No doubt that 70-243 exam is a worth challenging task but you should not feel hesitant against the confronting difficulties. GreatExam is supplying the new version of 70-243 VCE dumps now. Get a complete hold on 70-243 exam syllabus through GreatExam and boost up your skills. What’s more, the 70-243 dumps are the latest. It would be great helpful to your 70-243 exam.
QUESTION 71
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Manager environment.
Your company deploys 1,000 client computers.
You discover that information about printers fails to appear in any inventory queries or reports. Information about other hardware devices appears in the inventory queries and reports.
You need to ensure that Configuration Manager data includes information about printers.
What should you do?
A. Enable a default WMI class in the Hardware Inventory Classes list.
B. Add a file name to Software Metering.
C. Add a file name to the Hardware Inventory configuration.
D. Add a WMI class to the Sms_def.mof file.
E. Select Collect NOIDMIF files in Hardware Inventory.
F. Modify the Enable software inventory on clients setting.
G. Add a file name to the Software Inventory configuration.
H. Modify the Enable hardware inventory on clients setting.
I. Add a WMI class to the Hardware Inventory Classes list.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/gg712290.aspx
How to Extend Hardware Inventory in Configuration Manager
System Center 2012 Configuration Manager hardware inventory reads information about devices by using Windows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-based Enterprise Management (WBEM), which is an industry standard for accessing management information in an enterprise environment.
In previous versions of Configuration Manager, you could extend hardware inventory by modifying the file sms_def.mof on the site server.
In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did in Configuration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes to collect by hardware inventory by using client settings. Configuration Manager provides the following methods to extend hardware inventory:
Enable or disable existing inventory classes – You can enable or disable the default inventory classes used by Configuration Manager or you can create custom client settings that allow you to collect different hardware inventory classes from specified collections of clients.
Add a new inventory class – You can add a new inventory class from the WMI namespace of another device.
Import and export hardware inventory classes – You can import and export Managed Object Format (MOF) files that contain inventory classes from the Configuration Manager console.
Create NOIDMIF Files – Use NOIDMIF files to collect information about client devices that cannot be inventoried by Configuration Manager.
Create IDMIF Files – Use IDMIF files to collect information about assets in your organization that are not associated with a Configuration Manager client, for example, projectors, photocopiers and network printers.
QUESTION 72
Your network contains a System Center 2012 Configuration Manager environment.
The environment contains a single primary site.
The primary site has a distribution point and a management point.
You need to recommend a communication solution that meets the following requirements:
– Communication between the client computers in the research department and the management point must use HTTPS.
– Communication between all of the other client computers and the management point must be able to use HTTP.
– Minimize the number of site systems.
What should you do?
A. Configure the existing management point to use HTTPS.
Configure the research department computers always to use HTTPS.
B. Install a new management point and configure the management point always to use HTTPS.
Configure the research department computers always to use HTTPS.
C. Create a new primary child site and configure the site to use native mode.
Assign all of the research department computers to the new site.
D. Install a new management point and configure Windows Firewall to block inbound TCP port 80.
Configure the research department computers always to use HTTPS.
Answer: B
Explanation:
You can have one management point that accepts HTTPS client communication and another management point that accepts HTTP client communication.
Note:
To communicate with a site system role, the client must first locate a site system support the protocol (HTTPS or HTTP) that the client can use. By default, clients use the most secure method available to them. Using HTTPS before it communicates with a site system role that uses HTTP.
When you deploy a site system role includemanagement points, anApplication Catalog website point, astate migration point, or distribution points, you must specify whether clients connect to the site system by using HTTP or HTTPS. If you use HTTP, you must also consider signing and encryption choices.
In a single site, you can have one management point that accepts HTTPS client communication and another management point that accepts HTTP client communication.
You can use one site to manage clients across different network locations that use different communication protocols and security settings.
uk.co.certification.simulator.questionpool.PList@395c82f9
Other client computers can be configured for Internet and intranet client management.
