microsoft.braindumps2go.70-243.v2015-08-03.by.johntheman · exam a question 1 note: this question...

131
Braindump2go.70-243.Premium.VCE.103q Number : 70-243 Passing Score : 925 Time Limit : 120 min File Version : 14.121 http://www.gratisexam.com/ Vendor: Microsoft Exam Code: 70-243 Exam Name: Administering and Deploying System Center 2012 Configuration Manager Version: 14.121

Upload: others

Post on 06-Sep-2019

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Braindump2go.70-243.Premium.VCE.103q

Number: 70-243Passing Score: 925Time Limit: 120 minFile Version: 14.121

http://www.gratisexam.com/

Vendor: Microsoft

Exam Code: 70-243

Exam Name: Administering and Deploying System Center 2012 Conf iguration Manager

Version: 14.121

Page 2: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Exam A

QUESTION 1Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. You create a deployment to install Microsoft Office 2010. The deployment targets 5,000 client computers on the network. Two weeks after you create thedeployment, you discover that Office 2010 fails to install on a client computer named Computer 1. You need to identify whether Computer1 started downloading theApplication of Office 2010. Which log file should you review?

A. Locationservices.logB. Ccm.logC. Sdmagent.logD. Sitestat.logE. Rcmctrl.logF. Dcmagent.logG. Contenttransfermanager.logH. Smsexec.logI. Wsyncmgr.logJ. Ciagent.logK. Hman.tog

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Explanation:How to find if download start, TS using log file: ContentTransferManager.log SDMAgent.log - desired configuration management and contains the tracking processof remediation and compliance. dcmagent.log - Provides high-level information about the evaluation of assigned configuration baselines CIAgent.log - Tracks theprocess of remediation and compliance Updateshandler.log - provides more informative details on installing the software updates wsyncmgr.log -Providesinformation about the software updates synchronization process Smsexec.log - Records processing of all site server component threads.ContentTransferManager.log- Schedules the Background Intelligent Transfer Service (BITS) or the Server

QUESTION 2Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration site named Site1 and a primarysite named Site2. You discover that none of the collections created on Site1 are displayed on Site2. You need to identify whether there is replication issue betweenthe sites. What should you review?

A. the Colleval.log file.

Page 3: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

B. the Despool.log fileC. the Rcmctrl.log fileD. the Sender.log file

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:despool.logRecords incoming site-to-site communication transfers. rcmctrl.log Records the activities of database replication between sites in the hierarchy. sender.log Recordsthe files that transfer by file-based replication between sites.

QUESTION 3Your network contains a System Center 2012 Configuration Manager environment.You write the following query:

select SYS.Name from SMS_R_System SYSjoin SMS_G_Syatem_ADD_REMOVE_PROGRAMS ARPon ARP.ResourceId = SYS.ResourceId

You need to create a list of all the client computers that have a version of Visual Studio installed.What should you add to the query?

A. where ARP.DisplayName like "Visual Studio*"B. where ARP.DisplayName = "*Visual Studio*"C. where ARP.DisplayNarae = "%%Visual Studio"D. where ARP.DisplayName like "Visual studio%"

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:You need to use "Like" not "=" otherwise the WildCard "%" is seen as a real identifier.

QUESTION 4Your network contains a System Center 2012 Configuration Manager environment. You need to receive an email message every day that lists all non-compliant

Page 4: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

clients. What should you do?

http://www.gratisexam.com/

A. Create an alert subscription.B. Configure a Microsoft SQL Server Reporting Services (SSRS) report.C. Configure an in-console alert.D. Create a ConfigMgr query.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 5: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Configure report subscription is with the same procedure as standard SQL report servicehttp://be.enhansoft.com/post/2013/08/14/How-to-Set-up-an-Email-Subscription-in-SSRS.aspx

QUESTION 5Your network contains a System center 2012 Configuration Manager environment. The environment contains a reporting services point. A group of users isresponsible for creating custom reports. The custom reports will be published. You need to identify which tools can be used to create and publish custom reports toMicrosoft SQL Server Reporting Services (SSRS). Which tools should you identify? (Choose all that apply.)

A. Report BuilderB. Microsoft SQL Server Business Intelligence Development StudioC. Microsoft Access 2010D. Reporting Services Configuration ManagerE. Microsoft SQL Server Management Studio

Correct Answer: ABDSection: (none)Explanation

Page 6: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation/Reference:Explanation:A: http://technet.microsoft.com/en-us/library/hh213578.aspxB: http://en.wikipedia.org/wiki/Business_Intelligence_Development_StudioD: http://technet.microsoft.com/en-us/library/ms156305.aspx

QUESTION 6Your network contains a System Center 2012 Configuration Manger environment. You need to create a collection that contains all of the virtual machines. Whichquery should you use?

A. select * from SMS_R_Systemwhere SMS_R_System.ResourceID not in(select ResourceID from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine != 1)

B. select * from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine != 1

C. select * from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine = 1

D. select * from SMS_R_Systemwhere SMS_R_System.ResourceID not in(select ResourceID from|SMS_R_Systemwhere SMS_R_System.IsVirtualMachine = 1)

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:SELECT all FROM Systems TableWHERE System property IsVirtualMachine = TRUE

QUESTION 7Your network contains a System Center 2012 Configuration Manger environment. You need to create a report that list all of the client computers that have anapplication named App1 installed.Which query should you use to create the report?

A. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_Sytem AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 NOT LIKE 'App1'

Page 7: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

B. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID NOT IN(SELECT SYS.ResouceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1')

C. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_Sytem AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 NOT IN ('App1')

D. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID IN(SELECT SYS.ResouceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1')

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:SELECT computer name FROM table v_R_System (SQL Syntax)WHERE resource ResourceID is INAdd Remove Programs WHERE DisplayName0 = 'App1'http://www.w3schools.com/sql/sql_join_inner.aspSQL INNER JOIN KeywordThe INNER JOIN keyword returns rows when there is at least one match in both tables.

QUESTION 8Your network contains a System Center 2012 Configuration Manager environment. You create a report that lists compliance information. You schedule the report torun every day at 20:00. You need to ensure that on Friday, you can review the results of the report created on the previous Monday. What should you configure thereport to do?

A. Use snapshots.B. Use caching.C. Render on Friday.D. Use a shared schedule.

Page 8: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/ms156325.aspxCreating, Modifying, and Deleting Snapshots in Report HistoryReport history is a collection of report snapshots. You can maintain report history by adding and deleting snapshots, or by modifying properties that affect reporthistory storage. You can create report history manually or on a schedule. Further information:http://technet.microsoft.com/en-us/library/ms157447.aspxCache a Report (Report Manager)One way to improve performance is to configure caching properties for a report. When a report is cached, a copy of the rendered report is saved for a short periodof time. The first user who requests the report must wait for all processing to complete before viewing the report. Subsequent users who request the report withinthe caching period can view it right away because processing has already occurred.

QUESTION 9Your company uses System Center 2012 Configuration Manager to distribute operating system images. You receive 300 new client computers. All of the clientcomputers have the same hardware configuration. When you attempt to deploy a Windows 7 image to one of the client computers, you receive an error messageindicating that a storage device cannot be found during the pre-boot deployment phase. You need to ensure that you can deploy Windows 7 to the new clientcomputers by using an image. What should you do?

A. Import the storage drivers to the Drivers container and update the task sequence.B. Create a new driver package and update the task sequence.C. Update the existing boot image to include the storage drivers.D. Clear the contents of the Drivers container and update the task sequence.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712674.aspxPlanning a Device Driver Strategy in Configuration Manager...Planning a Device Driver Strategy in Configuration ManagerYou can add Windows device drivers that have been imported into the driver catalog to boot images. Use the following guidelines when you add device drivers to aboot image:* Add only mass storage and network adapter device drivers to boot images because other types of drivers are not generally required. Drivers that are not required

Page 9: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

increase the size of the boot image unnecessarily.* Add only device drivers for Windows 7 to a boot image because the required version of Windows PE is based on Windows 7.* Ensure that you use the correct device driver for the architecture of the boot image. Do not add an x86 device driver to an x64 boot image.

QUESTION 10Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.)

The network contains six servers. The servers are configured as shown in the following table.

Page 10: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

You need to ensure that mobile device information is available in the hardware inventory. What should you do?

A. Install a management point on Server5.B. Configure IIS to support only HTTPS on Server5.C. Install a management point on Server2.D. Install Network Load Balancing (NLB) on Server3.E. Install an enrollment proxy point on Server6.F. Configure IIS to support only HTTP on Server3.G. Configure the Exchange connector on Server3.H. Install Network Load Balancing (NLB) on Server6.I. Install a PXE-enabled protected distribution point on Server5.J. Install the Windows Cluster service on Server3.K. Install a PXE-enabled protected distribution point on Server4.L. Install the Windows Cluster service on Server6.M. Install Windows Server Update Services (WSUS) on Server3.N. Install a protected distribution point on Server1.

Page 11: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

O. Install a software update point on Server3.

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682022.aspxDetermine How to Manage Mobile Devices in Configuration ManagerUse the following information to help you decide how to manage mobile devices in System Center 2012 Configuration Manager. You can use ConfigurationManager to enroll mobile devices and install the Configuration Manager client, you can use the mobile device legacy client (for example, for Windows CE mobileoperating systems), and you can use the Exchange Server connector. In addition, in Configuration Manager SP1, you can enroll devices that run Windows Phone 8,Windows RT, and iOS by using the Windows Intune connector.The following table lists these four mobile device management methods and provides information about the management functions that each method supports:..

...http://technet.microsoft.com/en-us/library/gg681976.aspx#BKMK_Determine_EnrollmentPointsDetermine the Site System Roles for Client Deployment in Configuration Manager - Determine Whether You Require an Enrollment Point and an Enrollment ProxyPointConfiguration Manager requires the enrollment point and the enrollment proxy point to enroll mobile devices and to enroll certificates for Mac computers(Configuration Manager SP1 only). These site system roles are not required if you will manage mobile devices by using the Exchange Server connector, or if youinstall the mobile device legacy client (for example, for Windows CE), or if you request and install the client certificate on Mac computers independently fromConfiguration Manager.

QUESTION 11Your network contains a System Center 2012 Configuration Manager environment. You create a report named Report1. Report1 is used by multiple users. Usersreport that it takes too long to load Report1. You need to reduce the amount of time it takes to load Report1. What should you do?

A. Enable caching for the report.B. Decrease the Size of the ReportServer database.C. Decrease the session timeout value for the Reports website.

Page 12: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

D. Increase the size of the ReportServerTempDB database.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:Report caching can shorten the time it takes for a user to retrieve a report, particularly if the report is large or accessed frequently. When a report is requested, aquery is sent to the database, an intermediate form of the report is cached on the report server, and the final report is rendered to the end user. Report cachingforces the intermediate version of the report to be cached on the report server and provides a more consistent user experience with a reduced load on thedatabase.

QUESTION 12Your company uses System Center 2012 Configuration Manager to deploy applications. The company purchases a new application named Appl. App1 can beinstalled only on client computers that run Windows 7. You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 GB of memoryand 300 GB of free disk space. What should you create?

A. a Query objectB. custom client device settingsC. requirement rulesD. custom client user settings

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682082.aspxHow to Deploy Applications in Configuration Manager

Before you can deploy an application in Microsoft System Center 2012 Configuration Manager, you must create at least one deployment type for the application.

http://technet.microsoft.com/en-us/library/gg682174.aspxHow to Create Deployment Types in Configuration Manager

Steps to Create a Deployment TypeStep 1: Start the Create Deployment Type Wizard.Step 2: Specify whether you want to automatically detect or to manually define the deployment type information.

Page 13: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Step 3: Specify the content options for the deployment type.Step 4: Configure the detection methods to indicate the presence of the application.Step 5: Specify the user experience options for the deployment type.Step 6: Specify the requirements for the deployment type.Requirements are used to specify the conditions that must be met before a deployment type can be installed on a client device.Step 7: Specify the dependencies for the deployment type.Step 8: Confirm the deployment type settings and complete the wizard.Step 9: Configure additional options for the deployment types that contain virtual applications.

http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step61Step 6: Specify Requirements for the Deployment Type

On the Requirements page of the Create Deployment Type Wizard, click Add to open the Create Requirement dialog box, and add a new requirement.From the Category drop-down list, select whether this requirement is for a device or a user, or select Custom to use a previously created global condition. Whenyou select Custom, you can also click Create to create a new global condition. Important: If you create a requirement of the category User and the condition Primary Device, and then deploy the application to a device collection, therequirement will evaluate as false.From the Condition drop-down list, select the condition that you want to use to assess whether the user or device meets the installation requirements. The contentsof this list will vary depending on the selected category.From the Operator drop-down list, choose the operator that will be used to compare the selected condition to the specified value to assess whether the user ordevice meets in the installation requirement. The available operators will vary depending on the selected condition.In the Value field, specify the values that will be used with the selected condition and operator whether the user or device meets in the installation requirement. Theavailable values will vary depending on the selected condition and the selected operator.Click OK to save the requirement rule and exit the Create Requirement dialog box.On the Requirements page of the Create Deployment Type Wizard, click Next.

http://technet.microsoft.com/en-us/library/gg682048.aspxHow to Create Global Conditions in Configuration Manager

In System Center 2012 Configuration Manager, global conditions are rules that represent business or technical conditions that you can use to specify how anapplication is provided and deployed to client devices.

QUESTION 13Your network contains a System Center 2012 Configuration Manager environment. Software Inventory and Hardware Inventory are enabled for all client computers.All of the client computers have an application named App1 installed. App1 saves files to the C:\Program Files\App1 folder. All of the files saved by App1 have a filename extension of .xyz. You configure Software Inventory to inventory all of the files that have the .xyz extension and the .exe extension. After six months, youdiscover that some of the client computers fail to inventory .xyz files. All of the client computers inventory .exe files. You need to ensure that the .xyz files areinventoried. What should you do?

A. Modify C:\Program Files\App1\Skpswi.dat.B. Modify C:\NO_SMS_On_Drive.sms.C. Delete C:\Program Files\App1\Skpswi.dat.

Page 14: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

D. Delete C:\NO_SMS_On_Drive.sms.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh691018.aspxHow to Exclude Folders from Software Inventory in Configuration ManagerYou can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude it from System Center 2012 Configuration Manager softwareinventory. You can also place this file in the root of any folder structure you want to exclude from software inventory. This procedure can be used to disable softwareinventory on a single workstation or server client, such as a large file server.Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive on the client computer.

QUESTION 14Your network contains a System Center 2012 Configuration Manager environment. You deploy the Configuration Manager client to all client computers. You enableHardware Inventory and Software Inventory for all of the client computers. You discover that one of the client computers fails to report inventory data. You confirmthat the inventory files are copied correctly to the site server. You discover, however, that the site server does not contain any data from the client computer. Youneed to identify what is causing the reporting issue. Which log file should you review?

