70-243 110(Questions) Administering and Deploying System Center 2012 Configuration Manager

Which class and attribute should you add in the where clause for each collection?

HOTSPOT
You manage a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) site.
You plan to create two collections named Collection1 and Collection2 that have dynamic membership rules. Collection1 will contain all of the servers in the domain. Collection2 will contain only the domain controllers.
You have a Configuration Manager query that you will use as the basis for creating the collection. The query has the following WQL statement.


You need to complete the statement that will be used for each collection.
Which class and attribute should you add in the where clause for each collection? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Which three tasks should you perform?

Your network contains two Active Directory forests named contoso.com and litwareinc.com.
You deploy System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to the contoso.com forest.
You deploy the Configuration Manager client to all of the client computers in contoso.com by using a logon script.
All of the client computers in litwareinc.com run a local firewall to prevent traffic to the administrative shares.
You need to ensure that the Configuration Manager client can be deployed to all of the client computers in litwareinc.com.
Which three tasks should you perform? Each correct answer presents part of the solution.
A. Create a Group Policy-based installation of the Configuration Manager client.
B. Enable Active Directory System Discovery.
C. Copy the Cmsetup.msi file to a network share.
D. Configure a Client Push Installation account.
E. Enable Client Push Installation.
F. Enable Active Directory Forest Discovery.


Answer Clike
What are two possible ways to achieve the goal?

Your network contains a single Active Directory domain named contoso.com. The domain contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment. The relevant servers are configured as shown in the following table.


The Configuration Manager deployment has an Exchange Server connector.
You use Configuration Manager to manage all mobile devices. The mobile devices do not have the Configuration Manager client installed.
The Exchange Server settings control which Windows Phone devices can use Exchange ActiveSync.
A corporate security policy requires that iOS devices have version 8.0 or later to use Exchange ActiveSync.
You need to configure which iPhone devices can access Exchange ActiveSync.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
A. Modify the synchronization settings of the Exchange Server connector.
B. Add access rules to Server1.
C. Modify the security settings of the Exchange Server connector.
D. Modify the external mobile device management setting on Server2.
E. Add access rules to Server2.
F. Modify the external mobile device management setting on Server1.


Answer Clike
Which network location should you use to start the installation?

HOTSPOT
Your network contains a single Active Directory named contoso.com. A System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) primary site named S01 is deployed to contoso.com.
The Configuration Manager deployment includes the servers configured as shown in the following table.


The distribution point is configured to require HTTPS for client communications.
You have a domain computer named Computer1 that runs the 64-bit version of Windows 8.1.
You need to install the Configuration Manager client on Computer1 manually.
Which network location should you use to start the installation? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Which client settings should you configure?

You manage s System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You need to ensure that Configuration Manager clients can use the Application Catalog.
Which client settings should you configure?
A. Software Metering
B. Computer Agent
C. Software Deployment
D. Software Inventory


Answer Clike
Which actions should you initiate from the client computer?

DRAG DROP
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site.
You use Configuration Manager to deploy software updates to client computers.
You plan to monitor the software update deployment process from a client computer.
You need to collect data as quickly as possible to monitor the software update deployment process.
Which actions should you initiate from the client computer? To answer, drag the appropriate actions to the correct locations. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
What to configure for App1 and Package1.

HOTSPOT
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site.
You have a Configuration Manager application named App1 and a Configuration Manager package named Package1.
You need to ensure that App1 and Package1 are deployed only to Windows 8 computers.
In the table below, identify what to configure for App1 and Package1.
NOTE: Make only one selection in each column.
Hot Area:




Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You deploy a Microsoft Office 2010 package to all client computers by using Configuration Manager.
Your company purchases Office 2013.
You need to ensure that all users can install Office 2013 from the Application Catalog.
What should you do?
A. Deploy a new application for Office 2013.
B. Deploy a new package for Office 2013.
C. Deploy Office 2013 by using a Group Policy Object (GPO).
D. Update the Office 2010 source file and redeploy the package.


Answer Clike
Which container's permissions should you modify?

You network has System Center Configuration Manager 2007 R3 deployed. The Active Directory schema is extended for System Center Configuration Manager 2007 R3.
You plan to deploy System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to a new server.
You need to ensure that System Center 2012 R2 Configuration Manager SP1 can publish information to Active Directory.
Which container's permissions should you modify?
A. SystemPolicies
B. SystemIP Security
C. SystemSystem Management
D. SystemWMIPolicy


Answer Clike
Which site configuration should you use?

Your company has 120,000 client computers.
You plan to deploy System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to the computers.
You need to install Configuration Manager by using the fewest number of sites possible.
Which site configuration should you use?
A. two individual stand-alone primary sites
B. a single primary site and four secondary sites
C. a stand-alone primary site
D. a Central Administration site and two primary sites


Answer Clike
What should you do?

HOTSPOT
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You enable the Backup Site Server maintenance task and you configure the task to back up to a local drive.
You need to copy the backup to a network share automatically as soon as the backup completes.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Which three additional Configuration Manager roles should you deploy?

You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site. Configuration Manager has Network Access Protection (NAP) configured. All Configuration Manager servers reside on the internal network.
You use Configuration Manager to deploy applications and software updates to intranet clients.
Corporate security policies prevent the use of reverse proxies.
You need to configure Configuration Manager to manage Internet-based clients.
Which three additional Configuration Manager roles should you deploy? Each correct answer presents part of the solution.
A. secondary site server
B. Management point
C. Software update point
D. Distribution point
E. System Health Validator point
F. Endpoint Protection point


Answer Clike
What should you do?

HOTSPOT
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) primary site named S01 that includes the servers configured as shown in the following table.


You perform regular site backups by using Configuration Manager.
You create a test environment that is isolated completely from the production network. The Active Directory configuration in the test environment and the production environment are identical.
A user named User1 plans to test disaster recovery procedures by using servers in the test environment. The servers are configured as shown in the following table.