They can automatically switch between Internet-based client management and intranet client management when they detect a change of network. If these clients can find and connect to a management point that is configured for client connections on the intranet, they attempt to connect to an Internet-based management point.
Planning for Intrasite Communications in Configuration Manager
URL:http://technet.microsoft.com/en-us/library/gg712701#Planning_Intra_site_Com
QUESTION 73
You deploy Windows 7 by using Operating System Deployment (OSD).
The deployment task sequence contains steps to install software updates and applications.
The amount of time required to deploy the Windows 7 image has increased significantly during the last six months.
You need to recommend a solution to reduce the amount of time it takes to deploy the image. What should you recommend? (Choose all that apply.)
A. Create a new automatic deployment rule.
B. Synchronize software updates before deploying the image.
C. Upgrade the image from Windows 7 to Windows 7 Service Pack 1 (SP1).
D. Add an additional Install Software Updates step to the deployment task sequence.
E. Use offline servicing for the image.
Answer: CE
Explanation:
E:
* Offline Servicing: This new capability lets you schedule ConfigMgr to apply updates to an OS image imported into ConfigMgr without actually deploying the image. This potentially removes the need to deploy updates during an image capture or deployment, greatly reducing the time and effort spent on them and ensuring that operating systems deployed by ConfigMgr are fully updated before brought online.
* Whether you use a Build and Capture task sequence to automatically build your images or manually build your images, a great new feature of ConfigMgr 2012 is the ability to install updates directly into an image contained in a WIM file. This functionality isn’t actually new as it has existed in the stand-alone DISM tool from the beginning, but incorporating it directly into the ConfigMgr console makes it more accessible, enables it to leverage the software updates functionality of ConfigMgr itself, and makes it schedulable.
QUESTION 74
Your network contains a System Center 2012 Configuration Manage environment.
The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server 2008 R2. Server2 contains the Configuration Manager database. Server2 fails.
You install SQL Server 2008 R2 on a new server.
You name the server Server3.
You need to restore the Configuration Manager database to Server3.
What should you do?
A. Register the Service Principal Name (SPN) for the SQL Server service account of Server3.
From Server1, run the Configuration Manager 2012 Setup Wizard.
B. From Server3, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database and log files.
C. From Server3, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.
D. Register the Service Principal Name (SPN) for the SQL Server service account of Server3.
From Server1, run the Site Repair Wizard.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/gg712697.aspx
Backup and Recovery in Configuration Manager
Recover a Configuration Manager Site
A Configuration Manager site recovery is required whenever a Configuration Manager site fails or data loss occurs in the site database. Repairing and resynchronizing data are the core tasks of a site recovery and are required to prevent interruption of operations. Site recovery is started by running the Configuration Manager Setup Wizard from installation media or by configuring the unattended installation script and then using the Setup command /script option. Your recovery options vary depending on whether you have a backup of the Configuration Manager site database.
Site Database Recovery Options
When you run Setup, you have the following recovery options for the site database:
* Recover the site database using a backup set: Use this option when you have a backup of the Configuration Manager site database that was created as part of the Backup Site Server maintenance task run on the site before the site database failure. When you have a hierarchy, the changes that were made to the site database after the last site database backup are retrieved from the central administration site for a primary site, or from a reference primary site for a central administration site. When you recover the site database for a stand-alone primary site, you lose site changes after the last backup.
When you recover the site database for a site in a hierarchy, the recovery behavior is different for a central administration site and primary site, and when the last backup is inside or outside of the SQL Server change tracking retention period.
Further information:
SCCM 2007 needed you to run Site Repair Wizard.
QUESTION 75
Your network contains a single Active Directory forest.
You plan to deploy System Center 2012 Configuration Manager.
The hierarchy will have a Central Administration site and two primary sites.
You need to ensure that you can target user groups for application deployment.
