Administering and Deploying System Center 2012 Configuration Manager v21.0

Page:    1 / 11   
Total 157 questions Expand All

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1
(SP1) environment.
You deploy a Microsoft Office 2010 package to all client computers by using Configuration
Manager.
Your company purchases Office 2013.
You need to ensure that all users can install Office 2013 from the Application Catalog.
What should you do?

  • A. Deploy a new package for Office 2013.
  • B. Deploy Office 2013 by using a Group Policy Object (GPO).
  • C. Update the Office 2010 source file and redeploy the package.
  • D. Deploy a new application for Office 2013.


Answer : D

Question discussion

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1
(SP1) environment. The environment contains a single primary site.
You need to provide users with the ability to remotely reset their mobile device to the
factory settings.
Which two features should you install? Each correct answer presents part of the solution.

  • A. device management point
  • B. System Health Validator point
  • C. out of band service point
  • D. Application Catalog web service point
  • E. Application Catalog website point


Answer : A,E

Question discussion

HOTSPOT
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1)
deployment.
You enable the Backup Site Server maintenance task and you configure the task to back
up to a local drive.
You need to copy the backup to a network share automatically as soon as the backup
completes.
What should you do? To answer, select the appropriate options in the answer area.





Answer :

Explanation:

The AfterBackup.bat file is used to perform post-backup actions automatically after theBackup Site Server maintenance task runs successfully. To create the AfterBackup.bat batch file

Question discussion

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1
(SP1) environment.
Software Inventory and Hardware Inventory are enabled for all of the client computers.
All of the client computers have an Application named App1 installed.
App1 saves files to the C:\Program Files\App1 folder. All of the files saved by App1 have a
file name extension of .xyz.
You configure Software Inventory to inventory all of the files that have the .xyz extension
and the .exe extension.
After six months, you discover that some of the client computers fail to inventory .xyz files.
All of the client computers inventory .exe files.
You need to ensure that the .xyz files are inventoried.
What should you do?

  • A. Modify C:\NO_SMS_On_Drive.sms.
  • B. Delete C:\NO_SMS_On_Drive.sms.
  • C. Modify C:\Program Files\App1\Skpswi.dat.
  • D. Delete C:\ProgramFiles\App1\Skpswi.dat.


Answer : D

Explanation: How to Exclude Folders from Software Inventory in Configuration Manager You can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude it from System Center 2012Configuration Manager software inventory. You can also place this file in the root of any folder structure you want to exclude from software inventory. This procedure can be used to disable software inventory on a single workstation or server client, suchas a large file server. Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive on the client computer.

Question discussion

You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1)
deployment that contains 8,000 client computers.
When a custom application named App1.exe is installed on a computer, a registry value of
App1=TRUE is added to the registry. App1 is installed on approximately half of the
computers.
You need to recommend a solution for creating a collection named Collection1 that
contains only computers on which App1.exe is installed. The solution must minimize
administrative effort.
What should you include in the recommendation?

  • A. a collection that has a direct membership rule
  • B. a configuration item
  • C. the custom client device settings
  • D. a software category


Answer : A

Explanation: Membership rule of the direct rule type let you choose the users or computers that you want to add as members to a collection. This rule gives you direct control over which resources are members of the collection. This membership does not change unless a resource is removed from Configuration Manager. Configuration Manager must have discovered the resources or you must have imported the resources before you can add them to a direct rule collection. Direct rule collections have a higher administrative overhead than query rule collections because you must make changes to this collection type manually.

Question discussion

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1
(SP1) environment as shown in the exhibit (Click the Exhibit button.)


The network contains six servers. The servers are configured as shown in the following
table.

You need to ensure that Configuration Manager continues to receive client data if Server3
fails.
What should you do?