User1 is a member of the Administrators group on ServerA and ServerB.
You need to enable User1 to reinstall Configuration Manager manually on ServerA and to use the Recovery Wizard to restore the database on ServerB.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment as shown in the exhibit (Click the Exhibit button.)


The network contains six servers. The servers are configured as shown in the following table.


You need to ensure that Configuration Manager continues to receive client data if Server3 fails.
What should you do?
A. Configure the Exchange connector on Server3.
B. Configure IIS to support only HTTP on Server3.
C. Configure IIS to support only HTTPS on Server5.
D. Install a management point on Server2.
E. Install a management point on Server5.
F. Install a software update point on Server3.
G. Install an enrollment proxy point on Server6.
H. Install the Failover Clustering feature on Server3.
I. Install the Failover Clustering feature on Server6.
J. Install a protected distribution point on Server1.
K. Install Network Load Balancing (NLB) on Server3.
L. Install Network Load Balancing (NLB) on Server6.
M. Install Windows Server Update Services (WSUS) on Server3.
N. Install a PXE-enabled protected distribution point on Server4.
O. Install a PXE-enabled protected distribution point on Server5.


Answer Clike
What should you do?

You manage a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site.
You have a configuration item named Item1 that has two revisions. The current revision is not referenced by any configuration baselines.
You need to reconfigure Item1 to use the previous settings, and then you must modify the detection method of Item1.
What should you do?
A. Restore the previous version. Modify revision 2.
B. Restore the previous version. Modify revision 1.
C. Delete the current version. Modify revision 1.
D. Copy the previous version. Modify revision 2.


Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You are creating a configuration item that contains application settings for Microsoft Office 2013.
You need to detect whether Office 2013 is installed before validating the configuration item.
What should you do?
A. Set Software Inventory to True.
B. Create a report to display all installed software.
C. Set Hardware Inventory to False.
D. Enable Use a custom script to detect this application.


Answer Clike
What should you include in the recommendation?

You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment that contains 8,000 client computers.
When a custom application named App1.exe is installed on a computer, a registry value of App1=TRUE is added to the registry. App1 is installed on approximately half of the computers.
You need to recommend a solution for creating a collection named Collection1 that contains only computers on which App1.exe is installed. The solution must minimize administrative effort.
What should you include in the recommendation?
A. a collection that has a direct membership rule
B. a configuration item
C. the custom client device settings
D. a software category


Answer Clike
Which two reasons should you identify?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
The Client Status node in the Configuration Manager console shows a downward trend in client health.
You verify the logs on several clients.
You discover that the clients are healthy and are communicating normally to management points.
You need to identify the reasons why the Configuration Manager console displays a downward trend in client health.
Which two reasons should you identify? Each correct answer presents a complete solution.
A. The Active Directory sites that are members of boundary groups are modified.
B. The age set in the Delete Aged Discovery Data maintenance task is shorter than the Heartbeat Discovery interval.
C. The Delete Obsolete Client Discovery Data site maintenance task is disabled.
D. In Client Status Settings Properties, the Hardware inventory during the following days interval is shorter than the Hardware inventory interval.
E. Microsoft SQL Server replication to the management points stopped.


Answer Clike
What should you review?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. The hierarchy contains a Central Administration site named Site1 and a primary site named Site2.
You discover that none of the collections created on Site1 are displayed on Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. the Microsoft SQL Server replication diagnostic files
B. the Schedule.log file
C. the Colleval.log file
D. the Despool.log file


Answer Clike
Which firewall ports should you identify?

DRAG DROP
Your company has two offices named Office1 and Office2.
You plan to deploy a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) Central Administrative site to Office1 and a primary site to Office2.
You need to identify which firewall ports you must allow between Office1 and Office2 for inter-site communication.
Which firewall ports should you identify? To answer, drag the appropriate ports to the correct locations. Each port may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which four actions should you perform in sequence?

DRAG DROP
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment that contains the servers configured as shown in the following table.


You need to ensure that Server3, Server4, and Server5 can be used to deploy software updates to Configuration Manager clients. The Configuration Manager clients in the primary site must be able to receive updates if one of the WSUS servers becomes unavailable.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you do?

Your company uses System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to distribute operating system images. The standard operating system for client computers is Windows 8.1 Enterprise (x86).
You receive 300 new desktop computers. Each computer has a new storage controller.
When you attempt to deploy an existing image to one of the computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase.
You need to ensure that you can deploy Windows 8.1 to the new computers by using an image.
What should you do?
A. Import the storage drivers to the Drivers container and update the task sequence.
B. Update the existing x86 boot image to include the storage drivers.
C. Create a new driver package and update the task sequence.
D. Create a new x64 boot image and configure the operating system image to use the x64 boot image.


Answer Clike
Which two tasks should you perform?

You have Windows 8.1 images that are rebuilt quarterly and imported to System Center 2012 R2 Configuration Manager Service Pack 1 (SP1).
The Microsoft Deployment Toolkit (MDT) 2013 is integrated with Configuration Manager.
You need to reduce the network security risks when the images are deployed by using Operating System Deployment (OSD).
Which two tasks should you perform? Each correct answer presents a complete solution.
A. Before the Apply Operating System Image task sequence step, add a step to install Deployment Imaging Servicing and Management (DISM).
B. Before the Apply Operating System Image task sequence step, add a step to install the Windows Assessment and Deployment Kit (Windows ADK).
C. After the Apply Operating System Image task sequence step, add a step to install software updates offline.
D. After the installation of the final application, add an Install Software Updates task sequence step.
E. After the Apply Operating System Image task sequence step, add a Run Command Line step that runs wuauclt.exe /detectnow.


Answer Clike
Which four actions should you perform in sequence?