A. Dataldr.logB. Inventoryagent.logC. Mp_hinv.logD. Contenttransfermanager.log

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Managerdataldr.logSite Server log fileRecords information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database.Further information 1:MP_Hinv.logSite system server log file

Page 15: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Records details about the conversion of XML hardware inventory records from clients and the copy of those files to the site server.InventoryAgent.logClient log fileRecords activities of hardware inventory, software inventory, and heartbeat discovery actions on the client.Contenttransfermanager.logClient log fileSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to access packages.Further information 2:http://technet.microsoft.com/en-us/library/bb932206.aspxTroubleshooting Configuration Manager PerformanceSlow Hardware Inventory Processing - SolutionIf you suspect that hardware inventory report processing is slow for a Configuration Manager 2007 site, the following actions should be taken:Inspect the client inventoryagent.log log file to determine whether the client is sending delta hardware inventory reports or full reports. After initial client deployment,a very high percentage of hardware inventory reports should be deltas, which contain much less data than full inventory reports. If you are seeing a significantnumber of full inventory reports, this could be caused by inconsistent inventory report processing by the site server. For example, a delta hardware inventory reportcould be processed before a full inventory report for the same system has been processed. In this situation, a hardware inventory resynchronization request will besent to the client and an additional full inventory report will be generated. To determine whether this is happening, review the dataldr.log log file on the site server.Inspect the size of the hardware inventory files in the site server's inbox directory to determine whether the software inventory files have grown significantly fromprevious inventory reports. If hardware inventory report file sizes have grown beyond an initial hardware inventory report file size baseline, you should determine thecause and whether the larger inventory report files are expected to be larger. One possibility is that the site’s SMS_def.mof file has been modified to collect moreinventory information from clients.Determine whether there is a consistent SMS_def.mof hardware inventory reporting file in use throughout the hierarchy. If not, the hardware inventory processormight be running very slowly because of changes in the database schema caused by the different SMS_def.mof files throughout the hierarchy. The dataloader.loglog file will record instances of database schema changes and should be reviewed when investigating this issue.This article was originally written for SMS, but the same principles should apply to SCCM 2012:http://technet.microsoft.com/en-us/library/cc723597.aspx Chapter 20 - Hardware and Software Inventory Flowcharts If a backlog of MIF files accumulates at the site server (that is, if MIF files are not being processed): Examine the Inventory Data Loader status messages or the Dataldr.log file to determine whether the Inventory Data Loader has been able to connect to the SMSsite database server. Inventory Data Loader might be unable to write a discovered client's MIF to the database. If the MIF files are not being processed on the site server: Verify that Inventory Data Loader successfully parsed the MIF file by checking Inventory Data Loader status messages or the Dataldr.log file. If the MIF file cannotbe processed, it will be transferred to the \Badmifs directory. If inventory from clients is not being reported to a new parent site: Examine the Dataldr.log file to verify that Inventory Data Loader has read the *.sha file, stopped all new MIF file processing, and is creating MIF files for each client'sdata in the site database to forward to the parent site.

QUESTION 15Your network contains a System Center 2012 Configuration Manager environment. The network contains 10 database servers that run Microsoft SQL Server 2008.You have a configuration baseline that is used to monitor the database servers. You confirm that all of the database servers downloaded the configuration baseline.You discover that a database server named Server1 fails to report any data for the configuration baseline. You need to identify whether Server1 evaluates theconfiguration items that are part of the configuration baseline. Which log file should you review?

Page 16: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

A. Ciagent.logB. Sitestat.logC. Ccm.logD. Rcmctrl.logE. Smsexec.logF. Dcmagent.logG. Hman.logH. Contenttransfermanager.logI. Sdmagent.logJ. Wsyncmgr.logK. Locationservices.log

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh427342.aspx DCMAgent.logRecords high-level information about the evaluation, conflict reporting, and remediation of configuration items and applications.

QUESTION 16Your network contains a System Center 2012 Configuration Manager environment. You add a software update point to the environment. You receive a messageindicating that SMS WSUS Synchronization failed. You need to retrieve additional information about the message. Which log file should you review?

http://www.gratisexam.com/

A. Ciagent.logB. Contenttransfermanager.logC. Sdmagent.bgD. Dcmagent.log

Page 17: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

E. Locationservices.logF. Wsyncmgr.logG. Rcmctrl.logH. Ccm.logI. Sitestat.logJ. Smsexec.logK. Hman.log

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh427342.aspx wsyncmgr.logRecords details about the software updates synchronization process

QUESTION 17You enable Client Push. You run Active Directory System Discovery. You discover that some of the discovered computers do not have the System Center 2012Configuration Manager client installed. You need to identify why Client Push fails on some of the client computers. Which log file should you review?

A. Sdmagent.logB. Dcmagent.logC. Rcmctrl.logD. Smsexec.logE. Locationservices.logF. Contenttransfermanager.logG. Ccm.logH. Wsyncmgr.logI. sitestat.logJ. Ciagent.logK. Hman.log

Correct Answer: GSection: (none)Explanation

Page 18: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh427342.aspx ccm.logRecords client push installation activities.

QUESTION 18Your network contains a System Center 2012 Configuration Manger environment.You wirte the following query:

select SYS.Name from SMS_R_System SYSjoin SMS_G_System_ADD_REMOVE_PROGRAMS ARPon ARP.ResourceID = SYS.ResourceId

You need to create a list of aall the client computers that have a version of Microsoft Office installed.What should you add to the query?

A. where ARP.DisplayName like "Microsoft Office*"B. where ARP.DisplayName = "Microsoft Office*"C. where ARP.DisplayName like "Microsoft Office%"D. where ARP.DisplayName = "%Microsoft Office"

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/bb694123For relational operators that perform LIKE comparisons ("is like" or "is not like"), you can use wildcard characters within the string. You can use the followingwildcards.Wildcard Description%Any string of zero or more characters_ (underscore)Any single character[]Any single character within the range or set (for example [a-f] or [abcdef]) [^] Any single character not within the specified range (for example [^a-f] or [^abcdef])

QUESTION 19You need to detect whether Office 2010 is installed before validating the configuration item. What should you do?

Page 19: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

A. Create a query-based collection.B. Create an automatic deployment rule.C. Enable Use Windows Installer detection.D. Create a report to display all installed software.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:* Here are the basic steps for adding a Windows Installer detection method:1. From the Deployment Type Properties dialog, select the Detection Method tab, and click Add Clause .2. Choose the appropriate setting type. In this case, select Windows Installer , and click the Browse button.3. Navigate to the desired .msi file and select Open . The product code appears, as By default, the rule looks for only the product code.4. Click OK to save the detection rule.* Example:

Page 20: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 20Your network contains a System Center 2012 Configuration Manager environment. The environment contains a single primary site. The primary site has adistribution point and a management point. You need to recommend a communication solution that meets the following requirements:

- Communication between the client computers in the research department and the management point must use HTTPS.

Page 21: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

- Communication between all of the other client com puters and the management point must be able to use HTTP.- Minimize the number of site systems.

What should you do?

A. Configure the existing management point to use HTTPS.Configure the research department computers always to use HTTPS.

B. Install a new management point and configure the management point always to use HTTPS.Configure the research department computers always to use HTTPS.

C. Create a new primary child site and configure the site to use native mode.Assign all of the research department computers to the new site.

D. Install a new management point and configure Windows Firewall to block inbound TCP port 80.Configure the research department computers always to use HTTPS.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:You can have one management point that accepts HTTPS client communication and another management point that accepts HTTP client communication.Note:To communicate with a site system role, the client must first locate a site system support the protocol (HTTPS or HTTP) that the client can use. By default, clientsuse the most secure method available to them. Using HTTPS before it communicates with a site system role that uses HTTP.When you deploy a site system role includemanagement points, anApplication Catalog website point, astate migration point, or distribution points, you must specifywhether clients connect to the site system by using HTTP or HTTPS. If you use HTTP, you must also consider signing and encryption choices.In a single site, you can have one management point that accepts HTTPS client communication and another management point that accepts HTTP clientcommunication.You can use one site to manage clients across different network locations that use different communication protocols and security settings.uk.co.certification.simulator.questionpool.PList@395c82f9Other client computers can be configured for Internet and intranet client management.They can automatically switch between Internet-based client management and intranet client management when they detect a change of network. If these clientscan find and connect to a management point that is configured for client connections on the intranet, they attempt to connect to an Internet-based managementpoint.Planning for Intrasite Communications in Configuration ManagerURL:http://technet.microsoft.com/en-us/library/gg712701#Planning_Intra_site_Com

QUESTION 21Your network contains a System Center 2012 Configuration Manage environment. The environment contains a primary site server named Server1 and a servernamed Server2 that runs Microsoft SQL Server 2008 R2. Server2 contains the Configuration Manager database. Server2 fails. You install SQL Server 2008 R2 on anew server. You name the server Server3. You need to restore the Configuration Manager database to Server3. What should you do?

Page 22: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

A. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Configuration Manager 2012 Setup Wizard.B. From Server3, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database and log files.C. From Server3, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.D. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Site Repair Wizard.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712697.aspxBackup and Recovery in Configuration ManagerRecover a Configuration Manager SiteA Configuration Manager site recovery is required whenever a Configuration Manager site fails or data loss occurs in the site database. Repairing andresynchronizing data are the core tasks of a site recovery and are required to prevent interruption of operations. Site recovery is started by running the ConfigurationManager Setup Wizard from installation media or by configuring the unattended installation script and then using the Setup command /script option. Your recoveryoptions vary depending on whether you have a backup of the Configuration Manager site database. ...Site Database Recovery OptionsWhen you run Setup, you have the following recovery options for the site database: * Recover the site database using a backup set: Use this option when you have a backup of the Configuration Manager site database that was created as part ofthe Backup Site Server maintenance task run on the site before the site database failure. When you have a hierarchy, the changes that were made to the sitedatabase after the last site database backup are retrieved from the central administration site for a primary site, or from a reference primary site for a centraladministration site. When you recover the site database for a stand-alone primary site, you lose site changes after the last backup.When you recover the site database for a site in a hierarchy, the recovery behavior is different for a central administration site and primary site, and when the lastbackup is inside or outside of the SQL Server change tracking retention period....Further information: SCCM 2007 needed you to run Site Repair Wizard.

QUESTION 22You are the network administrator for a company named Contoso, Ltd. The network contains 1,000 desktop computers and 500 servers. The network contains aSystem Center 2012 Configuration Manager environment. The names of all the desktop computers in the human resources department start with the letters HR, forexample HR001 and HR023. A device collection named All Server Devices contains all of the servers. A device collection named All Desktop Devices contains all ofthe desktop computers. You plan to create a new collection named All HR Computers and Servers. The new collection must contain all of the human resourcesdepartment computers and all of the servers. The collection must not contain any other computers. You need to create a membership rule for the new collection.Which rule should you include in the membership rule? (Choose all that Apply.)

A. QUERY RULE: select * from SMS_R_System where SMS_R_system.NetbiosName like "HR%"

Page 23: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

B. INCLUDE RULE: All Server DevicesC. EXCLUDE RULE: All NON HR ComputersD. EXCLUDE RULE: All Desktop DevicesE. QUERY RULE- select * from SMS_R_System where

SMS_R_system.OperatingSystemNameandVersion like. *%Workstation*F. QUERY RULE- select * from SMS_R_System where

SMS_R_system.OperatingSystemNameandVersion not like. *%Server*

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 23Your network contains a System Center 2012 Configuration Manager environment. You have a sales department that contains 500 employees, 20 of whom aresales managers. ach sales department employee has a desktop computer that is configured as their primary device. The sales managers frequently log on tocomputers in the marketing department. You plan to deploy a new sales application named App1. You need to ensure that App1 is only available to the salesdepartment employees when they log on to their primary device. What should you do?

A. In a requirement rule, set Organization Unit = Sales.B. In a requirement rule, set Primary Device = True.C. In Client Settings, set Allow user to define their primary devices to False.D. In Client Settings, set Allow user to define their primary devices to True.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg699365.aspx How to Manage User Device Affinity in Configuration Manager User device affinity in Microsoft SystemCenter 2012 Configuration Manager is a method of associating a user with one or more specified devices. User device affinity can eliminate the need to know thenames of a user's devices in order to deploy an application to that user. Instead of deploying the application to all of the user's devices, you deploy the application tothe user. Then, user device affinity automatically ensures that the application install on all devices that are associated with that user.

You can define primary devices. These are typically the devices that users use on a daily basis to perform their work. When you create an affinity between a userand a device, you gain more software deployment options. For example, if a user requires Microsoft Office Visio, you can tall it on the user's primary device by usinga Windows Installer deployment. However, on a ins

Page 24: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

device that is not a primary device, you might deploy Microsoft Office Visio as a virtual n a user's device whenapplication. You can also use user device affinity to predeploy software o the user is not logged in. Then, when the user logs on, the application is already installedand ready to run.

http://technet.microsoft.com/en-us/library/gg682174.aspx How to Create Deployment Types in Configuration Manager

Steps to Create a Deployment TypeStep 1: Start the Create Deployment Type Wizard.Step 2: Specify whether you want to automatically detect or to manually define the deployment type information.Step 3: Specify the content options for the deployment type. Step 4: Configure the detection methods to indicate the presence of the application. Step 5: Specify theuser experience options for the deployment type. Step 6: Specify the requirements for the deployment type. Requirements are used to specify the conditions thatmust be met before a deployment type can be installed on a client device.Step 7: Specify the dependencies for the deployment type. Step 8: Confirm the deployment type settings and complete the wizard. Step 9: Configure additionaloptions for the deployment types that contain virtual applications.

http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step61 Step 6: Specify Requirements for the Deployment Type

1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the Create Requirement dialog box, and add a new requirement.2. From the Category drop-down list, select whether this requirement is for a device or a user, or select Custom to use a previously created global condition. Whenyou select Custom, you can also click Create to create a new global condition.Important: If you create a requirement of the category User and the condition Primary Device, and then deploy the application to a device collection, the requirementwill evaluate as false.3. From the Condition drop-down list, select the condition that you want to use to assess whether the user or device meets the installation requirements. Thecontents of this list will vary depending on the selected category.4. From the Operator drop-down list, choose the operator that will be used to compare the selected condition to the specified value to assess whether the user ordevice meets in the installation requirement. The available operators will vary depending on the selected condition.5. In the Value field, specify the values that will be used with the selected condition and operator whether the user or device meets in the installation requirement.The available values will vary depending on the selected condition and the selected operator.6. Click OK to save the requirement rule and exit the Create Requirement dialog box.7. On the Requirements page of the Create Deployment Type Wizard, click Next.

Page 25: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 26: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 24Your network contains a System Center 2012 Configuration Manager environment. You create two custom client agent settings named ClientSettings1 andClientSettings2. You apply ClientSettings1 to all of the client computers in the sales department. You apply ClientSettings2 to all of the client computers in themarketing department. The client computers in the marketing department contain several custom registry settings. You need to collect the custom registry settingsfrom the marketing department computers. What should you do?

A. Edit the default client agent settings and include the custom registry information.B. Edit ClientSettings2 and include the custom registry information.C. Create a new set of custom client agent settings for the marketing department and include the custom registry information.D. Edit ClientSettings2 and exclude the custom registry information.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682109#BKMK_CustomClientSettings- Create a new set of custom client agent settings for the marketing department and include the custom registry information.- Edit ClientSettings2 and include the custom registry information. <--- probably notBecause editing isn't that easy. It is common sense, that you just add another client setting and deploy it to the collection.Why? All settings can be separately deleted and especially named. Easier to handle.

QUESTION 25You deploy Windows 7 by using Operating System Deployment (OSD). The deployment task sequence contains steps to install software updates and applications.The amount of time required to deploy the Windows 7 image has increased significantly during the last six months.You need to recommend a solution to reduce the amount of time it takes to deploy the image.What should you recommend? (Choose all that apply.)

A. Create a new automatic deployment rule.B. Synchronize software updates before deploying the image.C. Upgrade the image from Windows 7 to Windows 7 Service Pack 1 (SP1).D. Add an additional Install Software Updates step to the deployment task sequence.E. Use offline servicing for the image.

Correct Answer: CESection: (none)

Page 27: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation

Explanation/Reference:Explanation:E:* Offline Servicing: This new capability lets you schedule ConfigMgr to apply updates to an OS image imported into ConfigMgr without actually deploying the image.This potentially removes the need to deploy updates during an image capture or deployment, greatly reducing the time and effort spent on them and ensuring thatoperating systems deployed by ConfigMgr are fully updated before brought online.* Whether you use a Build and Capture task sequence to automatically build your images or manually build your images, a great new feature of ConfigMgr 2012 isthe ability to install updates directly into an image contained in a WIM file. This functionality isn't actually new as it has existed in the stand-alone DISM tool from thebeginning, but incorporating it directly into the ConfigMgr console makes it more accessible, enables it to leverage the software updates functionality of ConfigMgritself, and makes it schedulable.

QUESTION 26Your network contains a System Center 2012 Configuration Manager environment. The environment contains a primary site server named Server1 and a servernamed Server2 that runs Microsoft SQL Server 2008 R2. Server2 contains the Configuration Manager database. Server2 fails. You install SQL Server 2008 R2 on anew server. You name the server Server2. You need to restore the Configuration Manager database to the new server. What should you do?