The solution must minimize network traffic.
Which Configuration Manager discovery methods should you use?
A. Active Directory User Discovery on every site
B. Active Directory User Discovery and Active Directory Group Discovery on the primary sites
C. Active Directory User Discovery and Active Directory Group Discovery on the Central Administration site
D. Active Directory User Discovery on the primary sites and Active Directory Group Discovery on the Central Administration site
Answer: B
Explanation:
You can configure discovery operations throughout the hierarchy from the central administration site by assigning discovery methods to run at individual sites
http://technet.microsoft.com/en-us/library/64aa34e1-c465-4eb8-820b-5c1702ab55ae#Plan_Where_to_Install_Sites
Note:
* Active Directory User Discovery
Discovers user accounts from the specified locations in Active Directory Domain Services.
* Active Directory Group Discovery
Discovers local, global, and universal security groups, the membership within these groups, and the membership within distribution groups from the specified locations in Active directory Domain Services. Distribution groups are not discovered as group resources.
QUESTION 76
Your network contains a System Center 2012 Configuration Manager environment.
You have a sales department that contains 500 employees, 20 of whom are sales managers. ach sales department employee has a desktop computer that is configured as their primary device. The sales managers frequently log on to computers in the marketing department.
You plan to deploy a new sales application named App1.
You need to ensure that App1 is only available to the sales department employees when they log on to their primary device.
What should you do?
A. In a requirement rule, set Organization Unit = Sales.
B. In a requirement rule, set Primary Device = True.
C. In Client Settings, set Allow user to define their primary devices to False.
D. In Client Settings, set Allow user to define their primary devices to True.
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/gg699365.aspx
How to Manage User Device Affinity in Configuration Manager
User device affinity in Microsoft System Center 2012 Configuration Manager is a method of associating a user with one or more specified devices. User device affinity can eliminate the need to know the names of a user’s devices in order to deploy an application to that user. Instead of deploying the application to all of the user’s devices, you deploy the application to the user. Then, user device affinity automatically ensures that the application install on all devices that are associated with that user.
You can define primary devices. These are typically the devices that users use on a daily basis to perform their work. When you create an affinity between a user and a device, you gain more software deployment options. For example, if a user requires Microsoft Office Visio, you can install it on the user’s primary device by using a Windows Installer deployment. However, on a device that is not a primary device, you might deploy Microsoft Office Visio as a virtual application. You can also use user device affinity to predeploy software on a user’s device when the user is not logged in. Then, when the user logs on, the application is already installed and ready to run.
http://technet.microsoft.com/en-us/library/gg682174.aspx
How to Create Deployment Types in Configuration Manager
Steps to Create a Deployment Type
Step 1: Start the Create Deployment Type Wizard.
Step 2: Specify whether you want to automatically detect or to manually define the deployment type information.
Step 3: Specify the content options for the deployment type.
Step 4: Configure the detection methods to indicate the presence of the application.
Step 5: Specify the user experience options for the deployment type.
Step 6: Specify the requirements for the deployment type.
Requirements are used to specify the conditions that must be met before a deployment type can be installed on a client device.
Step 7: Specify the dependencies for the deployment type.
Step 8: Confirm the deployment type settings and complete the wizard.
Step 9: Configure additional options for the deployment types that contain virtual applications.
http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step61
Step 6: Specify Requirements for the Deployment Type
1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the Create Requirement dialog box, and add a new requirement.
2. From the Category drop-down list, select whether this requirement is for a device or a user, or select Custom to use a previously created global condition. When you select Custom, you can also click Create to create a new global condition.
Important: If you create a requirement of the category User and the condition Primary Device, and then deploy the application to a device collection, the requirement will evaluate as false.
3. From the Condition drop-down list, select the condition that you want to use to assess whether the user or device meets the installation requirements. The contents of this list will vary depending on the selected category.