DRAG DROP
Your network contains a single Active Directory domain named contoso.com. System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) is deployed to contoso.com.
You have a Windows 8.1 operating system image named Image1 in Configuration Manager. Image1 has the data source of \server1.contoso.comsourceImage1.wim.
New client computers are deployed by using Image1.
You have an application named App1. App1 is a configuration utility that must be installed by using a Windows Installer (MSI) package.
You need to ensure that App1 is included in all future deployments of Image1.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you identify?

DRAG DROP
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment. The deployment includes the collections described in the following table.


Configuration Manager has the client settings configured as shown in the following table.


You need to identify which additional hardware inventory classes will be collected from Computer2 and Computer3.
What should you identify? To answer, drag the appropriate hardware inventory classes to the correct computers. Each hardware inventory class may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which object should you configure in Configuration Manager?

You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
Hardware inventory is enabled for all of the Configuration Manager clients.
You create a device collection named Finance. All of the client computers in the finance department are members of the Finance collection.
You need to include Trusted Platform Module (TPM) information in the hardware inventory of the finance department computers.
Which object should you configure in Configuration Manager?
A. Hardware Requirements
B. Custom Client Device Settings
C. Network Discovery
D. a configuration item
E. a computer association


Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
Software Inventory and Hardware Inventory are enabled for all of the client computers.
All of the client computers have an application named App1 installed. App1 saves files to the C:ABC folder. All of the files saved by App1 have a file name extension of .abc.
You configure Software Inventory to inventory all of the files that have the .abc extension and the .exe extension.
After six months, you discover that some of the client computers fail to inventory .abc files.
All of the client computers inventory .exe files.
You need to ensure that the .abc files are inventoried.
What should you do?
A. Modify C:ABCSkpswi.dat.
B. Delete C:ABCSkpswi.dat.
C. Modify C:Program FilesApp1NO_SMS_On_Drive.sms.
D. Delete C:Program FilesApp1NO_SMS_On_Drive.sms.


Answer Clike
Which two log files should you review?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
In Default Client Settings, you enable Hardware Inventory and Software Inventory.
You discover that a group of client computers fails to report hardware inventory data. The client computers report software inventory data.
You verify that Configuration Manager can deploy applications to the client computers.
You need to identify what is causing the reporting issue.
Which two log files should you review? Each correct answer presents part of the solution.
A. Hman.log
B. Filesystemfile.log
C. Dataldr.log
D. Mp_sinv.log
E. Inventoryagent.log


Answer Clike
Which log files should you review?

HOTSPOT
You deploy System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to a server named Server1.
Configuration Manager manages all of the client computers, including a computer named Client1.
A hardware inventory cycle is initiated on Client1.
You need to identify which Inventory classes were collected on Client1 and when the inventory was added to the site database.
Which log files should you review? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
What should you do first?

Your network contains a single Active Directory domain named contoso.com.
System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) is deployed to contoso.com.
You need to inventory the installed software on Windows Phone and iOS devices.
What should you do first?
A. Configure Software Inventory.
B. Add a Microsoft Intune subscription.
C. Configure Network Discovery.
D. Install the Configuration Manager client.
E. Enroll the mobile devices.


Answer Clike
What should you identify?

DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
Three users named User1, User2, and User3 will perform the following tasks:
User1 will review software metering data and inventory reports.
User2 will deploy Applications and create alerts.
User3 will create configuration items.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer area. Each security role may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
What should you do?

DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
You create a collection named All Marketing Users.
You need to inventory the desktop settings of the All Marketing Users collection.
What should you do?
To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you do?

DRAG DROP
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
Your company has a security policy that contains mandatory registry settings for all servers.
You have a collection named Servers that contains all of the servers.
You need to identify which servers do not comply with the security policy.
What should you do?
To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which node should you select in the Configuration Manager console?

HOTSPOT
Your network contains a System Center 2012 Configuration Manager environment.
You deploy an application to 1,000 client computers.
You need to identify which client computers are in the process of installing the application.
Which node should you select in the Configuration Manager console?
To answer, select the appropriate node in the answer area.
Hot Area:




Answer Clike
What should you do?

DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
You create a collection named All Managed Servers.
You need to inventory the environment variables of the All Managed Servers collection.
What should you do?
To answer, move the four appropriate actions from the list of actions to the answer area and arrange.
Select and Place:




Answer Clike
What should you do first?

Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.)


(The exhibit shows that: Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.)
The network contains six servers. The servers are configured as shown in the following table.


You need to ensure that mobile device information is available in the hardware inventory.
What should you do first?
A. Install a management point on Server5.
B. Configure IIS to support only HTTPS on Server5.
C. Install a management point on Server2.
D. Install Network Load Balancing (NLB) on Server3.
E. Install an enrollment proxy point on Server6.
F. Configure IIS to support only HTTP on Server3.
G. Install a software update point on Server3.
H. Install Network Load Balancing (NLB) on Server6.
I. Install a PXE-enabled protected distribution point on Server5.
J. Install the Windows Cluster service on Server3.
K. Install a PXE-enabled protected distribution point on Server4.
L. Install the Windows Cluster service on Server6.
M. Install Windows Server Update Services (WSUS) on Server3.
N. Install a protected distribution point on Server1.


Answer Clike
What should you do first?

Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.)


(The exhibit shows that: Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.)
The network contains six servers. The servers are configured as shown in the following table.


You need to ensure that mobile device information is available in the hardware inventory.
What should you do first?
A. Install a management point on Server5.
B. Configure IIS to support only HTTPS on Server5.
C. Install a management point on Server2.
D. Install Network Load Balancing (NLB) on Server3.
E. Install an enrollment proxy point on Server6.
F. Configure IIS to support only HTTP on Server3.
G. Configure the Exchange connector on Server3.
H. Install Network Load Balancing (NLB) on Server6.
I. Install a PXE-enabled protected distribution point on Server5.
J. Install the Windows Cluster service on Server3.
K. Install a PXE-enabled protected distribution point on Server4.
L. Install the Windows Cluster service on Server6.
M. Install Windows Server Update Services (WSUS) on Server3.
N. Install a protected distribution point on Server1.
O. Install a software update point on Server3.