  • A. Configure the Exchange connector on Server3.
  • B. Configure IIS to support only HTTP on Server3.
  • C. Configure IIS to support only HTTPS on Server5.
  • D. Install a management point on Server2.
  • E. Install a management point on Server5.
  • F. Install a software update point on Server3.
  • G. Install an enrollment proxy point on Server6.
  • H. Install the Failover Clustering feature on Server3.
  • I. Install the Failover Clustering feature on Server6.
  • J. Install a protected distribution point on Server1. K. Install Network Load Balancing (NLB) on Server3. L. Install Network Load Balancing (NLB) on Server6. M. Install Windows Server Update Services (WSUS) on Server3. N. Install a PXE-enabled protected distribution point on Server4. O. Install a PXE-enabled protected distribution point on Server5.


Answer : H

Explanation: Use a SQL Server cluster to host the site database for high availability. When you use a SQL Server cluster for the database at a central administration site or primary site, you use the fail-over supportbuilt into SQL Server. Secondary sites cannot use a SQL Server cluster, and do not support backup or restoration of their site database. You recover a secondary site by reinstalling the secondary site from its parent primary site.

Question discussion

Your network contains a System Center 2012 Configuration Manager environment.
In Default Client Agent Settings, you enable Hardware Inventory and Software Inventory.
You discover that a group of client computers fails to report software inventory data.
The client computers report hardware inventory data.
You confirm that Configuration Manager can deploy Applications to the group of client
computers.
You need to identify what is causing the reporting issue.
Which log files should you review? (Choose all that Apply.)

  • A. Filesystemfile.log
  • B. Dataldr.log
  • C. Mp_sinv.log
  • D. Inventoryagent.log
  • E. Hman.log


Answer : A,B,D

Explanation: A: FileSystemFile.log is a client log file that records the activity of the Windows Management Instrumentation (WMI) provider for software inventory and file collection. B: Dataldr.log is a site server log file that records information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database. D: Inventoryagent.log is a client log file that records activities of hardware inventory, software inventory, and heartbeat discovery actions on the client.

Question discussion

You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-
alone primary site.
You have a Configuration Manager application named App1 and a Configuration Manager
package named Package1.
You need to ensure that App1 and Package1 are deployed only to Windows 8 computers.
In the table below, identify what to configure for App1 and Package1.
NOTE: Make only one selection in each column.




Answer :

Explanation:

* Package1: Creating A Program For The Package: Etc.

Question discussion

Your network contains a Windows Server Update Services (WSUS) server. All client
computers are configured as WSUS clients.
All of the client computers have Windows Firewall enabled. Windows Firewall is configured
to block File and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center 2012 Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager
client to all of the client computers.
Which client installation methods should you identify? (Choose all that Apply.)

  • A. a logon script installation
  • B. a manual client installation
  • C. a software update-based client installation
  • D. a Client PushInstallation
  • E. an Active Directory Group Policy-based installation


Answer : C,D,E

Explanation: C. Software update point uses the local SYSTEM account and All client computers are configured as WSUS clients. So the firewall should not affect functionality. D: Client Push Installation requires File and Printer Sharing and runs with the local SYSTEM account. E: Group Policy Installation requires File and Printer Sharing and runs with the local SYSTEM account.

Question discussion

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1
(SP1) environment.
You deploy a Microsoft Office 2010 package to all client computers by using Configuration
Manager.
Your company purchases Office 2013.
You need to ensure that all users can install Office 2013 from the Application Catalog.
What should you do?

  • A. Deploy a new application for Office 2013.
  • B. Deploy a new package for Office 2013.
  • C. Deploy Office 2013 by using a Group Policy Object (GPO).
  • D. Update the Office 2010 source fileand redeploy the package.


Answer : A

Question discussion

Your network contains two Active Directory forests named contoso.com and litwareinc.com.
You implement System Center 2012 Configuration Manager in the contoso.com forest.
You deploy the Configuration Manager client to all of the client computers in contoso.com
by using a logon script.
You need to ensure that the Configuration Manager client is automatically deployed to all of
the client computers in the litwareinc.com forest.
What should you do? (Choose all that Apply.)

  • A. Configure a Client Push Installation account.
  • B. Enable Client Push installation.
  • C. Enable Active Directory System Discovery.
  • D. Configure an administrative user.
  • E. Enable Active Directory Forest Discovery.


