R2
Solution: You install Windows Server 2012 R2 on a new server, and then you run Microsoft Deployment Toolkit (MDT) 2012.
Does this meet the goal?

A.    Yes
B.    No

Answer: B

QUESTION 9
Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008.
You plan to implement Windows Server 2012 R2.
You need to create a report that includes the following information:
The servers that run applications and services that can be moved to Windows Server 2012 R2 The servers that have hardware that can run Windows Server 2012 R2 The servers that are suitable to be converted to virtual machines hosted on Hyper-V hosts that run Windows Server 2012 R2
Solution: You install Windows Server 2012 R2 on a new server, and then you run the Windows Server Migration Tools. Does this meet the goal?

A.    Yes
B.    No

Answer: B

QUESTION 10
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites.
You plan to deploy DirectAccess.
The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network.
You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement
Solution: You set the ISATAP State to state disabled.
Does this meet the goal?

A.    Yes
B.    No

Answer: B

QUESTION 11
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites.
You plan to deploy DirectAccess.
The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network.
You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement.
Solution: You enable split tunneling.
Does this meet the goal?

A.    Yes
B.    No

Answer: B

QUESTION 12
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server server role installed.
You configure Server1 as part of a Network Access Protection (NAP) solution that uses the 802.lx enforcement method,
You add a new switch to the network and you configure the switch to use 802.lx authentication. You need to ensure that only compliant client computers can access network resources through the new switch.
What should you do on Server1?

A.    Add the IP address of each new switch to a remediation server group.
B.    Add the IP address of each new switch to the list of RADIUS clients.
C.    Add the IP address of each new switch to a connection request policy as an Access Client IPv4 Address.
D.    Add the IP address of each new switch to a remote RADIUS server group.

Answer: B

QUESTION 13
Your network contains an Active Directory domain named contoso.com.
Your company has 100 users in the sales department. Each sales user has a domain-joined laptop computer that runs either Windows 7 or Windows 8. The sales users rarely travel to the company’s offices to connect directly to the corporate network. You need to recommend a solution to ensure that you can manage the sales users’ laptop computers when the users are working remotely.
What solution should you include in the recommendation?

A.    Deploy the Remote Access server role on a server on the internal network.
B.    Deploy the Network Policy and Access Services server role on a server on the internal network.
C.    Deploy a Microsoft System Center 2012 Service Manager infrastructure.
D.    Deploy a Microsoft System Center 2012 Operations Manager infrastructure.

Answer: A

QUESTION 14
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain has a certification authority (CA).
You create four certificate templates. The templates are configured as shown in the following table:
 clip_image001[14]_thumb_thumb_thumb_thumb_thumb
You install the Remote Access server role in the domain.
You need to configure DirectAccess to use one-time password (OTP) authentication.
What should you do? To answer, select the appropriate options in the answer area,

 clip_image001[16]_thumb_thumb_thumb_thumb_thumb
Answer:
 clip_image002[8]_thumb_thumb_thumb_thumb_thumb

QUESTION 15
Drag and Drop Question
Your company plans to deploy a remote access solution to meet the following requirements:
– Ensure that client computers that are connected to the Internet can be managed remotely without requiring that the user log on.
– Ensure that client computers that run Windows Vista or earlier can connect remotely.
– Ensure that non-domain-joined computers can connect remotely by using TCP port 443.
You need to identify which remote access solutions meet the requirements.
Which solutions should you identify?
To answer, drag the appropriate solution to the correct requirement in the answer area. Each solution may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
 clip_image002[10]_thumb_thumb_thumb_thumb_thumb
Answer:
 clip_image002[12]_thumb_thumb_thumb_thumb_thumb
Explanation:
* DirectAccess, introduced in the Windows 7 and Windows Server 2008 R2 operating systems, allows remote users to securely access enterprise shares, web sites, and applications without connecting to a virtual private network (VPN).
DirectAccess establishes bi-directional connectivity with a user’s enterprise network every time a user’s DirectAccessenabled portable computer connects to the Internet, even before the user logs on. Users never have to think about connecting to the enterprise network and IT administrators can manage remote computers outside the office, even when the computers are not connected to the VPN. Forefront Unified Access Gateway (UAG) 2010 extends the benefits of DirectAccess across your infrastructure, enhancing scalability and simplifying deployment and ongoing management.
* Both L2TP and IPsec must be supported by both the VPN client and the VPN server. Client support for L2TP is built in to the Windows Vista?and Windows XP remote access clients, and VPN server support for L2TP is built in to members of the Windows Server?2008 and Windows Server 2003 family.
* Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mechanism to transport PPP or L2TP traffic through an SSL 3.0 channel. SSL provides transport-level security with key-negotiation, encryption and traffic integrity checking. The use of SSL over TCP port 443 allows SSTP to pass through virtually all firewalls and proxy servers.

 

Braindump2go New Released Microsoft 70-980 Dump PDF Free Dobwload, 268 Questions in all, Passing Your Exam 100% Easily! http://www.braindump2go.com/70-980.html