Answer Clike
What should you do first?

Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table:


Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.


Administrators currently apply software updates to servers manually.
You discover that Server4 was never updated.
You need to centrally manage software updates for all of the servers by using Configuration Manager.
What should you do first?
A. Install a management point on Server5.
B. Configure IIS to support only HTTPS on Server6.
C. Install a management point on Server2.
D. Install Network Load Balancing (NLB) on Server3.
E. Install an enrollment proxy point on Server6.
F. Configure IIS to support only HTTP on Server3.
G. Configure the Exchange connector on Server3.
H. Install Network Load Balancing (NLB) on Server6.
I. Install a PXE-enabled protected distribution point on Server5.
J. Install the Windows Cluster service on Server3.
K. Install a PXE-enabled protected distribution point on Server4.
L. Install the Windows Cluster service on Server6.
M. Install Windows Server Update Services (WSUS) on Server3.
N. Install a protected distribution point on Server1.
O. Install a software update point on Server3.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table:


Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.


A corporate security policy states that remote computers are forbidden to communicate directly with servers on the internal network.
You need to ensure that you collect inventory data from the remote computers.
What should you do?
A. Install Windows Server Update Services (WSUS) on Server3.
B. Configure the Exchange connector on Server3.
C. Install a management point on Server2.
D. Install a PXE-enabled protected distribution point on Server6.
E. Install a software update point on Server3.
F. Install Network Load Balancing (NLB) on Server6.
G. Install an enrollment proxy point on Server6.
H. Install the Windows Cluster service on Server3.
I. Install a protected distribution point on Server1.
J. Configure IIS to support only HTTPS on Server3.
K. Install a management point on Server5.
L. Install the Windows Cluster service on Server6.
M. Configure IIS to support only HTTP on Server5.
N. Install Network Load Balancing (NLB) on Server3.
O. Install a PXE-enabled protected distribution point on Server4.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table:


Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.


You plan to deploy servers to the perimeter network by using Configuration Manager.
The operating system for each server will be installed over the network.
The installations will begin automatically, as soon as each server starts for the first time.
You need to recommend a solution to minimize the amount of network traffic between the perimeter network and the internal network during the installation of the operating systems.
What should you do?
A. Install a software update point on Server3.
B. Configure IIS to support only HTTP on Server3.
C. Install a PXE-enabled protected distribution point on Server5.
D. Install a management point on Server5.
E. Install Windows Server Update Services (WSUS) on Server3.
F. Install Network Load Balancing (NLB) on Server6.
G. Install the Windows Cluster service on Server6.
H. Install a PXE-enabled protected distribution point on Server4.
I. Install a management point on Server2.
J. Install a protected distribution point on Server1.
K. Install the Windows Cluster service on Server3.
L. Install Network Load Balancing (NLB) on Server3.
M. Configure the Exchange connector on Server3.
N. Configure IIS to support only HTTPS on Server5.
O. Install an enrollment proxy point on Server6.


Answer Clike
Which client installation methods should you identify?

Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients.
All of the client computers have Windows Firewall enabled. Windows Firewall is configured to block File and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center 2012 Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager client to all of the client computers.
Which client installation methods should you identify? (Choose all that Apply.)
A. a logon script installation
B. a manual client installation
C. a software update-based client installation
D. a Client Push Installation
E. an Active Directory Group Policy-based installation


Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You have a sales department that contains 500 employees, 20 of whom are sales managers. Each sales department employee has a desktop computer that is configured as their primary device.
The sales managers frequently log on to computers in the marketing department.
You plan to deploy a new sales application named App1.
You need to ensure that App1 is only available to the sales department employees when they log on to their primary device.
What should you do?
A. In a requirement rule, set Organization Unit = Sales.
B. In Client Settings, set Allow user to define their primary devices to False.
C. In a requirement rule, set Primary Device = True.
D. In Client Settings, set Allow user to define their primary devices to True.


Answer Clike
What should you do?

Your network contains a single Active Directory domain.
The functional level of the domain is Server 2003. The domain contains the following servers:
Ten servers that run Windows Server 2003
Twenty servers that run Windows Server 2008
One server that has Microsoft Exchange Server 2007 installed
One server that has System Center 2012 Configuration Manager installed
Users have mobile devices that run Windows Mobile 6.5 and Windows Phone 7.0.
You need to ensure that you can manage the settings of the mobile devices and perform remote device wipes by using Configuration Manager.
What should you do? (Chose all that apply)
A. Upgrade all of the Windows 2003 domain controllers to Windows 2008 R2.
B. Upgrade the Exchange server to Exchange Server 2010.
C. Configure an Exchange connector.
D. Change the functional level of the domain to Windows 2008.
E. Upgrade all of the domain controllers to Windows 2008 R2.


Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You create two custom client agent settings named ClientSettings1 and ClientSettings2. You apply ClientSettings1 to all of the client computers in the sales department. You apply ClientSettings2 to all of the client computers in the marketing department.
The client computers in the marketing department contain several custom registry settings.
You need to collect the custom registry settings from the marketing department computers.
What should you do?
A. Edit the default client agent settings and include the custom registry information
B. Edit ClientSettings2 and exclude the custom registry information.
C. Create a new set of custom client agent settings for the marketing department and include the custom registry information.
D. Edit ClientSettings2 and include the custom registry information.


Answer Clike
What should you do?