4. From the Operator drop-down list, choose the operator that will be used to compare the selected condition to the specified value to assess whether the user or device meets in the installation requirement. The available operators will vary depending on the selected condition.
5. In the Value field, specify the values that will be used with the selected condition and operator whether the user or device meets in the installation requirement. The available values will vary depending on the selected condition and the selected operator.
6. Click OK to save the requirement rule and exit the Create Requirement dialog box.
7. On the Requirements page of the Create Deployment Type Wizard, click Next.
QUESTION 77
Your network contains a System Center 2012 Configuration Manager environment.
The hierarchy contains a Central Administration at Site1 and a primary site named Site.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. the Inventoryagent.log file
B. the Colleval.log file
C. the Microsoft SQL Server replication diagnostic files
D. the Despool.log file
Answer: D
Explanation:
Despool.log
Site server log file
Records incoming site-to-site communication transfers.
Personal note:
Usually, you look at the Rcmctrl.log file. But since that isn’t one of the possible answers, you are left with the Despool.log file.
Further information:
http://technet.microsoft.com/en-us/library/hh427342.aspx
Technical Reference for Log Files in Configuration Manager
InventoryAgent.log
Client log file
Records activities of hardware inventory, software inventory, and heartbeat discovery actions on the client.
Colleval.log
Primary site and central administration site log file
Records details about when collections are created, changed, and deleted by the Collection Evaluator.
http://msdn.microsoft.com/en-us/library/ms151756%28v=sql.105%29.aspx
SQL Server 2008 R2 – Troubleshooting (Replication)
QUESTION 78
Your company uses System Center 2012 Configuration Manager to deploy applications.
The company purchases a new application named Appl. App1 can be installed only on client computers that run Windows 7.
You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 GB of memory and 300 GB of free disk space.
What should you create?
A. a Query object
B. custom client device settings
C. a configuration baseline
D. a query-based collection
Answer: D
Explanation:
Personal note:
Previous experience with this question is that the answer should be “a requirement rules”.
However, since this question does not provide that possibility, the next best thing is “a query-based collection”.
http://technet.microsoft.com/en-us/library/gg682177.aspx
Introduction to Collections in Configuration Manager
Collections in System Center 2012 Configuration Manager represent logical groupings of resources, such as users and devices. You can use collections to help you perform many tasks, such as managing applications, deploying compliance settings, or installing software updates. You can also use collections to manage groups of client settings.
..
Query Rule
Query rules dynamically update the membership of a collection based on a query that Configuration Manager runs on a schedule. For example, you can create a collection of users who are a member of the Human Resources organizational unit in Active Directory Domain Services. Unlike direct rule collections, this collection membership automatically updates when you add or remove new users to the Human Resources organizational unit.
Further information:
http://technet.microsoft.com/en-us/library/gg682073.aspx
Prerequisites for Compliance Settings in Configuration Manager
..
To run queries related to compliance settings: Read permission for the Query object.
http://technet.microsoft.com/en-us/library/gg712688.aspx
Planning for Client Settings in Configuration Manager
Use client settings in System Center 2012 Configuration Manager to configure user and device settings for the hierarchy. Client settings include configuration options such as the hardware inventory and schedule, and the polling schedule for client policy.
All Configuration Manager clients in the hierarchy use the Default Client Settings that are automatically created when you install Configuration Manager. However, you can modify the default client settings and you can create custom client settings to override the default client settings for specific users or devices.
http://technet.microsoft.com/en-us/library/gg682139.aspx
Introduction to Compliance Settings in Configuration Manager
Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe the level of compliance you must have.
QUESTION 79
Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration site named Site1 and a primary site named Site2.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. The Colleval.log file
B. The Replmgr.log file
C. The Dataldr.log file
D. The Rcmctrl.log file
Answer: D
Explanation:
We have two kind of logging in ConfigMgr 2012.
For DRS initialization we can use the rcmctrl.log and inside the database vlogs view.
rcmctrl.log content example:
Processing replication group Hardware_Inventory_8.
SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-2012 02:02:24 1820 (0x071C)
Current status is Active. SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-2012
02:02:24 1820 (0x071C)
Requesting initialization for replication group Hardware_Inventory_8.
SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-2012 02:02:24 1820 (0x071C)
Checking if initialization request is needed for replication group Hardware_Inventory_8 from
site PR1. SMS_REPLICATION_CONFIGURATION_MONITOR 20-10-2012 02:02:27 1820
(0x071C)
QUESTION 80
Your network contains a System Center 2012 Configuration Manager environment.
You are creating a configuration item that contains application settings for Microsoft Office 2010.
You need to detect whether Office 2010 is installed before validating the configuration item.
What should you do?
A. Set Software Inventory to True
B. Enable Use Windows Installer detection.
C. Create an automatic deployment rule.
D. Create a direct membership collection
Answer: B
Explanation:
* Here are the basic steps for adding a Windows Installer detection method:
1. From the Deployment Type Properties dialog, select the Detection Method tab, and click
Add Clause.
2. Choose the appropriate setting type. In this case, select Windows Installer, and click the Browse button.
3. Navigate to the desired .msi file and select Open.
The product code appears, as By default, the rule looks for only the product code.
4. Click OK to save the detection rule.
QUESTION 81
Your network contains a System Center 2012 Configuration Manager environment.
The hierarchy contains a Central Administration site named Site1 and a primary site named Site2.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. The Microsoft SQL Server transaction log files
B. The Colleval.log file
C. The Replmgr.log file
D. The Dataldr.log file
Answer: C
Explanation:
Replmgr.log
Records the replication of files between the site server components and the Scheduler component.
Update:
It seems that more recent exams contain the answer “the Rcmctrl.log file”
So if you are lucky and have it, choose this one.
QUESTION 82
Your network contains a Windows Server Update Services (WSUS) server.
All client computers are configured as WSUS clients. All of the client computers have Windows Firewall enabled. Windows Firewall is configured to allow Fie and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center 2012 Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager client to an of the client computers.
Which client installation methods should you identify? (Choose all that Apply.)
A. a logon script installation
B. a manual client installation
C. a software update-based client installation
D. a Client Push Installation
E. an Active Directory Group Policy-based installation
Answer: CDE
Explanation:
The Logon script runs with the user’s credentials.
Manual installation also runs with the user’s credentials.
Software update point uses the Local System account and All client computers are configured as WSUS clients. So the firewall should not affect functionality.
Client Push Installation requires File and Printer Sharing.
Group Policy Installation requires File and Printer Sharing.
http://technet.microsoft.com/en-us/library/gg682191.aspx
QUESTION 83
Your company uses System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to distribute operating system images. The standard operating system for client computers is Windows 8.1 Enterprise (x86).
You receive 300 new desktop computers. Each computer has a new storage controller.
When you attempt to deploy an existing image to one of the computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase.
You need to ensure that you can deploy Windows 8.1 to the new computers by using an image.
What should you do?
A. Import the storage drivers to the Drivers container and update the task sequence.
B. Create a new x64 boot image and configure the operating system image to use the x64 boot image.
C. Create a new driver package and update the task sequence.
D. Update the existing x86 boot image to include the storage drivers.
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/gg712674.aspx
Planning a Device Driver Strategy in Configuration Manager
You can add Windows device drivers that have been imported into the driver catalog to boot images. Use the following guidelines when you add device drivers to a boot image:
* Add only mass storage and network adapter device drivers to boot images because other types of drivers are not generally required. Drivers that are not required increase the size of the boot image unnecessarily.
* Add only device drivers for Windows 7 to a boot image because the required version of Windows PE is based on Windows 7.
* Ensure that you use the correct device driver for the architecture of the boot image. Do not add an x86 device driver to an x64 boot image.