A. From Server1, run the Site Repair Wizard.B. From Server1, run the Configuration Manager 2012 Setup Wizard.C. From Server2, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.D. From Server2, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database and log files.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712697.aspxBackup and Recovery in Configuration ManagerRecover a Configuration Manager SiteA Configuration Manager site recovery is required whenever a Configuration Manager site fails or data loss occurs in the site database. Repairing andresynchronizing data are the core tasks of a site recovery and are required to prevent interruption of operations. Site recovery is started by running the ConfigurationManager Setup Wizard from installation media or by configuring the unattended installation script and then using the Setup command /script option. Your recoveryoptions vary depending on whether you have a backup of the Configuration Manager site database.Site Database Recovery OptionsWhen you run Setup, you have the following recovery options for the site database:* Recover the site database using a backup set: Use this option when you have a backupof the Configuration Manager site database that was created as part of the Backup Site Server maintenance task run on the site before the site database failure.When you have a hierarchy, the changes that were made to the site database after the last site database backup are retrieved from the central administration site

Page 28: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

for a primary site, or from a reference primary site for a central administration site. When you recover the site database for a stand-alone primary site, you lose sitechanges after the last backup.When you recover the site database for a site in a hierarchy, the recovery behavior is different for a central administration site and primary site, and when the lastbackup is inside or outside of the SQL Server change tracking retention period.Further information:SCCM 2007 needed you to run Site Repair Wizard.

QUESTION 27Your network contains a single Active Directory forest. You plan to deploy System Center 2012 Configuration Manager. The hierarchy will have a CentralAdministration site and two primary sites. You need to ensure that you can target user groups for application deployment. The solution must minimize networktraffic. Which Configuration Manager discovery methods should you use?

A. Active Directory User Discovery on every siteB. Active Directory User Discovery and Active Directory Group Discovery on the primary sitesC. Active Directory User Discovery and Active Directory Group Discovery on the Central Administration siteD. Active Directory User Discovery on the primary sites and Active Directory Group Discovery on the Central Administration site

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:You can configure discovery operations throughout the hierarchy from the central administration site by assigning discovery methods to run at individual siteshttp://technet.microsoft.com/en-us/library/64aa34e1-c465-4eb8-820b-5c1702ab55ae#Plan_Where_to_Install_SitesNote:* Active Directory User DiscoveryDiscovers user accounts from the specified locations in Active Directory Domain Services.* Active Directory Group DiscoveryDiscovers local, global, and universal security groups, the membership within these groups, and the membership within distribution groups from the specifiedlocations in Active directory Domain Services. Distribution groups are not discovered as group resources.

QUESTION 28Your company has a production network and a test network. Both networks have System Center 2012 Configuration Manager deployed.You create the following objects on the test network:

- A configuration item named SQLServerCI- A configuration baseline named SQLServerBaseline that contains the configuration item- A collection named SQLServers that contains all o f the servers on the test network that run Microsof t SQL Server

You export the configuration baseline to SQLServerBaseline.cab. You open the Configuration Manager console, you click Assets and Compliance, and then you

Page 29: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

expand Compliance Settings. You need to apply the configuration baseline to the servers on the production network that run SQL Server.You create a collection named SQLServers that contains all SQL Servers from the production network. What should you do next? (Choose all that apply.)

A. Right-click SQLServersBaseline, select Categorize, and then select Server.B. Right-click SQLServerCI, select Export, and then specify SQLServer Baseline.cab as the export file.C. Right-click SQLServersBaseline, select Deploy, and then select the SQLServers collection.D. Right-click Configuration Baselines, and then select Import Configuration DataE. Right-click SQLServersBaseline, and then select Properties. In the Deployments tab, type SQLServers in the Filter... box

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh691016.aspxHow to Import Configuration Data in Configuration ManagerIn addition to creating configuration baselines and configuration items in the System Center 2012 Configuration Manager console, you can import configurationdata if it is contained in a cabinet (.cab) file format and adheres to the supported SML schema. You can import configuration data from the following sources:Best practice configuration data (Configuration Packs) that has been downloaded from Microsoft or from other software vendor sites.Configuration data that has been exported from System Center 2012 Configuration Manager.Configuration data that was externally authored and that conforms to the Service Modeling Language (SML) schema.How to Import Configuration DataWhen you import a configuration baseline, some or all of the configuration items that are referenced in the configuration baseline might also be included in thecabinet file. During the import process, Configuration Manager verifies that all of the configuration items that are referenced in the configuration baseline are eitheralso included in the cabinet file or already exist in the Configuration Manager site. The import process fails if you attempt to import a configuration baseline thatreferences configuration data that Configuration Manager cannot locate.To import configuration data1. In the Configuration Manager console, click Assets and Compliance.2. In the Assets and Compliance workspace, expand Configuration Items or Configuration Baselines, and then in the Home tab, in the Create group, click ImportConfiguration Data.3. On the Select Files page of the Import Configuration Data Wizard, click Add, and then in the Open dialog box, select the .cab files you want to import.4. Select the Create a new copy of the imported configuration baselines and configuration items check box if you want the imported configuration data to be editablein the Configuration Manager console.5. On the Summary page of the wizard, review the actions that will be taken, and then complete the wizard.The imported configuration data displays in the Compliance Settings node in the Assets and Compliance workspace.http://technet.microsoft.com/en-us/library/hh219289.aspxHow to Deploy Configuration Baselines in Configuration ManagerConfiguration baselines in System Center 2012 Configuration Manager must be deployed to one or more collections of users or devices before client devices inthose collections can assess their compliance with the configuration baseline.Use the Deploy Configuration Baselines dialog box to define configuration baseline deployments, which includes adding or removing configuration baselines from

Page 30: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

deployments in addition to specifying the evaluation schedule.To deploy a configuration baseline1. In the Configuration Manager console, click Assets and Compliance.2. In the Assets and Compliance workspace, expand Compliance Settings, and then click Configuration Baselines.3. In the Configuration Baselines list, select the configuration baseline that you want to deploy, and then in the Home tab, in the Deployment group, click Deploy.4. In the Deploy Configuration Baselines dialog box, select the configuration baselines that you want to deploy in the Available configuration baselines list. Click Addto add these to the selected configuration baselines list.5. Specify the following additional information:* Remediate noncompliant rules when supported - Enable this option to automatically remediate any rules that are noncompliant for Windows ManagementInstrumentation (WMI), the registry, scripts, and all settings for mobile devices that are enrolled by Configuration Manager.* Allow remediation outside the maintenance window - If a maintenance window has been configured for the collection to which you are deploying the configurationbaseline, enable this option to let compliance settings remediate the value outside of the maintenance window.6. Generate an alert - Enable this option to configure an alert that is generated if the configuration baseline compliance is less than a specified percentage by aspecified date and time. You can also specify whether you want an alert to be sent to System Center Operations Manager.7. Collection: Click Browse to select the collection where you want to deploy the configuration baseline.8. Specify the compliance evaluation schedule for this configuration baseline: Specifies the schedule by which the deployed configuration baseline is evaluated onclient computers.This can be either a simple or a custom schedule.9. Click OK to close the Deploy Configuration Baselines dialog box and to create the deployment.

QUESTION 29Drag and Drop QuestionYour network contains a System Center 2012 Configuration Manager environment. You create a collection named All Managed Servers. You need to inventory theenvironment variables of the All Managed Servers collection.What should you do?To answer, move the four appropriate actions from the list of actions to the answer area and arrange.

Page 31: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Select and Place:

Page 32: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer:

Page 33: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Section: (none)Explanation

Explanation/Reference:- Create a custom client device setting named Env- In the Env setting, select Hardware inventory- Adding WMI class Win32_Environment- Deploy the Env to All Managed Servers CollectionCannot do : custom client user setting because it is for mobile and device affinity only

Page 34: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 30Drag and Drop Question

Your network contains a System Center 2012 Configuration Manager environment. Your company has a security policy that contains mandatory registry settings for all servers. You have a collection named Servers that contains all of the servers. You need to identify which servers do not comply with the security policy. What should you do? To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Page 35: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer:

Page 36: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Section: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh519648.aspxConfiguration Items in System Center 2012 - Service ManagerConfiguration items are a way to store information about services, computers, software, software updates, users and other undefined imported objects in theService Manager database in System Center 2012 – Service Manager. You can then select configuration items when you submit forms, such as an incident form, achange request form, or a work item form.http://technet.microsoft.com/en-us/library/gg712268.aspxHow to Create Configuration Baselines for Compliance Settings in Configuration ManagerConfiguration baselines in System Center 2012 Configuration Manager contain predefined configuration items and optionally, other configuration baselines. After aconfiguration baseline is created, you can deploy it to a collection so that devices in that collection download the configuration baseline and assess their compliancewith it.To create a configuration baseline

Page 37: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

In the Configuration Manager console, click Assets and Compliance.In the Assets and Compliance workspace, expand Compliance Settings, and then click Configuration Baselines.On the Home tab, in the Create group, click Create Configuration Baseline.In the Create Configuration Baseline dialog box, enter a unique name and a description for the configuration baseline. You can use a maximum of 255 charactersfor the name and 512 characters for the description.The Configuration data list displays all configuration items or configuration baselines that are included in this configuration baseline. Click Add to add a newconfiguration item or configuration baseline to the list. You can choose from the following:* Configuration Items* Software Updates* Configuration BaselinesUse the Change Purpose list to specify the behavior of a configuration item that you have selected in the Configuration data list. You can select from the following:* Required: The configuration baseline is evaluated as noncompliant if the configuration item is not detected on a client device. If it is detected, it is evaluated forcompliance* Optional: The configuration item is only evaluated for compliance if the application it references is found on client computers. If the application is not found, theconfiguration baseline is not marked as noncompliant (only applicable to application configuration items).* Prohibited: The configuration baseline is evaluated as noncompliant if the configuration item is detected on client computers (only applicable to applicationconfiguration items).Use the Change Revision list to select a specific or the latest revision of the configuration item to assess for compliance on client devices or select Always UseLatest to always use the latest revision. If you want to remove a configuration item from the configuration baseline, select a configuration item, and then click Remove.Click OK to close the Create Configuration Baseline dialog box and to create the configuration baseline.http://technet.microsoft.com/en-us/library/hh219289.aspxHow to Deploy Configuration Baselines in Configuration ManagerConfiguration baselines in System Center 2012 Configuration Manager must be deployed to one or more collections of users or devices before client devices inthose collections can assess their compliance with the configuration baseline.Use the Deploy Configuration Baselines dialog box to define configuration baseline deployments, which includes adding or removing configuration baselines fromdeployments in addition to specifying the evaluation schedule.

QUESTION 31Drag and Drop Question

Your network contains a System Center 2012 Configuration Manager environment. You create a collection named All Marketing Users. You need to inventory thedesktop settings of the All Marketing Users collection. What should you do?To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.

http://www.gratisexam.com/

Page 38: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Select and Place:

Correct Answer:

Page 39: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Section: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712290.aspxHow to Extend Hardware Inventory in Configuration ManagerSystem Center 2012 Configuration Manager hardware inventory reads information about devices by using Windows Management Instrumentation (WMI). WMI isthe Microsoft implementation of web-based Enterprise Management (WBEM), which is an industry standard for accessing management information in an enterpriseenvironment. In previous versions of Configuration Manager, you could extend hardware inventory by modifying the file sms_def.mof on the site server. ..In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did in Configuration Manager 2007. Instead, you can enable anddisable WMI classes, and add new classes to collect by hardware inventory by using client settings. Configuration Manager provides the following methods to

Page 40: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

extend hardware inventory:Enable or disable existing inventory classes - You can enable or disable the default inventory classes used by Configuration Manager or you can create customclient settings that allow you to collect different hardware inventory classes from specified collections of clients. Add a new inventory class - You can add a new inventory class from the WMI namespace of another device. Import and export hardware inventory classes - You can import and export Managed Object Format (MOF) files that contain inventory classes from theConfiguration Manager console. Create NOIDMIF Files - Use NOIDMIF files to collect information about client devices that cannot be inventoried by Configuration Manager.Create IDMIF Files - Use IDMIF files to collect information about assets in your organization that are not associated with a Configuration Manager client, forexample, projectors, photocopiers and network printers.

http://msdn.microsoft.com/en-us/library/windows/desktop/aa394121%28v=vs.85%29.aspxWin32_Desktop class (Windows)

The Win32_Desktop WMI class represents the common characteristics of a user's desktop. The properties of this class can be modified by the user to customizethe desktop.

Further information:The screenshots show the wizard screen. Since we need to inventory WMI information, that means we need Hardware Inventory and you can only do that with a Custom Client Device Setting:

Page 41: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 42: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 43: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 32Hotspot QuestionYour network contains a System Center 2012 Configuration Manager environment. You deploy an application to 1,000 client computers. You need to identify whichclient computers are in the process of installing the application. Which node should you select in the Configuration Manager console? To answer, select theappropriate node in the answer area.

Hot Area:

Correct Answer:

Page 44: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Section: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682201How to Monitor Applications in Configuration ManagerIn Microsoft System Center 2012 Configuration Manager, you can monitor the deployment of all software, including software updates, compliance settings,applications, task sequences, and packages and programs. You can monitor deployments by using the Monitoring workspace in the Configuration Manager consoleor by using reports. Applications in Configuration Manager support state-based monitoring, which allows you to track the last application deployment state for users and devices. Thesestate messages display information about individual devices. For example, if an application is deployed to a collection of users, you can view the compliance stateof the deployment and the deployment purpose in the Configuration Manager console.An application deployment state has one of the following compliance states:Success – The application deployment succeeded or was found to be already installed.In Progress – The application deployment is in progress.Unknown – The state of the application deployment could not be determined. This state is not applicable for deployments with a purpose of Available. This state istypically displayed when state messages from the client are not yet received.Requirements Not Met – The application was not deployed because it was not compliant with a dependency or a requirement rule, or because the operating systemto which it was deployed was not applicable.

Page 45: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Error – The application failed to deploy because of an error....To monitor the state of an application in the Configuration Manager consoleIn the Configuration Manager console, click Monitoring.In the Monitoring workspace, click Deployments.To review deployment details for each compliance state and the devices in that state, select a deployment, and then, on the Home tab, in the Deployment group,click View Status to open the Deployment Status pane. In this pane, you can view the assets with each compliance state. Click any asset to view more detailedinformation about the deployment status to that asset.To review general status information about an application deployment, select a deployment, and then click the Summary tab in the Selected Deployment window.To review information about the applications deployment type, select a deployment, and then click the Deployment Types tab in the Selected Deployment window.

QUESTION 33Drag and Drop QuestionYour network contains a System Center 2012 Configuration Manager environment. Three users named User1, User2, and User3 will perform the following tasks:

- User1 will review software metering data and inve ntory reports.- User2 will deploy applications and create alerts.- User3 will deploy applications and create distrib ution point groups.

You need to identify which security role must be assigned to which user. What should you identify? To answer, drag the appropriate security role to the correct userin the answer area. Each security role may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll toview content.

Select and Place:

Page 46: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Application AdministratorThis security role:• Provides permissions included in both the Application Author and Application Deployment Manager roles.• Provides permissions to manage queries, read and modify site permissions, manage collections, and manage settings for user device affinity.Application Deployment ManagerThis security role provides permissions to:• View applications and manage deployments, alerts, templates, packages, and programs.• View collections and their members, status messages, queries, and conditional delivery rules.Asset ManagerThis security role provides permissions to manage hardware and software inventory, software metering, and the Asset Intelligence reporting classes.

QUESTION 34

Page 47: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Drag and Drop QuestionYour network contains a System Center 2012 Configuration Manager environment. Three users named User1, User2, and User3 will perform the following tasks:

- User1 will review software metering data and inve ntory reports.- User2 will deploy Applications and create alerts.- User3 will create configuration items.

You need to identify which security role must be assigned to which user. What should you identify? To answer, drag the appropriate security role to the correct userin the answer area. Each security role may be used once, more than once, at all. Additionally, you may need to drag the split bar between panes or scroll to viewcontent.

Select and Place:

Correct Answer:

Page 48: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Section: (none)Explanation

Explanation/Reference:Explanation:Asset ManagerGrants permissions to manage the Asset Intelligence Synchronisation Point, Asset Intelligence reporting classes, software inventory, and metering rules ApplicationDeployment Manager Grants permissions to deploy applications. Administrative users who are associated with this role can view a list of applications, and they canmanage deployments for applications, alerts, templates, and packages, and programs. Administrative users who are associated with this role can also viewcollections and their members, status messages, queries, and conditional delivery rules.Compliance Settings ManagerGrants permissions to define and monitor Compliance Settings. Administrative users associated with this role can create, modify and delete configuration items andbaselines to collections, and initiate compliance evaluation, and initiate remediation for non-compliant computers.