Your company has 2,000 desktop computers and 450 portable computers. The desktop computers run Windows 7 Enterprise (x64) and the portable computers run Windows 7 Professional (x86). The network contains a System Center 2012 Configuration Manager environment. You create a configuration baseline that is targeted to all of the computers.
You discover that you fail to receive compliance information for the configuration baseline from the portable computers.
You receive compliance information for the configuration baseline from the desktop computers.
You receive compliance information for other configuration baselines from all of the computers.
You need to ensure that you receive compliance information for the configuration baseline from all of the computers.
What should you do?
A. Configure the configuration item to be evaluated on all Windows 7 operating systems.
B. Create custom client settings for the portable computers and enable Compliance Settings.
C. Create a collection containing the portable computers and assign the configuration baseline to the collection.
D. Add the configuration item to a new configuration baseline.


Answer Clike
What should you do?

Your network contains a System center 2012 Configuration Manager environment.
You are creating a configuration item that contains application settings for Microsoft Office 2010.
You need to detect whether Office 2010 is installed before validating the configuration item.
What should you do?
A. Create a report to display all installed software.
B. Enable Use a custom script to detect this application.
C. Create a direct membership collection.
D. Create an automatic deployment rule.


Answer Clike
What should you do next?

Your company has a production network and a test network.
Both networks have System Center 2012 Configuration Manager deployed.
You create the following objects on the test network:
A configuration item named WebCI
A configuration baseline named WebBaseline that contains WebCI
A collection named WebServers that contains all of the Web servers on the test network.
You export the configuration baseline to Baseline.cab.
You open the Configuration Manager console, you click Assets and Compliance, and then you expand Compliance Settings.
You need to apply the configuration baseline to the Web servers on the production network.
What should you do next? (Choose all that apply.)
A. Right-click WebBaseline, select Categorize, and then select Server.
B. Right-click Configuration Baselines, and then select Import Configuration Data
C. Right-click WebCI, select Export, and then specify Baseline.cab as the export file.
D. Right-click WebBaseline, and then select Properties. In the Deployments tab, type WebServers in theFilter… box.
E. Right-click WebBaseline, select Deploy, and then select the WebServers collection.


Answer Clike
What should you do next?

Your company has a production network and a test network.
Both networks have System Center 2012 Configuration Manager deployed.
You create the following objects on the test network:
A configuration item named SQLServerCI
A configuration baseline named SQLServerBaseline that contains the configuration item
A collection named SQLServers that contains all of the servers on the test network that run Microsoft SQL Server.
You export the configuration baseline to SQLServerBaseline.cab.
You open the Configuration Manager console, you click Assets and Compliance, and then you expand Compliance Settings.
You need to apply the configuration baseline to the servers on the production network that run SQL Server.
You create a collection named SQLServers that contains all SQL Servers from the production network.
What should you do next? (Choose all that apply.)
A. Right-click SQLServersBaseline, select Categorize, and then select Server.
B. Right-click SQLServerCI, select Export, and then specify SQLServer Baseline.cab as the export file.
C. Right-click SQLServersBaseline, select Deploy, and then select the SQLServers collection.
D. Right-click Configuration Baselines, and then select Import Configuration Data
E. Right-click SQLServersBaseline, and then select Properties. In the Deployments tab, type SQLServers in the Filter… box.


Answer Clike
What should you do?

Your company uses System Center 2012 Configuration Manager to monitor compliance.
The company has a configuration baseline for each server that has the Web Server (IIS) server role installed.
A new corporate policy specifies that the maximum TCP window size for all of the Web servers must be 131,072 bytes.
You discover that the TCP window size is set in the following registry entry:
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesHTTPParametersMaxBytesPerSend
You need to generate an error message for all of the Web servers that do NOT comply with the corporate policy.
What should you do?
A. Add a new configuration item that has a registry value setting type to the configuration baseline.
B. Create a query-based collection that contains all of the Web servers, and then initiate an inventory collection.
C. Create a query that returns a list of all the Web servers, and then search the query results for the registry value.
D. Add a new configuration item that has an Internet Information Services (IIS) metabase setting type to the configuration baseline.


Answer Clike
What should you do?

Your network contains a single Active Directory domain.
The functional level of the domain is Server 2003. The domain contains the following server:
Ten servers that run Windows Server 2003
Twenty servers that run Windows Server 2008
One server that has Microsoft Exchange Server 2007 installed
One server that has System Center 2012 Configuration Manager installed
Users have mobile devices that run Windows Mobile 6.5 and Windows Phone.
You need to ensure that you can manage the settings of the mobile devices and perform remote device wipes by using Configuration Manager.
What should you do?
A. Upgrade the Exchange server to Exchange Server 2010. Configure an Exchange connector.
B. Change the functional level of the domain to windows 2008. Upgrade the Exchange server to Exchange Server 2010.
C. Upgrade all Windows 2003 domain controllers to Windows 2008.
D. Upgrade all of the domain controllers to Windows 2008 R2. Configure an Exchange connector.


Answer Clike
What should you do?

Your network contains two Active Directory forests named contoso.com and litwareinc.com.
You implement System Center 2012 Configuration Manager in the contoso.com forest.
You deploy the Configuration Manager client to all of the client computers in contoso.com by using a logon script.
You need to ensure that the Configuration Manager client is automatically deployed to all of the client computers in the litwareinc.com forest.
What should you do? (Choose all that Apply.)
A. Configure a Client Push Installation account.
B. Enable Client Push installation.
C. Enable Active Directory System Discovery.
D. Configure an administrative user.
E. Enable Active Directory Forest Discovery.


Answer Clike
What should you install?

Your network contains a System Center 2012 Configuration Manager environment.
The environment contains a single primary site.
You need to provide users with the ability to remotely reset their mobile device to the factory settings.
What should you install?
A. Application Catalog web service point and Application Catalog website point
B. Out of Band service point and Application Catalog web service point
C. Device management point and System Health validator point
D. System Health Validator point and Application Catalog website point


Answer Clike
What should you review?