QUESTION 84
Your network contains a System Center 2012 Configuration Manager environment.
You plan to create a build and capture a task sequence to build a reference image of Windows 7. You need to identify which Application must exist in Configuration Manager before you can create the build and capture the task sequence.
Which Applications should you identify? (Choose all that Apply.)
A. Microsoft Deployment Toolkit (MDT)
B. Configuration Manager client
C. System Preparation tool (Sysprep)
D. User State Migration Tool (USMT)
Answer: AC
Explanation:
http://technet.microsoft.com/en-us/library/bb633062.aspx
How to Create a Task Sequence to Build and Capture an Operating System Image
You can create task sequence to build and capture operating system image for use with operating system deployment using the New Task Sequence Wizard. After you have created the task sequence, you can edit the task sequence by selecting the Task Sequences node and right-clicking on the task sequence you want to change and selecting Edit to launch the Task Sequence Editor.
QUESTION 85
You are the network administrator for a company named Contoso, Ltd. The network contains 1,000 desktop computers and 500 servers. The network contains a System Center 2012 Configuration Manager environment. The names of all the desktop computers in the human resources department start with the letters HR, for example HR001 and HR023. A device collection named All Server Devices contains all of the servers.
A device collection named All Desktop Devices contains all of the desktop computers.
You plan to create a new collection named All HR Computers and Servers. The new collection must contain all of the human resources department computers and all of the servers.
The collection must not contain any other computers.
You need to create a membership rule for the new collection.
Which rule should you include in the membership rule? (Choose all that Apply.)
A. QUERY RULE: select * from SMS_R_System where SMS_R_system.NetbiosName like “HR%”
B. INCLUDE RULE: All Server Devices
C. EXCLUDE RULE: All NON HR Computers
D. EXCLUDE RULE: All Desktop Devices
E. QUERY RULE- select * from SMS_R_System where SMS_R_system.OperatingSystemNameandVersion like. *%Workstation*
F. QUERY RULE- select * from SMS_R_System where SMS_R_system.OperatingSystemNameandVersion not like. *%Server*
Answer: AB
Explanation:
select * from SMS_R_System where SMS_R_system.NetbiosName like “HR%”
SQL command to select all Systems whose names begin with HR
INCLUDE RULE: All Server Devices
Selects all the Server Devices as asked in the question.
Further information:
http://technet.microsoft.com/en-us/library/gg682177.aspx
Introduction to Collections in Configuration Manager
Collections in System Center 2012 Configuration Manager represent logical groupings of resources, such as users and devices.
You can use collections to help you perform many tasks, such as managing applications, deploying compliance settings, or installing software updates. You can also use collections to manage groups of client settings.
Additionally, System Center 2012 Configuration Manager uses collections with role-based administration to specify the collections that an administrative user can access.
Collection Rules
Direct Rule
Query Rule
Query rules dynamically update the membership of a collection based on a query that Configuration Manager runs on a schedule.
Unlike direct rule collections, this collection membership automatically updates when you add or remove new users to the Human Resources organizational unit.
Include Collections Rule
The include collections rule lets you include the members of another collection in a Configuration Manager collection. Configuration Manager updates the membership of the current collection on a schedule if the membership of the included collection changes.
Exclude Collections Rule
The exclude collections rule lets you exclude the members of another collection from a Configuration Manager collection. Configuration Manager updates the membership of the current collection on a schedule if the membership of the excluded collection changes.
Note: If a collection includes both include collection and exclude collection rules and there is a conflict, the exclude rule takes priority over the include rule.
Default Collections in Configuration Manager
All User Groups
All Users
All Users and User Groups
All Mobile Devices
All Systems
All Unknown Computers
QUESTION 86
Drag and Drop Question
Your network contains a System Center 2012 Configuration Manager environment.
Three users named User1, User2, and User3 will perform the following tasks:
– User1 will review software metering data and inventory reports.
– User2 will deploy Applications and create alerts.