QUESTION 35You need to configure connectors between the System Center 2012 components to meet the administrative requirements. Between which System Center 2012components should you configure the connectors?

A. Operations Manager and OrchestratorB. Service Manager and VMMC. Operations Manager and Service ManagerD. Configuration Manager and Service Manager

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 49: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 36Your network contains a System Center 2012 Configuration Manger environment. The environment contains a reporting services point.You need to identify which tools can be used to create and publish custom reports to Microsoft SQL Server Reporting Services (SSRS).Which tool should you identify?

A. Reporting Services Configuration ManagerB. Microsoft SQL Server Management StudioC. Microsoft SQL Server Business Intelligence Development StudioD. Microsoft Access 2010 and Reporting Services Configuration Manager

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg508710.aspxOverview of Custom ReportsCustom reports are intended for advanced users who are comfortable creating their own reports by using Microsoft SQL Server Reporting Services and SQL ServerBusinessIntelligence Development Studio, SQL Server Reporting Services Report Builder, or Microsoft Visual Studio Report Designer.Further information:http://msdn.microsoft.com/en-us/library/ms155792(v=sql.100)Reporting Services Components and Toolshttp://msdn.microsoft.com/en-us/library/ms345231.aspxCustom Report Itemshttp://msdn.microsoft.com/en-us/library/ms345253Custom Report Item Implementation Requirementshttp://technet.microsoft.com/en-us/library/gg682105.aspxIntroduction to Reporting in Configuration Managerhttp://technet.microsoft.com/en-us/library/hh338693.aspxCreating Custom Report Models in SQL Server Reporting Services

QUESTION 37You have a secondary site at a branch office.The branch office is connected to the main office by a 512-Kbps (kilobits per second) WAN link. You need to eliminate all package distribution traffic on the WAN from the primary site between 3:00 P.M. and 5:00 P.M.Which two tasks should you do on the sender address?(Each correct answer presents part of the solution. Choose two.)

Page 50: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

A. Configure rate limits for the primary site.B. Configure pulse mode for the primary site.C. Configure pulse mode for the secondary site.D. Configure a schedule for the primary site.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

QUESTION 38Currently, you collect software inventory data on a monthly basis. You need to ensure that all software inventory reports include data about software that was installed as recently as the past seven days.What should you do?

A. Configure the software update point synchronization schedule to run every seven days.B. Create a custom Configuration Manager Web report to display all software inventory changes that occurred within the past seven days.C. Configure the Software Updates client agent to run every seven days.D. Configure the Software Inventory client agent to run every seven days.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 39Local client computers receive software updates from Configuration Manager. You need to ensure that remote client computers that connect to the virtual private network (VPN) are able to receive software updates. What should you do?

A. Create a new site system, and configure it with the Software Update Point role.B. Create a new site system, and configure it with the SMS Provider role.C. Add the IP subnets that the VPN uses to the network discovery.D. Create a new site boundary, and add the IP subnets that the VPN uses to the site boundary.

Page 51: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 40You have a System Center 2012 Configuration Manager environment. Your company identifies virtual machines by adding an additional attribute named is Virtual and setting it to TRUE for the computer objects in Active Directory. You need to create and populate collections for virtual machines.What should you do?

A. Create a collection for the virtual machines.Create a new collection variable for the isVirtual attribute.

B. Initiate a discovery data collection cycle on the virtual machine clients.C. Configure Active Directory System Group Discovery, and select the option to include groups.D. Configure Active Directory System Discovery to include the isVirtual attribute.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 41You have a System Center 2012 Configuration Manager environment. You use Active Directory System Discovery to discover computers that are located in the Sales organizational unit (OU) and in all child OUs under the Sales OU. Discovering computers in all the child OUs is requiring a significant amount of time to complete. You need to configure discovery for only computers in the Sales OU.What should you do?

A. Clear the Recursive check box for the Sales OU discovery.B. Clear the Include Groups check box for the Sales OU discovery.C. Create a custom LDAP query to LDAP://OU=Sales,DC=SCCMDEMO,DC=COM.

Select the Recursive check box.D. Select the option to browse to the Sales OU, and then select the Sales OU.

Select the Recursive check box.

Page 52: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 42You have a System Center 2012 Configuration Manager environment. You need to install the Configuration Manager client software by using a logon script.What should you configure the logon script to run?

A. CCMSetup.exeB. CCMSetup.msiC. Capinst.exeD. Client.msi

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 43You have a System Center 2012 Configuration Manager environment running in native mode. You have a perimeter network for your Internet-based site systems. You block the SMB traffic from the perimeter network to your intranet. You configure the site systemsproperties to allow only site server initiated data transfers from the site systems.You need to configure site system communications between the perimeter network and the site server.What should you do?

A. Configure the fallback status points.B. Configure a server locator point.C. Configure a Client Connection account.D. Configure a Site System Installation account.

Correct Answer: DSection: (none)

Page 53: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation

Explanation/Reference:

QUESTION 44You have a System Center 2012 Configuration Manager environment. You deploy Microsoft Office 2007 to client computers in a collection named Coll1. You run the Configuration Manager Web report for Add or Remove Programs, and you query for Office 2007. No computers are found to have Office 2007installed. You need to identify computers that have Office 2007 installed. What should you do?

A. Configure software inventory to run daily.B. Configure hardware inventory to run daily.C. Configure Coll1 to update membership daily.D. Configure Coll1 to have a collection-specific polling interval.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 45You have a System Center 2012 Configuration Manager environment. You want to create a new package for an application. In the Configuration Manager console, you right-click the Packages node.You do not see the option to create a new package.You need to be able to create packages. What should you do?

http://www.gratisexam.com/

A. Request Package Class Create rights for your user account.B. Request Package Instance Create rights for your user account.

Page 54: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

C. Request Package Instance Class Modify rights for your user account.D. Request that your user account be added to the SMS Admins local group on the site server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 46You have a System Center 2012 Configuration Manager environment. You need to view the installation progress of an advertisement from a client computer.Which log file should you view?

A. policyevaluator.logB. ccmexec.logC. execmgr.logD. offermgr.log

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 47You have a System Center 2012 Configuration Manager environment. You create a deployment package to deploy software updates to a collection of client computers with a deployment schedule of As soon as possible.The Software Update Home Page indicates one installation failure for the package. You need to view information about the installation failure.Which log file should you view?

A. SrcUpdateMgr.logB. WUSSyncXML.logC. SmsWusHandler.logD. WindowsUpdate.log

Page 55: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 48You have a System Center 2012 Configuration Manager environment.You have an application named App1.You modify the Package Access account on the App1 software package to prevent read access for all users. Users are still able to access the package. You need to ensure that users cannot read the package, and minimize bandwidth utilization.What should you do?

A. Copy the package to all distribution points.B. Refresh the package on all distribution points.C. Update all distribution points with a new package source version.D. Delete and re-create the software package.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 49You have a System Center 2012 Configuration Manager environment. You deploy a site server named Lab1 to use for Pre-boot Execution Environment (PXE) installations on client computers in your training room. Administrators from other departments report that they are being prompted for PXE installations that should be available to only the client computers in your trainingroom.You need to ensure that only the client computers in your training room receive the PXE installations from Lab1.What should you do?

A. Modify the Broadcast Address scope option on the DHCP server.B. Modify the Static Route option on the DHCP server.C. Modify the Boot Server Host Name scope option on the DHCP server.D. Publish the PXE server by using a fully qualified domain name (FQDN).

Page 56: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 50You have a System Center 2012 Configuration Manager environment. When users attempt to install a program by using the Run Advertise program, they receive a message that the desired software is not available.You need to view the status to find out why software is not available. What should you do?

A. Connect to the client computers, and view the LocationServices.log file.B. Connect to the client computers, and view the DataTransferService.log file.C. Connect to the distribution point, and view the LocationServices.log file.D. Connect to the distribution point, and view the PatchDownloader.log file.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 51You have a System Center 2012 Configuration Manager environment. You apply a desired configuration baseline named Baseline1 to all servers in a collection named Coll1.You need to view Baseline1 configuration results.What should you do?

A. Create a new Web report based on status message.B. Create a new Web report based on hardware inventory.C. Run an Asset Intelligence Web report for Coll1.D. Run a compliance summary Web report for Coll1.

Correct Answer: DSection: (none)Explanation

Page 57: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation/Reference:

QUESTION 52You have a System Center 2012 Configuration Manager environment. You need to prevent computers in remote offices from installing packages from the distribution point in the main office.What should you do?

A. Configure the central site system role with protected boundaries.B. Configure the remote office site system roles with protected boundaries.C. Configure the central site distribution point as a protected distribution point.D. Configure the remote office distribution points as protected distribution points.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 53You recently migrated from System Center Configuration Manager 2007 to System Center 2012 Configuration Manager. Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-brt version of Widows 7. Some client computers have the Microsoft Application Virtualization (App-V) client installed. You have an Application named App1. You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1.You need to deploy the Application to all of the client computers. The solution must minimize the amount of administrative effort. What should you do?

A. Create a new Application that has three different deployment types and create a target collection for each of the deployment types.B. Create a new Application that has three different deployment types and configure global conditions for each of the deployment types.C. Create a new package for each version of App1.D. Create a new Application for each version of App1.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:Applications contain multiple deployment types that contain the files and commands necessary to install the software. For example, deployment types for a local

Page 58: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

installation , a virtual application package or a version of the application for mobile devices. MSI 64, 32 deployment types

Page 59: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 60: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 61: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Deploy multiple type to multiple collection ( x64, x32, VirtualUserCollection) You don't choose to deploy a specific deployment type. Instead, you deploy theapplication itself. It's pretty simple in this case, with only one deployment type, as it's fairly obvious which one will be installed. But if you had multiple deploymenttypes, you would need to specify rules to determine which one is used.

QUESTION 54You have an Application named App1. You need to ensure that users in the finance department can install App1 by using the Application Catalog. What should you do?

A. Create a required user deployment and target the deployment to all of the finance department users.B. Create a required user deployment and target the deployment to all of the client computers in the finance department.C. Create an available user deployment and target the deployment to all of the finance department users.D. Create an available user deployment and target the deployment to all of the client computers in the finance department.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:By selecting "Available" it will be selectable for the users in the Application Catalog. The "Required" option would force the installation to all users in the financedepartment.

QUESTION 55Your company uses System Center 2012 Configuration Manager with Microsoft Forefront Endpoint Protection integration. You deploy Forefront Endpoint Protection to all client computers. The company uses a management Application named App1. You discover that Forefront Endpoint Protection blocks App1. You need to ensure that App1 can run. How should you configure the Default Client Malware Policy? (Each correct answer presents a complete solution. Choose two.)

A. Create a software restriction policy.B. Add a process exclusion.C. Add a file location exclusion.D. Modify the schedule scan settings.E. Click the Use behavior monitoring check box.

Correct Answer: BCSection: (none)Explanation

Page 62: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh508785.aspxHow to Create and Deploy Antimalware Policies for Endpoint Protection in Configuration Manager

Page 63: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 64: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 56Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration at Site1 and a primary sitenamed Site. You discover that none of the packages created on Site1 are displayed in Site2. You need to identify whether there is a replication issue between thesites. What should you review?

A. the Inventoryagent.log fileB. the Rcmctrl.log fileC. the Microsoft SQL Server replication diagnostic filesD. the Despool.log file

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:Rcmctrl.logRecords the activities of database replication between sites in the hierarchy.

QUESTION 57Your network contains two Active Directory forests named contoso.com and litwareinc.com. You implement System Center 2012 Configuration Manager in thecontoso.com forest. You deploy the Configuration Manager client to alt of the client computers in contoso.com by using a logon script. You need to ensure that theConfiguration Manager client is automatically deployed to all of the client computers m me litwareinc.com forest. What should you do? (Choose all that Apply.)

A. Configure a Client Push Installation account.B. Enable Client Push installation.C. Enable Active Directory System Discovery.D. Configure an administrative user.E. Enable Active Directory Forest Discovery.

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682042.aspx#BKMK_prereqs_computersPrerequisites for Windows Client Deployment in Configuration Manager - Prerequisites for Computer ClientsInstallation Method Dependencies

Page 65: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Client push installation:Client push installation accounts are used to connect to computers to install the client and are specified on the Accounts tab of the Client Push InstallationProperties dialog box. The account must be a member of the local administrators group on the destination computer. If you do not specify a client push installation account, the site server computer account will be used.The computer on which you are installing the client must have been discovered by at least one System Center 2012 Configuration Manager discovery method.The computer has an ADMIN$ share.Enable client push installation to assigned resources must be selected in the Client Push Installation Properties dialog box if you want to automatically push theSystem Center 2012 Configuration Manager client to discovered resources.The client computer must be able to contact a distribution point or a management point to download the supporting files.You must have the following security permissions to install the Configuration Manager client by using client push: To configure the Client Push Installation account: Modify and Read permission for the Site object. To use client push to install the client to collections, devices and queries: Modify Resource and Read permission for the Collection object.The Infrastructure Administrator security role includes the required permissions to manage client push installation.Further information:http://blogs.technet.com/b/configmgrteam/archive/2011/03/30/active-directory-forest-discovery-and-publishing-in-configuration-manager-2012-beta-2.aspxActive Directory Forest Discovery and Publishing in Configuration Manager 2012 Beta 2Forest Discovery and Publishing OverviewTo improve manageability of an ever-changing network environment, Active Directory Forest Discovery is added in Configuration Manager 2012 Beta 2. With it,Configuration Manager can discover Active Directory forests, their domains, AD Sites and IP subnets. Because domain users (or domain computer accounts) havepermission to query forest relationships, Active Directory Forest Discovery can return information about other forests and their trust direction. The system canprogrammatically connect to all the forests and build a complete mapping of the corporate environment. It can also cross forest boundaries using specificcredentials for each forest regardless of the trust type. The information obtained through Active Directory Forest Discovery can be directly exported as boundariesor boundary groups. Changes to discovered data are updated dynamically and aged out from the database if no longer present in Active Directory Domain Services.The discovered data is also used when clients request a management point or distribution point to ensure they receive the best possible site system. http://technet.microsoft.com/en-us/library/gg712308.aspx#BKMK_DiscoveryMethodsPlanning for Discovery in Configuration ManagerDiscovery Methods in Configuration Manager

Page 66: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

http://technet.microsoft.com/en-us/library/gg682132.aspx#BKMK_DeployClientComputersIntroduction to Client Deployment in Configuration Manager - Deploying the Configuration Manager Client to Windows-Based ComputersThe following table lists the various methods that you can use to install the Configuration Manager client software on computers:Client push installation - Automatically installs the client to assigned resources and manually installs the client to resources that are not assigned.Software update point installation - Installs the client by using the Configuration Manager software updates feature.Group Policy installation - Installs the client by using Windows Group Policy.Logon script installation - Installs the client by using a logon script.Manual installation - Manually installs the client software.Upgrade installation by using application management - Upgrades clients to a newer version by using Configuration Manager application management. You canalso use Configuration Manager 2007 software distribution to upgrade clients to System Center 2012 Configuration Manager.Automatic client upgradeClient imaging - Prestages the client installation in an operating system image.

QUESTION 58Your network contains a System Center 2012 Configuration Manager environment. The environment contains a angle primary site. You need to provide users withthe ability to remotely reset their mobile device to the factory settings. What should you install?

A. Application Catalog web service point and Application Catalog website pointB. out of band service point and Application Catalog web service pointC. device management point and System Health Validator pointD. System Health Validator point and Application Catalog website point

Correct Answer: ASection: (none)

Page 67: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation

Explanation/Reference:Explanation:The Application Website point and the Application Web Service point are not required for client deployment. However, you might want to install them as part of yourclient deployment process, so that users can perform the following actions as soon as the Configuration Manager client is installed on Windows computers:Wipe their mobile devices.Search for and install applications from the Application Catalog. http://technet.microsoft.com/en- us/library/gg681976.aspx to get your mobile devices managed inSCCM 2012.The basic steps are:Set up a working Microsoft PKI infrastructureInstall and configure certificates to SCCM serversInstall Enrollment Point Roles may also want Enrollment Proxy Point for legacy mobile device. These site system roles are not required if you will manage mobiledevices by using the Exchange Server connector, or if you install the mobile device legacy client (for example, for Windows CE), or if you request and install theclient certificate on Mac computers independently from Configuration Manager.When using Network Access Protection (NAP) in Configuration Manager 2007, the System Health Validator point is needed to validate the statement of health fromNAP-capable Configuration Manager clients to produce a client health state of compliant or non-compliant, It must be installed on a NAP health policy server.