Your network contains a System Center 2012 Configuration Manager environment.
The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. the Inventoryagent.log file
B. the Rcmctrl.log file
C. the Microsoft SQL Server replication diagnostic files
D. the Despool.log file


Answer Clike
Which reasons should you identify?

Your network contains a System Center 2012 Configuration Manager environment.
The Client Status node in the Configuration Manager console shows a downward trend in client health.
You verify the logs on several clients.
You discover that the clients are healthy and are communicating normally to management points.
You need to identify the reasons why the Configuration Manager console displays a downward trend in client health.
Which reasons should you identify? (Choose all that Apply.)
A. In Client Status Settings Properties, the Heartbeat discovery during the following days interval is shorter than the Heartbeat Discovery interval.
B. The age set in the Delete Aged Discovery Data maintenance task is shorter than the Heartbeat Discovery interval.
C. The Delete Obsolete Client Discovery Data maintenance task is disabled.
D. The Active Directory sites that are members of boundary groups are modified.
E. Microsoft SQL Server replication to the management points stopped.


Answer Clike
Which rule should you include in the membership rule?

You are the network administrator for a company named Contoso, Ltd.
The network contains 1,000 desktop computers and 500 servers.
The network contains a System Center 2012 Configuration Manager environment.
The names of all the desktop computers in the human resources department start with the letters HR, for example HR001 and HR023.
A device collection named All Server Devices contains all of the servers.
A device collection named All Desktop Devices contains all of the desktop computers. You plan to create a new collection named All HR Computers and Servers.
The new collection must contain all of the human resources department computers and all of the servers. The collection must not contain any other computers.
You need to create a membership rule for the new collection.
Which rule should you include in the membership rule? (Choose all that Apply.)
A. QUERY RULE: select * from SMS_R_System where SMS_R_system.NetbiosName like “HR%”
B. INCLUDE RULE: All Server Devices
C. EXCLUDE RULE: All NON HR Computers
D. EXCLUDE RULE: All Desktop Devices
E. QUERY RULE- select * from SMS_R_System where SMS_R_system.OperatingSystemNameandVersion like. *%Workstation*
F. QUERY RULE-select * from SMS_R_System where SMS_R_system.OperatingSystemNameandVersion not like. *%Server*


Answer Clike
Which Applications should you identify?

Your network contains a System Center 2012 Configuration Manager environment.
You plan to create a Build and Capture task sequence to build a reference image of Windows 7.
You need to identify which Application must exist in Configuration Manager before you can create the Build and Capture task sequence.
Which Applications should you identify? (Choose all that Apply.)
A. Microsoft Deployment Toolkit (MDT)
B. Configuration Manager client
C. System Preparation tool (Sysprep)
D. User State Migration Tool (USMT)


Answer Clike
Your company uses System Center 2012 Configuration Manager to distribute operating system images. The standard operating system for client computers is Windows 7 Enterprise (x86).

Your company uses System Center 2012 Configuration Manager to distribute operating system images. The standard operating system for client computers is Windows 7 Enterprise (x86).
You receive 300 new desktop computers. Each computer has a new storage controller.
When you attempt to deploy an existing image to one of the computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase.
You need to ensure that you can deploy Windows 7 to the new computers by using an image.
What should you do?
A. Import the storage drivers to the Drivers container and update the task sequence.
B. Create a new x64 boot image and configure the operating system image to use the x64 boot image.
C. Create a new driver package and update the task sequence.
D. Update the existing x86 boot image to include the storage drivers.


Answer Clike
Which applications should you identify?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You plan to create a Build and Capture task sequence to build a reference image of Windows 8.1.
You need to identify which Applications must exist in Configuration Manager before you can create the Build and Capture task sequence.
Which applications should you identify? (Choose all that apply.)
A. Microsoft Deployment Toolkit (MDT)
B. Configuration Manager client
C. System Preparation tool (Sysprep)
D. User State Migration Tool (USMT)


Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You create a report named Report1. Report1 is used by multiple users.
Users report that it takes too long to load Report1.
You need to reduce the amount of time it takes to load Report1.
What should you do?
A. Enable caching for the report.
B. Decrease the size of the ReportServer database.
C. Decrease the session timeout value for the Reports website.
D. Increase the size of the ReportServerTempDB database.


Answer Clike
What should you do?

Your network contains a System center 2012 Configuration Manager environment.
You are creating a configuration item that contains application settings for Microsoft Office 2010.
You need to detect whether Office 2010 is installed before validating the configuration item.
What should you do?
A. Create a query-based collection.
B. Create an automatic deployment rule.
C. Create a report to display all installed software.
D. Enable Use Windows Installer detection.


Answer Clike
Which tools should you identify?

Your network contains a System Center 2012 Configuration Manager environment.
The environment contains a reporting services point.
A group of users is responsible for creating custom reports.
The custom reports will be published.
You need to identify which tools can be used to create and publish custom reports to Microsoft SQL Server Reporting Services (SSRS).
Which tools should you identify? (Choose all that apply.)
A. Report Builder
B. Microsoft SQL Server Business Intelligence Development Studio
C. Microsoft Access 2010
D. Reporting Services Configuration Manager
E. Microsoft SQL Server Management Studio


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
You need to receive an email message every day that lists all non-compliant clients.
What should you do?
A. Create an alert subscription.
B. Configure a Microsoft SQL Server Reporting Services (SSRS) report.
C. Configure an in-console alert.
D. Create a ConfigMgr query.


Answer Clike
What should you add to the query?

Your network contains a System Center 2012 Configuration Manager environment.
You write the following query:
Select SYS.Name from SMS_R_System SYS
Join SMS_G_System_ADD_REMOVE_PROGRAMS ARP
On ARP.ResourceId = SYS.ResourceId
You need to create a list of all the client computers that have a version of Visual Studio installed.
What should you add to the query?
A. where ARP.DisplayName like “Visual Studio*”
B. where ARP.DisplayName = “*Visual Studio*”
C. where ARP.DisplayName = “%%Visual Studio”
D. where ARP.DisplayName like “Visual studio%”


Answer Clike
Which join type should you use?