– User3 will create configuration items.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer area. Each security role may be used once, more than once, at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Explanation:
Asset Manager
Grants permissions to manage the Asset Intelligence Synchronisation Point, Asset Intelligence reporting classes, software inventory, and metering rules Application Deployment Manager Grants permissions to deploy applications. Administrative users who are associated with this role can view a list of applications, and they can manage deployments for applications, alerts, templates, and packages, and programs. Administrative users who are associated with this role can also view collections and their members, status messages, queries, and conditional delivery rules.
Compliance Settings Manager
Grants permissions to define and monitor Compliance Settings. Administrative users associated with this role can create, modify and delete configuration items and baselines to collections, and initiate compliance evaluation, and initiate remediation for non-compliant computers.
QUESTION 87
Your network contains a System Center 2012 Configuration Manager environment.
The Client Status node .n the Configuration Manager console shows a downward trend in client health.
You verify the logs on several clients.
You discover that the clients are healthy and are communicating normally to management points. You need to identify the reasons why the Configuration Manager console displays a downward trend in client health.
Which reasons should you identify? (Choose all that Apply.)
A. In Client Status Settings Properties, the Heartbeat discovery during the following days interval is shorter than the Heartbeat Discovery interval.
B. The age set in the Delete Aged Discovery Data maintenance task is shorter than the Heartbeat Discovery interval.
C. The Delete Obsolete Client Discovery Data maintenance task is disabled.
D. The Active Directory sites that are members of boundary groups are modified.
E. Microsoft SQL Server replication to the management points stopped.
Answer: BD
Explanation:
http://technet.microsoft.com/en-us/library/gg712308.aspx#BKMK_HeartbeatDisc
Planning for Discovery in Configuration Manager – About Heartbeat Discovery
Heartbeat Discovery differs from other Configuration Manager discovery methods. It is enabled by default and runs on each computer client to create a discovery data record (DDR).
Heartbeat Discovery runs either on a schedule configured for all clients in the hierarchy, or if manually invoked, on a specific client by running the Discovery Data Collection Cycle on the Action tab in a client’s Configuration Manager program. When Heartbeat Discovery runs, it creates a discovery data record (DDR) that contains the client’s current information including network location, NetBIOS name, and operational status details. It is a small file, about 1KB, which is copied to a management point, and then processed by a primary site. The submission of a Heartbeat Discovery DDR can maintain an active client’s record in the database, and also force discovery of an active client that might have been removed from the database, or that has been manually installed and not discovered by another discovery method.
The default schedule for Heartbeat Discovery is set to every 7 days. If you change the heartbeat discovery interval, ensure that it runs more frequently than the site maintenance task Delete Aged Discovery Data, which deletes inactive client records from the site database. You can configure the Delete Aged Discovery Data task only for primary sites.
http://technet.microsoft.com/en-us/library/gg712679.aspx
Planning for Boundaries and Boundary Groups in Configuration Manager
In System Center 2012 Configuration Manager, a boundary is a network location on the intranet that can contain one or more devices that you want to manage. Boundaries can be an IP subnet, Active Directory site name, IPv6 Prefix, or an IP address range, and the hierarchy can include any combination of these boundary types. To use a boundary, you must add the boundary to one or more boundary groups. Boundary groups are collections of boundaries. By using boundary groups, clients on the intranet can find an assigned site and locate content when they have to install software, such as applications, software updates, and operating system images.
When clients are on the Internet, or they are configured as Internet-only clients, they do not use boundary information. These clients cannot use automatic site assignment and always download content from any distribution point in their assigned site when the distribution point is configured to allow client connections from the Internet.
Site Assignment
You can configure each boundary group with an assigned site for clients. Clients join the assigned site of a boundary group that contains the client’s current network location. When a boundary is added to multiple boundary groups that have different assigned sites, clients will nondeterministically select one of the sites. System Center 2012 Configuration Manager does not support this overlapping boundary configuration for site assignment.