QUESTION 59Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients. All of the client computers haveWindows Firewall enabled. Windows Firewall is configured to block File and Printer Sharing. Users are not configured as local Administrators on their clientcomputers. You deploy System Center 2012 Configuration Manager. You need to identify which methods you can use to deploy the Configuration Manager client toan of the client computers. Which client installation methods should you identify? (Choose all that Apply.)

A. a logon script installationB. a manual client installationC. a software update-based client installationD. a Client Push InstallationE. an Active Directory Group Policy-based installation

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:The Logon script runs with the user's credentials.Manual installation also runs with the user's credentials.Software update point uses the Local System account and All client computers are configured as WSUS clients. So the firewall should not affect functionality.Client Push Installation requires File and Printer Sharing.Group Policy Installation requires File and Printer Sharing.

Page 68: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

http://technet.microsoft.com/en-us/library/cc787076%28v=ws.10%29.aspxThe firewall will block the client push installation and the GPO installation. For A and B you need administrative rights. The WSUS installation is performed with localsystem account and since they are WSUS clients the firewall will be opened for this type of installation.

QUESTION 60Your network contains a single Active Directory domain. The functional level of the domain is windows 2003. The domain contains the following server:

- Ten servers that run Windows Server 2003- Twenty servers that run Windows Server 2008- One server that has Microsoft Exchange Server 200 7 installed- One server that has System Center 2012 Configurat ion Manager installed Users have mobile devices tha t run WindowsMobile 6.5 and Windows Phone.

http://www.gratisexam.com/

You need to ensure that you can manage the settings of the mobile devices and perform remote device wipes by using Configuration Manager. What should youdo?

A. Upgrade the Exchange server to Exchange Server 2010. Configure an Exchange connector.B. Change the functional level of the domain to windows 2008. Upgrade the Exchange server to Exchange Server 2010.C. Upgrade all Windows 2003 domain controllers to Windows 2008.D. Upgrade all of the domain controllers to Windows 2008 R2. Configure an Exchange connector.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:Exchange Server Connector New in Configuration Manager 2012 is the Exchange ServerConnector. This enables SCCM to connect to multiple Exchange servers, centralizing management of any device that is able to be managed via ExchangeActiveSync from within ConfigMgr. This feature is just another way to access and control Exchange’s mobile device management features, and as such functionalityis necessarily limited. The main benefit of the Exchange Server Connector is being able to access functionality such as remote device wipe and settings control formultiple Exchange servers from within SCCM - there’s no new management capability for an organization that already manages mobile devices with ExchangeActiveSync.* It’s also worth noting that the Exchange Server Connector is only available for use with Exchange 2010 and later, and some versions of Exchange alsorequire Configuration Manager 2012 SP1.

Page 69: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

http://myitforum.com/myitforumwp/2013/05/14/three-options-for-managing-mobiledevices-using-sccm-2012-without-windows-intune/

QUESTION 61Your network contains a System Center 2012 Configuration Manager environment. You need to change the organization name displayed by Configuration Manager.Which settings should you modify from the Configuration Manager console?

A. Client PolicyB. Computer AgentC. User and Device AffinityD. Compliance Settings

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:Administration -> Client Settings -> Default Client Settings -> Computer Agent

Page 70: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 71: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 62Your network contains a System Center 2012 Configuration Manager environment. Software Inventory and Hardware Inventory are enabled for all of the clientcomputers. All of the client computers have an Application named App1 installed. App1 saves files to the C:\ABC folder. Al of the files saved by App1 have a filename extension of .abc. You configure Software Inventory to inventory all of the files that have the .abc extension and the .exe extension. After six months, youdiscover that some of the client computers fad to inventory .abc fees. Al of the client computers inventory .exe files. You need to ensure that the .abc files areinventoried. What should you do?

A. Modify C:\Program Files\App1\NO_SMS_On_Drive.sms.B. Delete C:\Program Files\App1\NO-SMS_On_Drive.sms.C. Modify C:\ABC\Skpswi.dat.D. Delete C:\ABC\Skpswi.dat.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation: http://technet.microsoft.com/en-us/library/hh691018.aspxHow to Exclude Folders from Software Inventory in Configuration ManagerYou can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude it from System Center 2012 Configuration Manager softwareinventory. You can also place this file in the root of any folder structure you want to exclude from software inventory. This procedure can be used to disable softwareinventory on a single workstation or server client, such as a large file server.Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive on the client computer.

QUESTION 63Your network contains a System Center 2012 Configuration Manager environment. In Default Client Agent Settings, you enable Hardware Inventory and SoftwareInventory. You discover that a group of client computers fails to report software inventory data. The client computers report hardware inventory data. You confirmthat Configuration Manager can deploy Applications to the group of client computers. You need to identify what is causing the reporting issue. Which log files shouldyou review? (Choose all that Apply.)

A. Filesystemfile.logB. Dataldr.logC. Mp_sinv.logD. Inventoryagent.logE. Hman.log

Correct Answer: BDSection: (none)

Page 72: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh427342.aspxFileSystemFile.loglog for software inventory and file collectionInventoryAgent.loglogs DDRs (Discovery Data Records) for hardware and softwareMore information:dataldr.logRecords information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database.The question states “You discover that a group of client computers fails to report software inventory data”. As per the above definition, dataldr.log is used for theprocessing of MIF files and Hardware Inventory.

QUESTION 64Note: This question is part of a series of questions that use the same set of answer choices. n answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Manager environment. The network contains 10 database servers that run Microsoft SQL Server2008. You have a configuration baseline that is used to monitor the database servers. You add new configuration items to the configuration baseline. Two dayslater, you discover that only eight of the database servers report any information about the new configuration items. You need to identify whether the newconfiguration items downloaded to the database servers. Which log file should you review?

A. Hman.logB. Sitestat.logC. Dcmagent.logD. Wsyncmgr.logE. Ccm.logF. Contenttransfermanager.logG. Sdmagent.logH. Rcmctri.logI. Ciagent.logJ. Smsexec.logK. Locationservices.log

Correct Answer: ISection: (none)Explanation

Explanation/Reference:

Page 73: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation:Ciagent.logNot related to US foreign security policy but provides information about processing configuration items, including software updates.Incorrect:Not B: Sitestat.log: Records the monitoring process of all site systems.

QUESTION 65Your network contains a System Center 2012 Configuration Manager environment. You deploy a Microsoft Office 2007 package to all client computers by using Configuration Manager. Your company purchases Office 2010. You need to ensure that all users can install Office 2010 from the Application Catalog. What should you do?

A. Deploy a new package for Office 2010.B. Deploy Office 2010 by using a Group Policy Object (GPO).C. Update the Office 2007 source file and redeploy the package.D. Deploy a new Application for Office 2010.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg699369.aspxPackages and Programs in Configuration ManagerMicrosoft System Center 2012 Configuration Manager continues to support packages and programs that were used in Configuration Manager 2007.You can use Microsoft System Center Configuration Manager Package Conversion Manager to convert packages and programs into Configuration Managerapplications.Further information:http://technet.microsoft.com/en-us/library/gg682125.aspxIntroduction to Application Management in Configuration Manager

QUESTION 66You deploy Windows 7 by using Operating System Deployment (OSD). The development task sequence contains steps to install software updates andApplications. The amount of time required to deploy the Windows 7 image has increased significantly during the last six months. You need to recommend a solution to reduce the amount of time it takes to deploy the image.What should you recommend?

A. Synchronize software updates before deploying the image.

Page 74: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

B. Use offline servicing for the image.C. Create a new automatic deployment rule.D. Add an additional Install Software Updates step to the deployment task sequence.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:By updating an image in the Software Library instead of performing a new build and capture of the operating system image you will gain a few distinct advantages.You will be able to reduce the risk of vulnerabilities during operating system deployments and reduce the overall operating system deployment to the end user. Youwill also reduce the administrative effort to maintain your operating system images. The feature is applicable for Component Based Servicing (CBS) updates and forthe following operating systems:Microsoft Windows Vista SP2 and laterMicrosoft Windows Server 2008 SP2 and laterMicrosoft Windows 7 RTMMicrosoft Windows 2008 R2* At the launch of ConfigMgr 2012 Beta 2 Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 are not supported. They will be supported withConfiguration Manager 2012 RTM.

QUESTION 67You have Windows 7 .mages that are rebuilt quarterly and sported to System Center 2012 Configuration Manager. The Microsoft Deployment Toolkit (MDT) 2012 isintegrated with Configuration Manager. You need to reduce the network security risks when the images are deployed by using Operating System Deployment (OSD). What should you do? (Choose all that Apply.)

A. After the Apply Operating System Image task sequence step, add a step to install software updates offline.B. Before the Apply Operating System image task sequence step, add a step to install Deployment Imaging Servicing and Management (DISM).C. After the installation of the final Application, add an Install Software Updates task sequence step.D. After the Apply Operating System Image task sequence step, add a Run Command line step that runs wuaudt.exe /detectnowE. Before the Apply Operating System image task sequence step, add a step to install the Windows Automated Installation Kit (Windows AIK).

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:With Config Manager 2012, software updatescan be applied offline.

Page 75: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

A. We apply the OS image, then install software updates (windows updates) offline before starting the OS.C. Install software applications, then install updates (application updates) to the applications. INSTALLING SOFTWARE UPDATES DURING SCCM OSDPreparation:To be able to deploy software updates during the deployment of Windows 7 using SCCM, the Microsoft Deployment Toolkit (MDT) 2010 Update 1 must beintegrated with SCCM.

This integration will add MDT task sequences to SCCM. Adding the Install Updates Offline step to Task Sequence:To install software updates while Windows 7 is being deployed using SCCM, the Install Updates Offline task should be used in the task sequence used to deploythe OS. This task will install all the software updates included in a specific SCCM deployment package after the image has been applied to the disk. This taskshould be placed in the PostInstall group just before the Configure task. To insert the task, select the task just above the Configure task, and then click on Add inthe pull-down menu bar on the top, hi-lite MDT and click on Install Updates Offline

Page 76: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Configure the task by browsing to select the Updates package that contains the security updates that you want to install.

Page 77: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

You can add as many Install Updates Offline tasks as needed as only one package can be included per task.

QUESTION 68Your company uses System Center 2012 Configuration Manager to distribute operating system images. The standard operating system for client computers isWindows 7 Enterprise (x86). You receive 300 new desktop computers. Each computer has a new storage controller. When you attempt to deploy an existing imageto one of the computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase. You need to ensure that you can deploy Windows 7 to the new computers by using an image. What should you do?

A. Import the storage drivers to the Drivers container and update the task sequence.B. Create a new x64 boot image and configure the operating system image to use the x64 boot image.C. Create a new driver package and update the task sequence.D. Update the existing x86 boot image to include the storage drivers.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712674.aspxPlanning a Device Driver Strategy in Configuration Manager...Planning a Device Driver Strategy in Configuration ManagerYou can add Windows device drivers that have been imported into the driver catalog to boot images. Use the following guidelines when you add device drivers to aboot image:* Add only mass storage and network adapter device drivers to boot images because other types of drivers are not generally required. Drivers that are not requiredincrease the size of the boot image unnecessarily.* Add only device drivers for Windows 7 to a boot image because the required version of Windows PE is based on Windows 7.

Page 78: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

* Ensure that you use the correct device driver for the architecture of the boot image. Do not add an x86 device driver to an x64 boot image.

QUESTION 69Your network contains a System Center 2012 Configuration Manager environment. You plan to create a build and capture a task sequence to build a referenceimage of Windows 7. You need to identify which Application must exist in Configuration Manager before you can create the build and capture the task sequence.Which Applications should you identify? (Choose all that Apply.)

A. Microsoft Deployment Toolkit (MDT)B. Configuration Manager clientC. System Preparation tool (Sysprep)D. User State Migration Tool (USMT)

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:Only Configuration Manager client is needed, there is no MDT integration, so MDT and USMT are not needed, Sysprep is built in with Windows 7, no need to createthe package.

QUESTION 70You are the network administrator for a company named Contoso, Ltd. The network contains 1,000 desktop computers and 500 servers. The network contains aSystem Center 2012 Configuration Manager environment. The names of all the desktop computers in the human resources department start with the letters HR, forexample HR001 and HR023. A device collection named All Server Devices contains all of the servers. A device collection named All Desktop Devices contains all ofthe desktop computers. You plan to create a new collection named All HR Computers and Servers. The new collection must contain all of the human resourcesdepartment computers and all of the servers. The collection must not contain any other computers. You need to create a membership rule for the new collection.Which rule should you include in the membership rule? (Choose all that Apply.)

A. QUERY RULE: select * from SMS_R_System where SMS_R_system.NetbiosName like "HR%"B. INCLUDE RULE: All Server DevicesC. EXCLUDE RULE: All NON HR ComputersD. EXCLUDE RULE: All Desktop DevicesE. QUERY RULE- select * from SMS_R_System where

SMS_R_system.OperatingSystemNameandVersion like. *%Workstation*F. QUERY RULE- select * from SMS_R_System where

SMS_R_system.OperatingSystemNameandVersion not like. *%Server*

Correct Answer: AB

Page 79: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Section: (none)Explanation

Explanation/Reference:Explanation: select * from SMS_R_System where SMS_R_system.NetbiosName like "HR%"SQL command to select all Systems whose names begin with HR

INCLUDE RULE: All Server DevicesSelects all the Server Devices as asked in the question.

Further information:http://technet.microsoft.com/en-us/library/gg682177.aspxIntroduction to Collections in Configuration Manager

Collections in System Center 2012 Configuration Manager represent logical groupings of resources, such as users and devices. You can use collections to help youperform many tasks, such as managing applications, deploying compliance settings, or installing software updates. You can also use collections to manage groupsof client settings. Additionally, System Center 2012 Configuration Manager uses collections with role-based administration to specify the collections that an administrative user canaccess.

Collection RulesDirect RuleQuery Rule

Query rules dynamically update the membership of a collection based on a query that Configuration Manager runs on a schedule.Unlike direct rule collections, this collection membership automatically updates when you add or remove new users to the Human Resources organizational unit.

Include Collections RuleThe include collections rule lets you include the members of another collection in a Configuration Manager collection. Configuration Manager updates themembership of the current collection on a schedule if the membership of the included collection changes.

Exclude Collections RuleThe exclude collections rule lets you exclude the members of another collection from a Configuration Manager collection. Configuration Manager updates themembership of the current collection on a schedule if the membership of the excluded collection changes.Note: If a collection includes both include collection and exclude collection rules and there is a conflict, the exclude rule takes priority over the include rule.

Default Collections in Configuration ManagerAll User GroupsAll UsersAll Users and User GroupsAll Mobile DevicesAll SystemsAll Unknown Computers

Page 80: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 71Your network contains a System Center 2012 Configuration Manager environment. The Client Status node .n the Configuration Manager console shows adownward trend in client health. You verify the logs on several clients. You discover that the clients are healthy and are communicating normally to managementpoints. You need to identify the reasons why the Configuration Manager console displays a downward trend in client health. Which reasons should you identify?(Choose all that Apply.)