Your network contains a System Center 2012 Configuration Manager environment.
You have the following query:
Select
R .Name,
U .UserName
From
SMS_R_System R
Join SMS_R_User U
On R.LastLogonUserName = U.UserName
You need to ensure that all of the client computers are listed in the query results.
Which join type should you use?
A. LEFT
B. FULL
C. INNER
D. RIGHT


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
Software Inventory and Hardware Inventory are enabled for all of the client computers.
All of the client computers have an Application named App1 installed.
App1 saves files to the C:ABC folder.
All of the files saved by App1 have a file name extension of .abc.
You configure Software Inventory to inventory all of the files that have the .abc extension and the .exe extension.
After six months, you discover that some of the client computers failed to inventory .abc files. All of the client computers inventory .exe files.
You need to ensure that the .abc files are inventoried.
What should you do?
A. Modify C:Program FilesApp1NO_SMS_On_Drive.sms.
B. Delete C:Program FilesApp1NO_SMS_On_Drive.sms.
C. Modify C:ABCSkpswi.dat.
D. Delete C:ABCSkpswi.dat.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
You create two custom client agent settings named ClientSettings1 and ClientSettings2. You apply ClientSettings1 to all of the client computers in the sales department. You apply ClientSettings2 to all of the client computers in the marketing department.
The client computers in the marketing department contain several custom registry settings.
You need to collect the custom registry settings from the marketing department computers.
What should you do?
A. Edit the default client agent settings and include the custom registry information
B. Edit ClientSettings2 and exclude the custom registry information.
C. Create a new set of custom client agent settings for the marketing department and include the custom registry information.
D. Edit ClientSettings2 and include the custom registry information.


Answer Clike
Which log file should you review?

Your network contains a System Center 2012 Configuration Management environment.
The environment contains a Central Administration site and two primary child sites named Child1 and Child2.
You create a new Application on the Central Administration site.
You view the new Application on Child1, but the new Application fails to appear on Child2.
You need to identify whether the Application transferred to Child2.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log


Answer Clike
Which log file should you review?

You create a deployment to install Microsoft Office 2013 The deployment targets 5,000 client computers on the network.
Two weeks after you create the deployment, you discover that Office 2013 fails to install on a client computer named Computer 1.
You need to identify whether Computer1 started downloading the Application of Office 2013.
Which log file should you review?
A. Locationservices.log
B. Ccm.log
C. Sdmagent.log
D. Sitestat.log
E. Rcmctrl.log
F. Dcmagent.log
G. Contenttransfermanager.log
H. Smsexec.log
I. Wsyncmgr.log
J. Ciagent.log
K. Hman.tog


Answer Clike
Which log file should you review?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
The network contains 10 database servers that run Microsoft SQL Server 2014. You have a configuration baseline that is used to monitor the database servers.
You add new configuration items to the configuration baseline.
Two days later, you discover that only eight of the database servers report any information about the new configuration items.
You need to identify whether the new configuration items downloaded to the database servers.
Which log file should you review?
A. Hman.log
B. Sitestat.log
C. Dcmagent.log
D. Wsyncmgr.log
E. Ccm.log
F. Contenttransfermanager.log
G. Sdmagent.log
H. Rcmctrl.log
I. Ciagent.log
J. Smsexec.log
K. Locationservices.log


Answer Clike
Which log files should you review?

Your network contains a System Center 2012 Configuration Manager environment.
In Default Client Agent Settings, you enable Hardware Inventory and Software Inventory.
You discover that a group of client computers fails to report software inventory data.
The client computers report hardware inventory data.
You confirm that Configuration Manager can deploy Applications to the group of client computers.
You need to identify what is causing the reporting issue.
Which log files should you review? (Choose all that Apply.)
A. Filesystemfile.log
B. Dataldr.log
C. Mp_sinv.log
D. Inventoryagent.log
E. Hman.log


Answer Clike
Which settings should you modify from the Configuration Manager console?

Your network contains a System Center 2012 Configuration Manager environment.
You need to change the organization name displayed by Configuration Manager.
Which settings should you modify from the Configuration Manager console?
A. Client Policy
B. Computer Agent
C. User and Device Affinity
D. Compliance Settings


Answer Clike
Which query should you use to create the report?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You need to create a report that lists all of the client computers that do not have an Application named App1 installed.
Which query should you use to create the report?
A. SELECT SYS.Netbios_Name0, ARP.DisplayName0
FROM v_R_System AS SYS INNER JOIN
v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP. ResourceID WHERE ARP.DisplayName0 NOT IN (‘App1’)
B. SELECT SYS.Netbios_Name0 from v_R_System SYS
WHERE SYS.ResourceID IN
(SELECT SYS.ResourceID
FROM v_R_System AS SYS INNER JOIN
v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID – ARP.ResourceID. WHERE ARP.DisplayName0 = ‘App1’)
C. SELECT SYS.Netbios_Name0 from v_R_System SYS
WHERE SYS.ResourceID NOT IN
(SELECT SYS.ResourceID
FROM v_R_System AS SYS INNER JOIN
v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = ‘App1’)
D. SELECT SYS.Netbios_Name0, ARP.DisplayName0
FROM v_R_System AS SYS INNER JOIN
V_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID – ARP.ResourceID WHERE ARP.DisplayName0 NOT LIKE ‘App1’