If you make a change to the site assignment configuration of a boundary group, only new site assignment actions are affected. Clients that have previously been assigned to a site, do not re-evaluate their site assignment based on changes to the configuration of a boundary group.
Further information:
http://technet.microsoft.com/en-us/library/bb632879.aspx
Delete Obsolete Client Discovery Data Task Overview
The Delete Obsolete Client Discovery Data task deletes obsolete client records from the Configuration Manager 2007 site database. A record that is marked obsolete typically was superseded by a newer record for the same client. The newer record becomes the client’s current record, and the older record becomes obsolete.
When you enable this task, you should configure the schedule to run at an interval greater than the heartbeat discovery schedule. This allows clients to send Discovery Data Records (DDRs) so that the obsolete bit is set correctly.
http://technet.microsoft.com/en-us/library/gg682132.aspx#BKMK_ClientHealth
Introduction to Client Deployment in Configuration Manager – Monitoring the Status of Client Computers in Configuration Manager
Use the Client Status node in the Monitoring workspace of the Configuration Manager console to monitor the health and activity of client computers in your hierarchy.
Configuration Manager uses the following two methods to evaluate the overall status of client computers.
Client Activity: You can configure thresholds to determine whether a client is active, for example:
Whether the client requested policy during the last seven days.
Whether Heartbeat Discovery found the client during the last seven days.
Whether the client sent hardware inventory during the last seven days.
When all these thresholds are exceeded, the client is determined to be inactive.
Client Check: A client evaluation engine is installed with the Configuration Manager client, which periodically evaluates the health of the Configuration Manager client and its dependencies. This engine can check or remediate some problems with the Configuration Manager client.
Client status uses the monitoring and reporting capabilities of Configuration Manager to provide information in the Configuration Manager console about the health and activity of the client.
You can configure alerts to notify you when clients check results or client activity drops below a specified percentage of clients in a collection or when remediation fails on a specified percentage of clients.
QUESTION 88
You have a System Center 2012 Configuration Manager environment.
You create a deployment package to deploy software updates to a collection of client computers with a deployment schedule of As soon as possible.
The Software Update Home Page indicates one installation failure for the package.
You need to view information about the installation failure.
Which log file should you view?
A. SrcUpdateMgr.log
B. WUSSyncXML.log
C. SmsWusHandler.log
D. WindowsUpdate.log
Answer: D
QUESTION 89
You have a System Center 2012 Configuration Manager environment.
You have an application named App1.
You modify the Package Access account on the App1 software package to prevent read access for all users. Users are still able to access the package.
You need to ensure that users cannot read the package, and minimize bandwidth utilization. What should you do?
A. Copy the package to all distribution points.
B. Refresh the package on all distribution points.
C. Update all distribution points with a new package source version.
D. Delete and re-create the software package.
Answer: B
QUESTION 90
You have a System Center 2012 Configuration Manager environment.
You deploy a site server named Lab1 to use for Pre-boot Execution Environment (PXE) installations on client computers in your training room. Administrators from other departments report that they are being prompted for PXE installations that should be available to only the client computers in your training room.
You need to ensure that only the client computers in your training room receive the PXE installations from Lab1.
What should you do?
A. Modify the Broadcast Address scope option on the DHCP server.
B. Modify the Static Route option on the DHCP server.
C. Modify the Boot Server Host Name scope option on the DHCP server.
D. Publish the PXE server by using a fully qualified domain name (FQDN).
Answer: C
GreatExam is one of the leading exam preparation material providers. We have a complete range of exams offered by the top vendors. You can download 70-243 dumps in PDF format on GreatExam.com. Comparing with others’, our 70-243 exam questions are more authoritative and complete. What’s more, the 70-243 prepare material are the latest. We ensure you pass the 70-243 exam easily.
http://www.greatexam.com/70-243-exam-questions.html