EnsurePass
2018 Jan Microsoft Official New Released 70-980
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-980.html

Recertification for MCSE: Server Infrastructure

Question No: 171 – (Topic 8)

Your network contains five servers that run Windows Server 2012. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.

Each virtual machine will run Windows Server 2012. All of the virtual machines will run the identical web application.

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.

You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

What should you do?

  1. From the properties of each virtual machine, add a second virtual network adapter. Connect the new virtual network adapters to the external virtual network switch. Configure the new virtual network adapters to use a VLAN identifier of 2.

  2. On each Hyper-V server, create a new private virtual network switch. From the properties of each virtual machine, add a second virtual network adapter. Connect the new virtual network adapters to the new private virtual network switches.

  3. On each Hyper-V server, create a new external virtual network switch. From the properties of each virtual machine, add a second virtual network adapter. Connect the new virtual network adapters to the new external virtual network switches.

  4. From the properties of each virtual machine, enable MAC address spoofing for the existing virtual network adapter.

Answer: D Explanation:

MAC spoofing

The changing of the assigned MAC address may allow the bypassing of access control lists

on servers or routers, either hiding a computer on a network or allowing it to impersonate another network device.

A user may wish to legitimately spoof the MAC address of a previous hardware device in order to reacquire connectivity after hardware failure.

Ensurepass 2018 PDF and VCE

t8 q106

Reference: http://blogs.technet.com/b/jhoward/archive/2009/05/21/new-in-hyper-v- windows-server-2008-r2-part-2-macspoofing.aspx

Question No: 172 DRAG DROP – (Topic 8)

You plan to delegate the management of virtual machines to five groups by using Microsoft

System Center 2012 Virtual Machine Manager (VMM).

The network contains 20 Hyper-V hosts in a host group named HostGroup1. You identify the requirements for each group as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to identify which user role must be assigned to each group. Which user roles should you identify?

To answer, drag the appropriate user role to the correct group in the answer area. Each user role may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

t8 q140-3

Ensurepass 2018 PDF and VCE

t8 q140-4

References: http://mountainss.wordpress.com/2011/11/19/user-roles-in-system-center- virtual-machine-manager-2012/

http://technet.microsoft.com/en-us/library/gg696971.aspx

Question No: 173 HOTSPOT – (Topic 8)

You plan to deploy a certification authority (CA) infrastructure that contains the following servers:

-> An offline standalone root CA named CA1

-> An enterprise subordinate CA named CA2

On all of the computers, you import the root CA certificate from CA1 to the Trusted Root

Certification Authorities Certificates store.

You need to ensure that CA2 can issue certificates for the CA hierarchy.

What should you do? To answer, select the appropriate options in the answer area.

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Question No: 174 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. The network contains a perimeter network. The perimeter network and the internal network are separated by a firewall.

On the perimeter network, you deploy a server named Server1 that runs Windows Server 2012.

You deploy Active Directory Certificate Services (AD CS). Each user is issued a smart card.

Users report that when they work remotely, they are unable to renew their smart card certificate.

You need to recommend a solution to ensure that the users can renew their smart card certificate from the Internet.

What should you recommend implementing on Server1?

More than one answer choice may achieve the goal. Select the BEST answer.

  1. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role service

  2. The Active Directory Federation Services server role

  3. An additional certification authority (CA) and the Online Responder role service

  4. The Certification Authority Web Enrollment role service and the Online Responder role service

Answer: A

Question No: 175 – (Topic 8)

You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.

Solution: You create a Windows Events monitor in SCOM and configure it to monitor

events related to the http.sys service? Does this meet the goal?

  1. Yes

  2. No

Answer: B

Explanation: Just monitoring the service will not restart it.

Question No: 176 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.

Does this meet the goal?

  1. Yes

  2. No

Answer: B

Question No: 177 – (Topic 8)

You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM).

You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.

What should you do?

  1. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines.

  2. Set the Priority property of the virtual machine cluster role.

  3. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines.

  4. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines.

Answer: D

Question No: 178 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. You plan to implement Microsoft System Center 2012.

You need to identify which solution automates the membership of security groups for contoso.com. The solution must use workflows that provide administrators with the ability to approve the addition of members to the security groups.

Which System Center 2012 roles should you identify?

  1. Configuration Manager and Orchestrator

  2. Service Manager and Virtual Machine Manager (VMM)

  3. Orchestrator and Service Manager

  4. Operations Manager and Orchestrator

Answer: C

Question No: 179 DRAG DROP – (Topic 8)

You need to ensure that all new production Hyper-V virtual machines can be deployed correctly.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Question No: 180 – (Topic 8)

An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.

Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server and apply the required NTFS permissions to the files.

Does this meet the goal?

  1. Yes

  2. No

Answer: B

100% Free Download!
Download Free Demo:70-980 Demo PDF
100% Pass Guaranteed!
Download 2018 EnsurePass 70-980 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2018 EnsurePass IT Certification PDF and VCE