A. In Client Status Settings Properties, the Heartbeat discovery during the following days interval is shorter than the Heartbeat Discovery interval.B. The age set in the Delete Aged Discovery Data maintenance task is shorter than the Heartbeat Discovery interval.C. The Delete Obsolete Client Discovery Data maintenance task is disabled.D. The Active Directory sites that are members of boundary groups are modified.E. Microsoft SQL Server replication to the management points stopped.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712308.aspx#BKMK_HeartbeatDisc Planning for Discovery in Configuration Manager - About Heartbeat DiscoveryHeartbeat Discovery differs from other Configuration Manager discovery methods. It is enabled by default and runs on each computer client to create a discoverydata record (DDR). Heartbeat Discovery runs either on a schedule configured for all clients in the hierarchy, or if manually invoked, on a specific client by running the Discovery DataCollection Cycle on the Action tab in a client’s Configuration Manager program. When Heartbeat Discovery runs, it creates a discovery data record (DDR) thatcontains the client’s current information including network location, NetBIOS name, and operational status details. It is a small file, about 1KB, which is copied to amanagement point, and then processed by a primary site. The submission of a Heartbeat Discovery DDR can maintain an active client’s record in the database,and also force discovery of an active client that might have been removed from the database, or that has been manually installed and not discovered by anotherdiscovery method.The default schedule for Heartbeat Discovery is set to every 7 days. If you change the heartbeat discovery interval, ensure that it runs more frequently than the sitemaintenance task Delete Aged Discovery Data, which deletes inactive client records from the site database. You can configure the Delete Aged Discovery Datatask only for primary sites. http://technet.microsoft.com/en-us/library/gg712679.aspxPlanning for Boundaries and Boundary Groups in Configuration ManagerIn System Center 2012 Configuration Manager, a boundary is a network location on the intranet that can contain one or more devices that you want to manage.Boundaries can be an IP subnet, Active Directory site name, IPv6 Prefix, or an IP address range, and the hierarchy can include any combination of these boundarytypes. To use a boundary, you must add the boundary to one or more boundary groups. Boundary groups are collections of boundaries. By using boundary groups,clients on the intranet can find an assigned site and locate content when they have to install software, such as applications, software updates, and operating systemimages.When clients are on the Internet, or they are configured as Internet-only clients, they do not use boundary information. These clients cannot use automatic siteassignment and always download content from any distribution point in their assigned site when the distribution point is configured to allow client connections fromthe Internet.

Page 81: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Site AssignmentYou can configure each boundary group with an assigned site for clients. Clients join the assigned site of a boundary group that contains the client’s current networklocation. When a boundary is added to multiple boundary groups that have different assigned sites, clients will nondeterministically select one of the sites. SystemCenter 2012 Configuration Manager does not support this overlapping boundary configuration for site assignment.If you make a change to the site assignment configuration of a boundary group, only new site assignment actions are affected. Clients that have previously beenassigned to a site, do not re-evaluate their site assignment based on changes to the configuration of a boundary group.Further information:http://technet.microsoft.com/en-us/library/bb632879.aspxDelete Obsolete Client Discovery Data Task OverviewThe Delete Obsolete Client Discovery Data task deletes obsolete client records from the Configuration Manager 2007 site database. A record that is markedobsolete typically was superseded by a newer record for the same client. The newer record becomes the client's current record, and the older record becomesobsolete.When you enable this task, you should configure the schedule to run at an interval greater than the heartbeat discovery schedule. This allows clients to sendDiscovery Data Records (DDRs) so that the obsolete bit is set correctly.http://technet.microsoft.com/en-us/library/gg682132.aspx#BKMK_ClientHealthIntroduction to Client Deployment in Configuration Manager - Monitoring the Status of Client Computers in Configuration ManagerUse the Client Status node in the Monitoring workspace of the Configuration Manager console to monitor the health and activity of client computers in yourhierarchy. Configuration Manager uses the following two methods to evaluate the overall status of client computers.Client Activity: You can configure thresholds to determine whether a client is active, for example:Whether the client requested policy during the last seven days.Whether Heartbeat Discovery found the client during the last seven days.Whether the client sent hardware inventory during the last seven days.When all these thresholds are exceeded, the client is determined to be inactive.Client Check: A client evaluation engine is installed with the Configuration Manager client, which periodically evaluates the health of the Configuration Managerclient and its dependencies. This engine can check or remediate some problems with the Configuration Manager client.Client status uses the monitoring and reporting capabilities of Configuration Manager to provide information in the Configuration Manager console about the healthand activity of the client. You can configure alerts to notify you when clients check results or client activity drops below a specified percentage of clients in a collection or when remediationfails on a specified percentage of clients.

QUESTION 72Your network contains a System Center 2012 Configuration Manager environment. You create a report named Report1. Report1 is used by multiple users. Usersreport that it takes too long to load Report1. You need to reduce the amount of time it takes to load Report1. What should you do?

A. Enable caching for the report.B. Decrease the Size of the ReportServer database.C. Decrease the session timeout value for the Reports website.D. Increase the size of the ReportServerTempDB database.

Correct Answer: ASection: (none)

Page 82: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation

Explanation/Reference:Explanation:Report caching can shorten the time it takes for a user to retrieve a report, particularly if the report is large or accessed frequently. When a report is requested, aquery is sent to the database, an intermediate form of the report is cached on the report server, and the final report is rendered to the end user. Report cachingforces the intermediate version of the report to be cached on the report server and provides a more consistent user experience with a reduced load on thedatabase.

QUESTION 73Your network contains a System center 2012 Configuration Manager environment. You are creating a configuration item that contains application settings forMicrosoft Office 2010. You need to detect whether Office 2010 is installed before validating the configuration item. What should you do?

A. Create a report to display all installed software.B. Enable Use a custom script to detect this application.C. Create a direct membership collection.D. Create an automatic deployment rule.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:Create Configuration Item Wizard

Page 83: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 84: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 85: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 86: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 74Your network contains a System Center 2012 Configuration Manager environment. Two weeks ago, you deployed a Windows Installer package named App1. Youneed to remediate a registry value that applies only to the client computers that have App1 installed. The solution must minimize network traffic. What should youdo?

A. Modify the App1 Windows Installer package to contain the registry setting, and then create a new application for Appl.B. Modify the App1 Windows Installer package to contain the registry setting, and then configure the existing application for App1 to use the new Windows Installer

package.C. Create an application-based configuration item, configure a rule for an existential type, and then import the registry setting from a client computer that has App1

installed.D. Create an application-based configuration item, configure the detection method to use the Windows Installer product code of App1, and then import the registry

setting from a client computer that has App1 installed.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration ManagerCompliance settings in System Center 2012 Configuration Manager provides a unified interface and user experience that lets you manage the configuration andcompliance of servers, laptops, desktop computers, and mobile devices in your organization. Compliance settings contains tools to help you assess the complianceof users and client devices for many configurations, such as whether the correct Windows operating system versions are installed and configured appropriately,whether all required applications are installed and configured correctly, whether optional applications are configured appropriately, and whether prohibitedapplications are installed. Additionally, you can check for compliance with software updates, security settings, and mobile devices. Configuration item settings of thetype Windows Management Instrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let you automatically remediatenoncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe thelevel of compliance you must have. You can import this configuration data from the web in Microsoft System Center Configuration Manager Configuration Packs asbest practices that are defined by Microsoft and other vendors, in Configuration Manager, and that you then import into Configuration Manager. Or, anadministrative user can create new configuration items and configuration baselines.http://technet.microsoft.com/en-us/library/gg712331.aspxHow to Create Windows Configuration Items for Compliance Settings in Configuration ManagerCreate configuration items in System Center 2012 Configuration Manager to define configurations that you want to manage and assess for compliance on devices.There are different types of configuration items: Application configuration itemUsed to determine compliance for an application. This can include whether the application is installed and details about its configuration.Operating system configuration item

Page 87: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Used to determine compliance for settings that relate to the operating system and its configuration. Software updates configuration item Automatically created when you download software updates with Configuration Manager.You do not create or see these configuration items in the Compliance Settings node, but you can select them when you define configuration baselines. General configuration item Used to determine compliance for mobile devices....Steps to Create a New Configuration Item for Client ComputersUse the following required steps to create a configuration item by using the Create Configuration Item Wizard:Step 1: Start the Create Configuration Item Wizard.Step 2: Provide general information about the configuration item.Step 3: Provide detection method information for the configuration item.Step 4: Configure settings for the configuration item.Step 5: Configure compliance rules for the configuration item.Step 6: Specify supported platforms for the configuration item.Step 7: Complete the wizard....http://technet.microsoft.com/en-us/library/gg712331.aspx#BKMK_Step3Step 3: Provide Detection Method Information for the Configuration Item

Use this procedure to provide detection method information for the configuration item.Note: Applies only if you selected This configuration item contains application settings on the General page of the wizard.A detection method in Configuration Manager contains rules that are used to detect whether an application is installed on a computer. This detection occurs beforethe configuration item is assessed for compliance. To detect whether an application is installed, you can detect the presence of a Windows Installer file for theapplication, use a custom script, or select Always assume application is installed to assess the configuration item for compliance regardless of whether theapplication is installed.

QUESTION 75Your company has a production network and a test network. Both networks have System Center 2012 Configuration Manager deployed. You create the followingobjects on the test network:

- A configuration item named WebCI- A configuration baseline named WebBaseline that c ontains WebCI- A collection named WebServers that contains all o f the Web servers on the test network.

http://www.gratisexam.com/

Page 88: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

You export the configuration baseline to Baseline.cab. You open the Configuration Manager console, you click Assets and Compliance, and then you expandCompliance Settings. You need to apply the configuration baseline to the Web servers on the production network. What should you do next? (Choose all thatapply.)

A. Right-click WebBaseline, select Categorize, and then select Server.B. Right-click Configuration Baselines, and then select Import Configuration DataC. Right-click WebCI, select Export, and then specify Baseline.cab as the export file.D. Right-click WebBaseline, and then select Properties. In the Deployments tab, type WebServers in the Filter... box.E. Right-click WebBaseline, select Deploy, and then select the WebServers collection.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

Page 89: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 90: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Select Base line, deploy

Page 91: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 92: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 76Your company uses System Center 2012 Configuration Manager to monitor compliance. The company has a configuration basel.ne for each server that has theWeb Server (IIS) server rote installed. A new corporate policy specifies that the maximum TCP window size for all of the Web servers must be 131,072 bytes.You discover that the TCP window size is set in the following registry entry:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\Para meters\MaxBytesPerSe nd

You need to generate an error message for all of the Web servers that do NOT comply with the corporate policy. What should you do?

A. Add a new configuration item that has a registry value setting type to the configuration baseline.B. Create a query-based collection that contains all of the Web servers, and then initiate an inventory collection.C. Create a query that returns a list of all the Web servers, and then search the query results for the registry value.D. Add a new configuration item that has an Internet Information Serv.ces (IIS) metabase setting type to the configuration basel.ne.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration ManagerCompliance settings in System Center 2012 Configuration Manager provides a unified interface and user experience that lets you manage the configuration andcompliance of servers, laptops, desktop computers, and mobile devices in your organization. Compliance settings contains tools to help you assess the complianceof users and client devices for many configurations, such as whether the correct Windows operating system versions are installed and configured appropriately,whether all required applications are installed and configured correctly, whether optional applications are configured appropriately, and whether prohibitedapplications are installed. Additionally, you can check for compliance with software updates, security settings, and mobile devices. Configuration item settings of thetype Windows Management Instrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let you automatically remediatenoncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe thelevel of compliance you must have. You can import this configuration data from the web in Microsoft System Center Configuration Manager Configuration Packs asbest practices that are defined by Microsoft and other vendors, in Configuration Manager, and that you then import into Configuration Manager. Or, anadministrative user can create new configuration items and configuration baselines.

http://technet.microsoft.com/en-us/library/gg712331.aspxHow to Create Windows Configuration Items for Compliance Settings in Configuration Manager

Create configuration items in System Center 2012 Configuration Manager to define configurations that you want to manage and assess for compliance on devices.There are different types of configuration items:

Page 93: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Application configuration itemUsed to determine compliance for an application. This can include whether the application is installed and details about its configuration.Operating system configuration item Used to determine compliance for settings that relate to the operating system and its configuration. Software updates configuration item Automatically created when you download software updates with Configuration Manager.You do not create or see these configuration items in the Compliance Settings node, but you can select them when you define configuration baselines. General configuration item Used to determine compliance for mobile devices....Steps to Create a New Configuration Item for Client ComputersUse the following required steps to create a configuration item by using the Create Configuration Item Wizard:Step 1: Start the Create Configuration Item Wizard.Step 2: Provide general information about the configuration item.Step 3: Provide detection method information for the configuration item.Step 4: Configure settings for the configuration item.Step 5: Configure compliance rules for the configuration item.Step 6: Specify supported platforms for the configuration item.Step 7: Complete the wizard.

QUESTION 77Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.)

The network contains six servers. The servers are configured as shown in the following table.

Page 94: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

You plan to deploy servers to the perimeter network by using Configuration Manager. The operating system for each server will be instated over the network. Theinstallations will begin automatically, as soon as each server starts for the first time. You need to recommend a solution to minimize the amount of network trafficbetween the perimeter network and the internal network during the installation of the operating systems. What should you do?

A. Install a software update point on Server3.B. Configure IIS to support only HTTP on Server3.C. Install a PXE-enabled protected distribution point on Servers.D. Install a management point on Servers.E. Install Windows Server Update Services (WSUS) on Server3.F. Install Network Load Balancing (NLB) on Server6.G. Install the Windows Cluster service on Server6.H. Install a PXE-enabled protected distribution point on Server4.I. Install a management point on Server2.J. Install a protected distribution point on Server1.K. Install the Windows Cluster service on Server3.L. Install Network Load Balancing (NLB) on Server3.

Page 95: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

M. Configure the Exchange connector on Server3.N. Configure IIS to support only HTTPS on Servers.O. Install an enrollment proxy point on Server6.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:Administration, Site config, Servers and Site System Roles, DP role, properties, PXE tab

Page 96: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 97: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer
Page 98: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Topology Sample: http://technet.microsoft.com/en-us/library/bb633059.aspx

QUESTION 78Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.)

The network contains six servers. The servers are configured as shown in the following table.

Page 99: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

A corporate security policy states that remote computers are forbidden to communicate directly with servers on the internal network. You need to ensure that youcollect inventory data from the remote computers. What should you do?

A. Install Windows Server Update Serves (WSUS) on Server3.B. Configure the Exchange connector on Server3.C. Install a management point on Server2.D. Install a PXE-enabled protected distribution point on Servers.E. Install a software update point on Server3.F. Install Network Load Balancing (NLB) on Server6.G. Install an enrollment proxy point on Server6.H. Install the Windows Cluster service on Server3.I. Install a protected distribution point on Server1.J. Configure IIS to support only HTTPS on Servers.K. Install a management point on Server5.L. Install the Windows Cluster service on Server6.M. Configure IIS to support only HTTP on Servers.N. Install Network Load Balancing (NLB) on Server3.O. Install a PXE-enabled protected distribution point on Server4.

Correct Answer: KSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712701.aspxPlanning for Communications in Configuration ManagerPlanning for Communications Across Forests in Configuration ManagerWhen your Configuration Manager design spans multiple Active Directory domains and forests, use the additional information in the following table to help you planfor the following types of communication:..Communication in a site that spans forests: Does not require a two-way forest trust.To support clients primary sites support the installation of each site system role on computers in other forests. Note: Two exceptions are the out of band service point and the Application Catalog web service point. Each must be installed in the same forest as the site server.When the site system role accepts connections from the Internet, as a security best practice, install these site system roles in an untrusted forest (for example, in aperimeter network) so that the forest boundary provides protection for the site server.When you specify a computer to be a site system server, you must specify the Site System Installation Account. This account must have local administrativecredentials to connect to, and then install site system roles on the specified computer.

Page 100: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

When you install a site system role in an untrusted forest, you must select the site system option Require the site server to initiate connections to this site system.This configuration enables the site server to establish connections to the site system server to transfer data. This prevents the site system server that is in theuntrusted location from initiating contact with the site server that is inside your trusted network. These connections use the Site System Installation Account that youuse to install the site system server.The management point and enrollment point site system roles connect to the site database. By default, when these site system roles are installed, ConfigurationManager configures the computer account of the new site system server as the connection account and adds the account to the appropriate SQL Server databaserole. When you install these site system roles in an untrusted domain, you must configure the site system role connection account to enable the site system role toobtain information from the database.If you configure a domain user account for these connection accounts, ensure that the account has appropriate access to the SQL Server database at that site:* Management point: Management Point Database Connection Account* Enrollment point: Enrollment Point Connection AccountConsider the following additional information when you plan for site system roles in other forests:* If you run a Windows Firewall, configure the applicable firewall profiles to pass communications between the site database server and computers that are installedwith remote site system roles. * When the Internet-based management point trusts the forest that contains the user accounts, user policies are supported. When no trust exists, only computerpolicies are supported.

QUESTION 79Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.)