Answer : A,B,E

Explanation: In this scenario there are two forests. Active Directory Forest Discovery can discover Active Directory sites and subnets, and then create Configuration Manager boundaries for each site and subnet from the forests that you have configured for discovery. When Active Directory Forest Discovery identifies a supernet that isassigned to an Active Directory site, Configuration Manager converts the supernet into an IP addressrange boundary. Use client push installation to install the System Center 2012 Configuration Manager client software on computers that Configuration Manager discovered. You can configure client push installation for a site, and client installation will automatically run on the computers that are discovered within the site's configured boundaries when those boundaries are configured as a boundary group. To configure the site to automatically use client push for discovered computers

Question discussion

You plan to deploy a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1)
stand-alone primary site. The site will use a Microsoft SQL Server 2014 database server.
You need to recommend a high-availability solution to ensure that the site is available if
SQL Server or management point fails.
What should you recommend? To answer, select the appropriate options in the answer
area.




Answer :

Explanation:

Box 1: As part of the SQL Server Always On offering, Always On Failover Cluster Instances leverages Windows Server Failover Clustering (WSFC) functionality to provide local high availability through redundancy at the server-instance levela failover cluster instance (FCI). When there is hardware or software failure of a server,the applications or clients connecting to the server will experience downtime. When a SQL Server instance is configured to be an FCI(instead of a standalone instance), the high availability of that SQL Server instance is protected by the presence of redundant nodes in the FCI. Box 2: When you install multiple instances of critical site system roles such as the management point and distribution point, you provide redundant points of contact for clients in the event that a specific site system server is off-line. References: https://msdn.microsoft.com/en-us/library/ms189134.aspx https://technet.microsoft.com/en-us/library/hh846246.aspx

Question discussion

HOTSPOT
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1)
deployment.
You use Configuration Manager to deploy Windows 8.1 to client computers.
You need to encrypt the contents of the operating system volume during the operating
system deployment and to store recovery keys in Active Directory. The solution must
minimize the amount of time required to deploy the operating system.
Which task sequence steps should you use to perform each task? To answer, select the
appropriate options in the answer area.




Answer :

Explanation:

* Pre-provision BitLocker This step enables BitLocker on adrive while in Windows PE. Only the used drive space is encrypted. Because you partitioned and formatted the hard drive in the previous step, there is no data, andencryption completes very quickly. * Enable BitLocker This step enables BitLocker encryption on the hard drive and sets key protectors. Because the hard drive was pre-provisioned with BitLocker, this step completes very quickly. Windows 7/8/10 requires that you add a key protector. Note: The Pre-provision BitLocker task sequence step in Microsoft System Center 2012 Configuration Manager allows you to enable BitLocker from the Windows Preinstallation Environment (Windows PE) prior to operating system deployment. Only the used drive space is encrypted, and therefore, encryption times are much faster. References: https://technet.microsoft.com/en-us/library/dn456883.aspx

Question discussion

You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1).
You plan to create a device collection named Collection1.
You need to build the membership rule for Collection1. Members of Collection1 must have
names that start with the word Computer, followed by exactly one character.
How should you complete the WQL statement? To answer, select the appropriate options
in the answer area.




Answer :

Explanation:

Box 1: SMS_R_System.Name The SMS_R_System Windows Management Instrumentation (WMI) class is an SMS Provider server class, in Configuration Manager, that is generated dynamically at SMS Provider run time and contains discovery data for all discovered system resources. Box 2: For relational operators that perform LIKE comparisons ("is like" or "is not like"), you can use wildcard characters within the string. Box 3: Computer_ _ (underscore character) Any one character.

Question discussion

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1
(SP1) environment.
You discover that the last logon user details are not being updated for all of the client
computers.
You need to ensure that the last logon user details are updated.
Which Configuration Manager discovery method should you use?

  • A. Active Directory User Discovery
  • B. Network Discovery
  • C. Heartbeat Discovery
  • D. Active Directory System Discovery


Answer : C

Question discussion

Page:    1 / 11   
Total 157 questions Expand All

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us