The network contains six servers. The servers are configured as shown in the following table.

Page 101: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Administrators currently apply software updates to servers manually. You discover that Server4 was never updated. You need to centrally manage software updatesfor all of the servers by using configuration Manager. What should you do first?

A. Install a management point on Server5.B. Configure IIS to support only HTTPS on Servers.C. Install a management point on Server2.D. Install Network Load Balancing (NLB) on Server3.E. Install an enrollment proxy point on Server6.F. Configure IIS to support only HTTP on Server3.G. Configure the Exchange connector on 5erver3.H. Install Network Load Balancing (NLB) on 5erver6.I. Install a PXE-enabled protected distribution point on Servers.J. Install the Windows Cluster service on Server3.K. Install a PXE-enabled protected distribution point on Server4L. Install the Windows Cluster service on Server6.M. Install Windows Server Update Services (WSUS) on Server3.

Page 102: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

N. Install a protected distribution point on Server1.O. Install a software update point on Server3.

Correct Answer: MSection: (none)Explanation

Explanation/Reference:Explanation:A WSUS service will simplify and automate software updates for all servers from a single management interface.

QUESTION 80Your company has 2,000 desktop computers and 450 portable computers. The desktop computers run Windows 7 Enterprise (x64) and the portable computers runWindows 7 Professional (x86). The network contains a System Center 2012 Configuration Manager environment. You create a configuration baseline that istargeted to all of the computers. You discover that you fail to receive compliance information for the configuration baseline from the portable computers. You receivecompliance information for the configuration baseline from the desktop computers. You receive compliance information for other configuration baselines from all ofthe computers. You need to ensure that you receive compliance information for the configuration baseline from all of the computers. What should you do?

A. Add the configuration item to a new configuration baseline.B. Create a collection containing the portable computers and assign the configuration baseline to the collection.C. Create custom client settings for the portable computers and enable Compliance Settings.D. Configure the configuration item to be evaluated on all Windows 7 operating systems.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager Compliance settings in System Center 2012 Configuration Manager provides a unified interface and user experience that lets you manage the configuration andcompliance of servers, laptops, desktop computers, and mobile devices in your organization. Compliance settings contains tools to help you assess the complianceof users and client devices for many configurations, such as whether the correct Windows operating system versions are installed and configured appropriately,whether all required applications are installed and configured correctly, whether optional applications are configured appropriately, and whether prohibitedapplications are installed. Additionally, you can check for compliance with software updates, security settings, and mobile devices. Configuration item settings of thetype Windows Management Instrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let you automatically remediatenoncompliant settings when they are found.Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe thelevel of compliance you must have. You can import this configuration data from the web in Microsoft System Center Configuration Manager Configuration Packs as

Page 103: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

best practices that are defined by Microsoft and other vendors, in Configuration Manager, and that you then import into Configuration Manager. Or, anadministrative user can create new configuration items and configuration baselines.http://technet.microsoft.com/en-us/library/hh219289.aspxHow to Deploy Configuration Baselines in Configuration ManagerConfiguration baselines in System Center 2012 Configuration Manager must be deployed to one or more collections of users or devices before client devices inthose collections can assess their compliance with the configuration baseline.Further information:Question says: this and only this new baseline isn't working on portable devices.Reason: Maybe this baseline wasn't deployed to those PCs.The client/agent on all computers seems to be OK.

QUESTION 81Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Management environment. The environment contains a Central Administration site and two primarychild sites named Child1 and Child2. You create a new Application on the Central Administration site. You view the new Application on Child 1, but the new Application fails to appear on Child2. You need to identify whether the Application transferred to Child2. Which log file should you review?

A. Locabonservices.logB. Smsexec.logC. Ccm.logD. Sdmagent.logE. Dcmagent.logF. Rcmctrl.logG. Wsyncmgr.logH. Ciagent.logI. Hman.logJ. Contenttransfermanager.logK. Sitestat.log

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:

Page 104: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Rcmctrl.logReplication related information.Incorrect:Not A: Locatonservices.log Finds management points and distribution points.Not B: Smsexec.log Records processing of all site server component threads.Not C: Ccm.logClient Configuration Manager tasks.Not D: Sdmagent.logShared with the Configuration Manager feature desired configuration management and contains the tracking process of remediation and compliance.Not E: Dcmagent.logProvides high-level information about the evaluation of assigned configuration baselines and desired configuration management processes.Not G: Wsyncmgr.logProvides information about the software updates synchronization process.Not H: Ciagent.logNot related to US foreign security policy but provides information about processing configuration items, including software updates.Not I: Hman.logRecords site configuration changes, and publishes site information in Active Directory Domain Services.Not J: ContentTransferManager.logSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to access SMS packages.Not K: Sitestat.logRecords the monitoring process of all site systems.

QUESTION 82Your network contains an Active Directory forest. The forest contains a System Center 2012 Configuration Manager environment. The environment contains oneprimary site. You need to unsure that the members of a group named Group1 are allowed to deploy applications to desktop computers. The solution must minimizethe number of permissions assigned to Group1. What should you do?

A. Assign the Application Administrator security role to Group1.Create a new collection that contains all of the desktop computers.Add Group1 to the local Administrators group on each desktop computer.

B. Add the Application Deployment Manager security role to Group1.Create a new collection that contains all of the desktop computers.Add Group1 to the local Administrators group on each desktop computer.

C. Assign the Application Deployment Manager security role to Group1.Create a new collection that contains all of the desktop computers.Scope Group1 to the new collection.

D. Assign the Application Administrator security role to Group1.Create a new collection that contains all of the desktop computers.Scope Group1 to the new collection.

Correct Answer: C

Page 105: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Section: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh524341.aspxGlossary for Microsoft System Center 2012 Configuration Manager Application AdministratorA security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Authorrole.Application Deployment ManagerA security role that grants permissions to administrative users so that they can deploy and monitor applications.http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-systemcenter-2012-configuration-manager.aspxRole-Based Administration in System Center 2012 Configuration ManagerIn Configuration Manager 2012, Security Roles are used to collectively group objects and permissions (operations) for assignment to an Administrator. Instead of anindividual permission set on a single instance of object, the Security Role provides a single Role assignment to an administrator; reducing the overall complexitywith permission management. An “object” in the Security Role is something that you want to manage access to and “permission” is the operational functions, suchas Read, Modify and Delete.

QUESTION 83Your network contains a single Active Directory domain. You plan to deploy System Center 2012 Configuration Manager. The hierarchy will have a CentralAdministration site and five primary sites. You need to ensure that you can target user groups for software distribution. The solution must minimize network traffic.Which Configuration Manager discovery method should you use?

A. Active Directory User Discovery on the primary sitesB. Active Directory User Discovery on the primary sites and Active Directory Group Discovery on every siteC. Active Directory User Discovery on the Central Administration site and Active Directory Group Discovery on the primary sitesD. Active Directory User Discovery and Active Directory Group Discovery on the Central Administration site

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:AD User discovery for Primary Site and Group discover for Each Primary Site:

Page 106: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

When discovery of a resource is successful, discovery puts information about the resource in a file that is referred to as a discovery data record (DDR). DDRs are inturn processed by site servers and entered into the Configuration Manager database where they are then replicated by database- replication with all sites. Thereplication makes discovery data available at each site in the hierarchy, regardless of where it was discovered or processed.

CautionWhen you clear the option to publish a site to an Active Directory forest, all previously published information for that site, including available site system roles, isremoved from the Active Directory of that forest.When you run Active Directory System Discovery and Active Directory User Discovery, the additional Active Directory attributes for each object type are available,and as a result, Active Directory Group Discovery runs more efficiently.Active Directory System Group Discovery works only for systems that are already discovered and assigned to the local primary site and any direct child secondarysites Use Configuration Manager Active Directory Forest Discovery to discover IP subnets and Active Directory sites and to add them to Configuration Manager asboundaries. Consider the scope of the discovery configuration and limit discovery to only those Active Directory locations and groups that you have to discover. OnlyNetwork Discovery available on Secondary site. Others not available for secondary site. http://technet.microsoft.com/en-us/library/6a0e2b40-672f-45e1-a12d- 6d403ab39780#BKMK_DiscMethods

Page 107: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Personal comment:From my point of view, the correct answer would be Active Directory User Discovery and Active Directory Group Discovery on the primary sitesThe remaining possible correct answers might be: Active Directory User Discovery on the primary sites and Active Directory Group Discovery on every siteor Active Directory User Discovery and Active Directory Group Discovery on the Central Administration siteUpdate:It seems that more recent exams contain the answer "Active Directory User Discovery and Active Directory Group Discovery on the primary sites" So if you are lucky and have it, choose this one.

QUESTION 84Your network contains a System Center 2012 Configuration Manager environment. The Configuration Manager databases are located on a remote server that runsMicrosoft SQL Server. You need to ensure that you can restore the Central Administration site. What should you do?

A. From the Configuration Manager console, enable the Backup Site Server maintenance task and set a schedule.B. From Microsoft SQL Server Management Studio, create a maintenance plan for the site databases.C. From Task Scheduler, create a scheduled task that runs smssqlbkup.exe.D. From Windows Server Backup, schedule a full system backup.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation: http://technet.microsoft.com/en-us/library/gg712697.aspxBackup and Recovery in Configuration ManagerEnterprise solutions such as System Center 2012 Configuration Manager must prepare for both backup and recovery operations to avoid loss of critical data. ForConfiguration Manager sites, this preparation ensures that sites and hierarchies are recovered with the least data loss and in the quickest possible time. ..Back up a Configuration Manager SiteSystem Center 2012 Configuration Manager provides a backup maintenance task that runs on a schedule and backs up the site database, specific registry keys,and specific folders and files...Backup Maintenance TaskYou can automate backup for Configuration Manager sites by scheduling the predefined Backup Site Server maintenance task. You can back up a centraladministration site and primary site, but there is no backup support for secondary sites or site system servers...To enable the site backup maintenance task1. In the Configuration Manager console, click Administration.

Page 108: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

2. In the Administration workspace, expand Site Configuration, and then click Sites.3. Select the site in which you want to enable the site backup maintenance task.4. On the Home tab, in the Settings group, click Site Maintenance Tasks.5. lick Backup Site Server and then click Edit.6. Select Enable this task, and then click Set Paths to specify the backup destination. 7. Configure an appropriate schedule for the site backup task. As a best practice, consider a backup schedule that is outside active working hours. If you have ahierarchy, consider a schedule that runs at least two times a week to ensure maximum data retention in the event of site failure.8. Select whether to create an alert if the site backup task fails, click OK, and then click OK. When selected, Configuration Manager creates a critical alert for thebackup failure that you can review in the Alerts node in the Monitoring workspace.

QUESTION 85Your network contains a single Active Directory forest named contoso.com. Contoso.com contains three System Center 2012 Configuration Manager sites and oneSystem Center Configuration Manager 2007 site. You need to ensure that you can transfer objects from Configuration Manager 2007 to Configuration Manager2012. What should you do?

A. Assign the computer account of the Central Administration site server permission to the Configuration Manager 2007 site. Assign the computer account of theCentral Administration site server permissions to the Microsoft SQL Server database instance.

B. Extend the Active Directory schema and assign the Central Administration site server permissions to the System\System Management container.C. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration Manager 2012 primary site.D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration Manager 2007 primary site.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712991.aspxDetermine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration ManagerIn Microsoft System Center 2012 Configuration Manager, the built-in migration functionality replaces in-place upgrades of existing Configuration Managerinfrastructure by providing a process that transfers data from active Configuration Manager 2007 sites. The functionality provided by migration helps you maintaininvestments that you have made in configurations and deployments while you can take full advantage of core changes in the product introduced in System Center2012 Configuration Manager. These changes include a simplified Configuration Manager hierarchy that uses fewer sites and resources, and the improvedprocessing by use of native 64-bit code that runs on 64-bit hardware.Migration can transfer most data from Configuration Manager 2007.http://technet.microsoft.com/en-us/library/gg681981.aspxPlanning for Migration to System Center 2012 Configuration ManagerYou must first install a System Center 2012 Configuration Manager hierarchy to be the destination hierarchy before you can migrate data from a supported sourcehierarchy.After you install the destination hierarchy, configure the management features and functions that you want to use in your destination hierarchy before you start tomigrate data.

Page 109: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

http://technet.microsoft.com/en-us/library/gg712313.aspxPrerequisites for Migration in System Center 2012 Configuration ManagerTo migrate from a supported source hierarchy, you must have access to each applicableConfiguration Manager source site, and permissions within the System Center 2012Configuration Manager destination site to configure and run migration operations.Required Configurations for MigrationData GatheringTo enable the destination site to gather data, you must configure the following two sourcesite access accounts for use with each source site:* Source Site Account: This account is used to access the SMS Provider of the source site.* For a Configuration Manager 2007 SP2 source site, this account requires Readpermission to all source site objects.* For a System Center 2012 Configuration Manager source site, this account requires Read permission to all source site objects, You grant this permission to theaccount by using role-based administration.* Source Site Database Account: This account is used to access the SQL Server database of the source site and requires Read and Execute permissions to thesource site database.You can configure these accounts when you configure a new source hierarchy, data gathering for an additional source site, or when you reconfigure the credentialsfor a source site. These accounts can use a domain user account, or you can specify the computer account of the top-level site of the destination hierarchy.Security Note: If you use the Configuration Manager computer account for either access account, ensure that this account is a member of the security groupDistributed COM Users in the domain where the source site resides.When gathering data, the following network protocols and ports are used:NetBIOS/SMB - 445 (TCP)RPC (WMI) - 135 (TCP)SQL Server - 1433 (TCP)

QUESTION 86You have a System Center 2012 Configuration Manager environment.You are deploying operating systems and migrating user profiles. You configure the state migration point to immediately delete profile data. Migrations are failing for user profiles that are larger than 25 GB.You need to successfully migrate all user profiles.What should you do?

A. Increase the retention period on the state migration point deletion policy.B. Decrease the minimum free space size setting on the state migration point.C. Remove unnecessary applications from the computers that are being migrated.D. Increase the hard disk space on the computers that are being migrated.

Correct Answer: BSection: (none)Explanation

Page 110: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation/Reference:

QUESTION 87You have a System Center 2012 Configuration Manager environment. During an operating system deployment to a specific computer, you need to ensure that all user state data is migrated to a new computer.What should you do?

A. Configure a user state restore task, and configure the task to transfer the data to the new computer.B. Configure a user state restore task, and select the Customize how user profiles are restored option.C. Create a computer association, and specify the details for the transfer.D. Edit the MigSys.xml file that is specified in the user state restore task.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 88You install System Center 2012 Configuration Manager in your Active Directory environment.You configure a single Configuration Manager site.You need to enable Network Access Protection in your environment.You extend the Active Directory schema.You create the System Management container in Active Directory. You set permissions on the System Management container for the site server. Which three actions should you perform next?(Each correct answer presents part ofthe solution. Choose three.)

A. Enable the Network Access Protection client agent.B. Enable the Software Updates client agent.C. Configure the Configuration Manager site to publish settings to Active Directory.D. Configure the Configuration Manager site for native mode.E. Enable the Desired Configuration Management client agent.F. Configure a server with the system health validator point and the Network Policy Server role.

Correct Answer: ACFSection: (none)

Page 111: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation

Explanation/Reference:

QUESTION 89You have a System Center 2012 Configuration Manager environment. You use System Center Operations Manager 2007 to monitor your Configuration Manager 2007 servers.You need to generate an alert when a software distribution point fails.What should you monitor?

A. the ccmexec.log fileB. component status of your distribution pointsC. site system status of your distribution pointsD. the smsprov.log file

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 90Your network contains a System Center 2012 Configuration Manager environment. The environment contains a single primary site. The primary site has adistribution point and a management point. You need to recommend a commutation solution that meets the following requirements:

- Communication between the client computes in the research department and the management point must u se HTTPS.- Communication between all of the other client com putes and the management point must be able to use HTTP.- Minimize the number of site system.

What should you do?

A. Configure the existing management point to use HTTPS.Configure the research department computers always to um HTTPS.

B. Create a now primary child site and configure the site to use native mode.Assign all of the research department computers to the new site.

C. Install a new management point and configure the management point always to use HTTPS.Configure the research department computers always to use HTTPS.

D. Install a new management point and configure Windows Firewall to block abound TCP port 80.

Page 112: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Configure the research department computes always to use HTTPS.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:To communicate with a site system role, the client must first locate a site system support the protocol (HTTPS or HTTP) that the client can use. By default, clientsuse the most secure method available to them. using HTTPS before it communicates with a site system role that uses HTTP. When you deploy a site system roleinclude management points, an Application Catalog website point, a state migration point, or distribution points, you must specify whether clients connect to the sitesystem by using HTTP or HTTPS. If you use HTTP, you must also consider signing and encryption choices. In a single site, you can have one management pointthat accepts HTTPS client communication and another management point that accepts HTTP client communication. You can use one site to manage clients acrossdifferent network locations that use different communication protocols and security settings.Site properties, Client Computer Communication, default : HTTPS or HTTP

Page 113: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Other client computers can be configured for Internet and intranet client management. They can automatically switch between Internet-based client managementand intranet client management when they detect a change of network. If these clients can find and connect to a management point that is configured for clientconnections on the intranet, they attempt to connect to an Internet- based management point.http://technet.microsoft.com/en-us/library/gg712701#Planning_Intra_site_Com

QUESTION 91Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the

Page 114: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

series. Your network contains a System Center 2012 Configuration Manager environment. Your company deploys 1,000 client computers. You discover thatinformation about printers fails to appear in any inventory queries or reports. Information about other hardware devices appears in the inventory queries and reports.You need to ensure that Configuration Manager data includes information about the printers.What should you do?

A. Add a WMI class to the Hardware inventory Classes list.B. Enable a default WMI class in the Hardware Inventory Classes list.C. Add a file name to the Software Inventory configuration.D. Add a file name to the Hardware inventory configuration.E. Add a file name to Software Metering.F. Select Collect NOIDMIF files in Hardware Inventory.G. Add a WMI class to the Sms_def.mof file.H. Modify the Enable software inventory on clients setting.I. Modify the Enable hardware inventory on clients setting.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/gg712290.aspxHow to Extend Hardware Inventory in Configuration ManagerSystem Center 2012 Configuration Manager hardware inventory reads information about devices by using Windows Management Instrumentation (WMI). WMI isthe Microsoft implementation of web-based Enterprise Management (WBEM), which is an industry standard for accessing management information in an enterpriseenvironment. In previous versions of Configuration Manager, you could extend hardware inventory by modifying the file sms_def.mof on the site server. ..In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did in Configuration Manager 2007. Instead, you can enable anddisable WMI classes, and add new classes to collect by hardware inventory by using client settings. Configuration Manager provides the following methods toextend hardware inventory:Enable or disable existing inventory classes - You can enable or disable the default inventory classes used by Configuration Manager or you can create customclient settings that allow you to collect different hardware inventory classes from specified collections of clients. Add a new inventory class - You can add a new inventory class from the WMI namespace of another device. Import and export hardware inventory classes - You can import and export Managed Object Format (MOF) files that contain inventory classes from theConfiguration Manager console. Create NOIDMIF Files - Use NOIDMIF files to collect information about client devices that cannot be inventoried by Configuration Manager.Create IDMIF Files - Use IDMIF files to collect information about assets in your organization that are not associated with a Configuration Manager client, forexample, projectors, photocopiers and network printers.

Page 115: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Further information:

QUESTION 92Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Manager environment. Your company develops a custom hardware device and installs thedevice on all of the client computers in the research department. You discover that information about the device fails to appear in any inventory queries or reports.Information about other hardware devices appears in the inventory queries and reports. You need to ensure that Configuration Manager data includes informationabout the custom hardware device.

Page 116: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

What should you do?

A. Enable a default WMI class in the Hardware Inventory Classes list.B. Modify the Enable hardware inventory on clients setting.C. Add a WMI class to the Hardware inventory Classes list.D. Add a file name to the Software Inventory configuration.E. Select Collect NOIDMIF files in Hardware Inventory.F. Add a file name to the Hardware inventory configuration.G. Add a file name to Software Metering.H. Add a WMI class to the Sms_def.mof file.I. Modify the Enable software inventory on clients setting.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:Adding new device/class to hardware inventoryIn the hardware inventory class window click the add button Next click the 'Connect' button

Page 117: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Select the desired class and click 'Edit'

Page 118: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Give your new device/class a friendly name (instead of the default class name) You can also set the unit size

Page 119: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Now you can select the properties you want to add (as you did in the previous section).

Page 120: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

You can see the result in the resource explorer:

Page 121: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Hardware inventory works by querying Windows Management Instrumentation (WMI) for all data from certain WMI classes. WMI includes classes for operatingsystem configuration and entities (such as user accounts), installed software, software configuration, and other objects (such as for the logged on user). Theseclasses are supplements to hardware classes. Hardware inventory collects information about many things besides hardware. For example, it can inventory softwareby collecting details about programs listed in Add or Remove Programs in Control Panel or programs that have been installed using Windows Installer. most of yourinventory needs can be served by hardware inventory collection alone.

QUESTION 93Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Manager environment. Your company deploys a custom Application to 2,000 client computersby using Configuration Manager. The Application is not listed in Add Remove Programs. You discover that information about the Application fails to appear in theinventory queries and inventory reports- You verify that information about other Applications appear in the inventory reports. You need to ensure that ConfigurationManager data includes installation information about the custom Application. What should you do?

A. Add a file name to Software Metering.B. Add a WMI class to the Hardware Inventory Classes fatC. Add a file name to the Hardware Inventory configuration.D. Enable a default WMI Cass in the Hardware Inventory Classes list.E. Select Collect NOIDMIF files .n Hardware Inventory.F. Add a file name to the Software Inventory configuration.G. Modify the Enable hardware inventory on Cents setting.H. Add a WMI class to the Sms_def.mof file.

Page 122: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Explanation:Inventory of Custom application sw, the sw is not in add remove program Add a File name to the SW Inventory configurationReg key for Add/remove program is :HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall If custom sw is not in Add/remove list then, wmi still has the custome app info byquery another reg key:HKEY_CLASSES_ROOT\Installer\Products but safer to use sw inventory (#file inventory) Software inventory works by scanning the disks on each computer to findfiles and gather information about files. You can also configure software inventory to collect specific files when it finds them. Software Inventory=File Inventory.In the Configuration Manager console, Administration, Client Settings. Default Client Settings.Properties , Default Settings ,Software Inventory. In the DeviceSettings list, configure the following values:Enable software inventory on clientsFrom the drop-down list, select True.Schedule software inventory and file collection schedule .... Configure the client settings that you require: Path , file name xxx.exe... http://technet.microsoft.com/en-us/library/cc180952.aspx#EBAA

QUESTION 94Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in theseries. Your network contains a System Center 2012 Configuration Manager environment. Your company deploys a third-party Application to 10,000 clientcomputers. You need to ensure that you can run a report that lists all of the client computers that ran the Application last month. What should you do?

A. Modify the Enable hardware inventory on clients setting.B. Enable a default WMI class in the Hardware Inventory Classes list.C. Modify the Enable software inventory on clients setting.D. Add a file name to the Hardware Inventory configuration.E. Add a WMI class to the Hardware Inventory Classes list.F. Add a file name to the Software Inventory configuration.G. Add a file name to Software Metering.H. Add a WMI class to the Sms_def.mof file.I. Select Collect NOIDMIF files in Hardware Inventory.

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Explanation:

Page 123: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

http://technet.microsoft.com/en-us/library/gg682005.aspxIntroduction to Software Metering in Configuration ManagerUse software metering in System Center 2012 Configuration Manager to monitor and collect software usage data from Configuration Manager clients.To collect this usage data, configure software metering rules or use the Configuration Manager inventory to generate these rules automatically. Client computersevaluate these rules and collect metering data to send to the site.

QUESTION 95Your network contains a System Center 2012 Configuration Manager environment. You need to create a report that lists all of the client computers that do not havean Application named App1 instated. Which query should you use to create the report?

A. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 NOT IN ('App1')

B. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID IN(SELECT SYS.ResourceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID - ARP.ResourceID. WHERE ARP.DisplayName0 = 'App1')

C. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID NOT IN(SELECT SYS.ResourceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1')

D. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_System AS SYS INNER JOINV_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID - ARP.ResourceID WHERE ARP.DisplayName0 NOT LIKE 'App1'

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:SELECT computer name FROM table v_R_System (SQL Syntax)WHERE resource ResourceID is NOT IN

Page 124: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Add Remove Programs WHERE DisplayName0 = 'App1'http://www.w3schools.com/sql/sql_join_inner.aspSQL INNER JOIN KeywordThe INNER JOIN keyword returns rows when there is at least one match in both tables.

QUESTION 96Network contains a System Center 2012 Configuration Manager environment.You have the following query:

SelectName,UserNamefromSMS_R_System Rjoin SMS_R_User Uon R.LastLogonUserName = U.UserName

You need to ensure that all of the client computers are listed in the query results.Which join type should you use?

A. LEFTB. FULLC. INNERD. RIGHT

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:http://www.w3schools.com/sql/sql_join_left.aspSQL LEFT JOIN KeywordThe LEFT JOIN keyword returns all rows from the left table (table_name1), even if there are no matches in the right table (table_name2).Further information:http://www.w3schools.com/sql/sql_join_full.aspSQL FULL JOIN KeywordThe FULL JOIN keyword return rows when there is a match in one of the tables.http://www.w3schools.com/sql/sql_join_inner.aspSQL INNER JOIN KeywordThe INNER JOIN keyword returns rows when there is at least one match in both tables.

Page 125: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

http://www.w3schools.com/sql/sql_join_right.aspSQL RIGHT JOIN KeywordThe RIGHT JOIN keyword returns all the rows from the right table (table_name2), even if there are no matches in the left table (table_name1).

QUESTION 97Your network contains a System Center 2012 Configuration Manager environment.The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.You discover that none of the packages created on Site1 are displayed in Site2.You need to identify whether there is a replication issue between the sites. What should you review?

A. the Inventoryagent.log file B. the Colleval.log file C. the Microsoft SQL Server replication diagnostic files D. the Despool.log file

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:Despool.logSite server log fileRecords incoming site-to-site communication transfers.Personal note:Usually, you look at the Rcmctrl.log file. But since that isn't one of the possible answers, you are left with the Despool.log file.Further information:http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration ManagerInventoryAgent.logClient log fileRecords activities of hardware inventory, software inventory, and heartbeat discovery actions on the client.Colleval.logPrimary site and central administration site log fileRecords details about when collections are created, changed, and deleted by the Collection Evaluator.http://msdn.microsoft.com/en-us/library/ms151756%28v=sql.105%29.aspxSQL Server 2008 R2 - Troubleshooting (Replication)

QUESTION 98Your company uses System Center 2012 Configuration Manager to deploy applications.

Page 126: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

The company purchases a new application named App1. App1 can be installed only on client computers that run Windows 7.You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of memory and 300 Gb of free disk space.What should you create?

A. a Query objectB. custom client user settingsC. a configuration baselineD. a query-based collection

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:Personal note: Previous experience with this question is that the answer should be "a requirement rules".However, since this question does not provide that possibility, the next best thing is "a query-based collection".http://technet.microsoft.com/en-us/library/gg682177.aspxIntroduction to Collections in Configuration ManagerCollections in System Center 2012 Configuration Manager represent logical groupings of resources, such as users and devices. You can use collections to help youperform many tasks, such as managing applications, deploying compliance settings, or installing software updates. You can also use collections to manage groupsof client settings. ..Query RuleQuery rules dynamically update the membership of a collection based on a query that Configuration Manager runs on a schedule. For example, you can create acollection of users who are a member of the Human Resources organizational unit in Active Directory Domain Services. Unlike direct rule collections, this collectionmembership automatically updates when you add or remove new users to the Human Resources organizational unit. Further information:http://technet.microsoft.com/en-us/library/gg682073.aspxPrerequisites for Compliance Settings in Configuration Manager.. To run queries related to compliance settings: Read permission for the Query object.http://technet.microsoft.com/en-us/library/gg712688.aspxPlanning for Client Settings in Configuration ManagerUse client settings in System Center 2012 Configuration Manager to configure user and device settings for the hierarchy. Client settings include configurationoptions such as the hardware inventory and schedule, and the polling schedule for client policy.All Configuration Manager clients in the hierarchy use the Default Client Settings that are automatically created when you install Configuration Manager. However,you can modify the default client settings and you can create custom client settings to override the default client settings for specific users or devices.http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager

Page 127: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

..Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe thelevel of compliance you must have.

QUESTION 99Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration site named Site1 and a primarysite named Site2.You discover that none of the packages created on Site1 are displayed in Site2.You need to identify whether there is a replication issue between the sites.What should you review?

A. The Colleval.log fileB. The Replmgr.log fileC. The Dataldr.log fileD. The Rcmctrl.log file

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation: We have two kind of logging in ConfigMgr 2012. For DRS initialization we can use the rcmctrl.log and inside the database vlogs view.rcmctrl.log content example:Processing replication group Hardware_Inventory_8.SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-2012 02:02:24 1820 (0x071C)Current status is Active. SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-201202:02:24 1820 (0x071C)Requesting initialization for replication group Hardware_Inventory_8.SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-2012 02:02:24 1820 (0x071C)Checking if initialization request is needed for replication group Hardware_Inventory_8 from site PR1. SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-2012 02:02:27 1820(0x071C)

QUESTION 100Your network contains a System Center 2012 Configuration Manager environment.You are creating a configuration item that contains application settings for Microsoft Office2010.You need to detect whether Office 2010 is installed before validating the configuration item.What should you do?

Page 128: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

A. Set Software Inventory to TrueB. Enable Use Windows Installer detection.C. Create an automatic deployment rule.D. Create a direct membership collection

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:* Here are the basic steps for adding a Windows Installer detection method:1. From the Deployment Type Properties dialog, select the Detection Method tab, and clickAdd Clause.2. Choose the appropriate setting type. In this case, select Windows Installer, and click the Browse button.3. Navigate to the desired .msi file and select Open. The product code appears, as By default, the rule looks for only the product code.4. Click OK to save the detection rule.* Example:

Page 129: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

QUESTION 101Your network contains a System Center 2012 Configuration Manager environment. Thehierarchy contains a Central Administration site named Site1 and a primary site namedSite2.

Page 130: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

You discover that none of the packages created on Site1 are displayed in Site2.You need to identify whether there is a replication issue between the sites.What should you review?

A. The Microsoft SQL Server transaction log filesB. The Colleval.log fileC. The Replmgr.log fileD. The Dataldr.log file

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation: Replmgr.logRecords the replication of files between the site server components and the Schedulercomponent.Update:It seems that more recent exams contain the answer "the Rcmctrl.log file" So if you are lucky and have it, choose this one.

QUESTION 102Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients. All of the client computers haveWindows Firewall enabled. Windows Firewall is configured to allow File and Printer Sharing. Users are not configured as local Administrators on their clientcomputers. You deploy System Center 2012 Configuration Manager. You need to identify which methods you can use to deploy the Configuration Manager client toan of the client computers. Which client installation methods should you identify? (Choose all that Apply.)

A. a logon script installationB. a manual client installationC. a software update-based client installationD. a Client Push InstallationE. an Active Directory Group Policy-based installation

Correct Answer: CDESection: (none)Explanation

Explanation/Reference:

Page 131: Microsoft.braindumps2go.70-243.v2015-08-03.by.JohnTheMan · Exam A QUESTION 1 Note: This question is part of a series of questions that use the same set of answer choices. An answer

Explanation:The Logon script runs with the user's credentials.Manual installation also runs with the user's credentials.Software update point uses the Local System account and All client computers are configured as WSUS clients. So the firewall should not affect functionality.Client Push Installation requires File and Printer Sharing.Group Policy Installation requires File and Printer Sharing.http://technet.microsoft.com/en-us/library/gg682191.aspx

QUESTION 103You install a secondary site at a branch office.You discover that communication is not occurring between the secondary site and its parent site. You need to ensure two-way communication between the secondary site and its parent site.What should you do?

A. On the parent site, create a standard sender address to the secondary site.B. On the parent site, create an asynchronous RAS sender to the secondary site.C. On the secondary site, create an asynchronous RAS sender to the parent site.D. On the secondary site, publish the Configuration Manager site information to Active Directory.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/