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
Your company deploys a third-party Application to 10,000 client computers.
You need to ensure that you can run a report that lists all of the client computers that ran the Application last month.
What should you do?
A. Modify the Enable hardware inventory on clients setting.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Modify the Enable software inventory on clients setting.
D. Add a file name to the Hardware Inventory configuration.
E. Add a WMI class to the Hardware Inventory Classes list.
F. Add a file name to the Software Inventory configuration.
G. Add a file name to Software Metering.
H. Add a WMI class to the Sms_def.mof file.
I. Select Collect NOIDMIF files in Hardware Inventory.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
Your company deploys a custom Application to 2,000 client computers by using Configuration Manager.
The Application is not listed in Add Remove Programs.
You discover that information about the Application fails to appear in the inventory queries and inventory reports.
You verify that information about other Applications appear in the inventory reports.
You need to ensure that Configuration Manager data includes installation information about the custom Application.
What should you do?
A. Add a file name to Software Metering.
B. Add a WMI class to the Hardware Inventory Classes file.
C. Add a file name to the Hardware Inventory configuration.
D. Enable a default WMI Cass in the Hardware Inventory Classes list.
E. Select Collect NOIDMIF files in Hardware Inventory.
F. Add a file name to the Software Inventory configuration.
G. Modify the Enable hardware inventory on Cents setting.
H. Add a WMI class to the Sms_def.mof file.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
Your company develops a custom hardware device and installs the device on all of the client computers in the research department.
You discover that information about the device fails to appear in any inventory queries or reports.
Information about other hardware devices appears in the inventory queries and reports.
You need to ensure that Configuration Manager data include information about the custom hardware device.
What should you do?
A. Enable a default WMI class in the Hardware Inventory Classes list.
B. Modify the Enable hardware inventory on clients setting.
C. Add a WMI class to the Hardware inventory Classes list.
D. Add a file name to the Software Inventory configuration.
E. Select Collect NOIDMIF files in Hardware Inventory.
F. Add a file name to the Hardware inventory configuration.
G. Add a file name to Software Metering.
H. Add a WMI class to the Sms_def.mof file.
I. Modify the Enable software inventory on clients setting.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
Your company deploys 1,000 client computers.
You discover that information about printers fails to appear in any inventory queries or reports.
Information about other hardware devices appears in the inventory queries and reports.
You need to ensure that Configuration Manager data includes information about the printers.
What should you do?
A. Add a WMI class to the Hardware inventory Classes list.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Add a file name to the Software Inventory configuration.
D. Add a file name to the Hardware inventory configuration.
E. Add a file name to Software Metering.
F. Select Collect NOIDMIF files in Hardware Inventory.
G. Add a WMI class to the Sms_def.mof file.
H. Modify the Enable software inventory on clients setting.
I. Modify the Enable hardware inventory on clients setting.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
The environment contains a single primary site.
The primary site has a distribution point and a management point.
You need to recommend a communication solution that meets the following requirements:
You need to recommend a communication solution that meets the following requirements:
Communication between the client computes in the research department and the management point must use HTTPS.
Communication between all of the other client computers and the management point must be able to use HTTP.
Minimize the number of site system.
What should you do?
A. Configure the existing management point to use HTTPS.Configure the research department computers always to use HTTPS.
B. Create a new primary child site and configure the site to use native mode.Assign all of the research department computers to the new site.
C. Install a new management point and configure the management point always to use HTTPS.Configure the research department computers always to use HTTPS.
D. Install a new management point and configure Windows Firewall to block outbound TCP port 80. Configure the research department computes always to use HTTPS.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manage environment.
The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server 2008 R2.
Server2 contains the Configuration Manager database.
Server2 fails.
You install SQL Server 2008 R2 on a new server.
You name the server Server3.
You need to restore the Configuration Manager database to Server3.
What should you do?
A. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Configuration Manager 2012 Setup Wizard.
B. From Server3, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database and log files.
C. From Server3, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.
D. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Site Repair Wizard.


Answer Clike
Which query should you use to create the report?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You need to create a report that lists all of the client computers that have an application named App1 installed.
Which query should you use to create the report?
A. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_Sytem AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceIDWHERE ARP.DisplayName0 NOT LIKE ‘App1’
B. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID NOT IN(SELECT SYS.ResouceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceIDWHERE ARP.DisplayName0 = ‘App1’)
C. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_Sytem AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceIDWHERE ARP.DisplayName0 NOT IN (‘App1’)
D. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID IN(SELECT SYS.ResouceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceIDWHERE ARP.DisplayName0 = ‘App1’)


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
You need to use the Configuration Manager console to identify service level agreement (SLA) issues among non-compliant clients.
What should you do?
A. Configure a Microsoft SQL Server Reporting Services (SSRS) report.
B. Create an alert subscription.
C. Configure an in-console alert.
D. Create a ConfigMgr query.


Answer Clike
Which tool should you identify?

Your network contains a System Center 2012 Configuration Manager environment.
The environment contains a reporting services point.
You need to identify which tools can be used to create and publish custom reports to Microsoft SQL Server Reporting Services (SSRS).
Which tool should you identify?
A. Reporting Services Configuration Manager
B. Microsoft SQL Server Management Studio
C. Microsoft SQL Server Business Intelligence Development Studio
D. Microsoft Access 2010 and Reporting Services Configuration Manager


Answer Clike
What should you add to the query?

Your network contains a System Center 2012 Configuration Manager environment.
You write the following query:
Select SYS.Name from SMS_R_System SYS
Join SMS_G_System_ADD_REMOVE_PROGRAMS ARP
On ARP.ResourceID = SYS.ResourceId
You need to create a list of all the client computers that have a version of Microsoft Office installed.
What should you add to the query?
A. where ARP.DisplayName like “Microsoft Office*”
B. where ARP.DisplayName = “Microsoft Office*”
C. where ARP.DisplayName like “Microsoft Office%”
D. where ARP.DisplayName = “%Microsoft Office”


Answer Clike
What should you review?

Your network contains a System Center 2012 Configuration Manager environment.
The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.
You discover that none of the collections created on Site1 are displayed on Site2.
You need to identify whether there is replication issue between the sites.
What should you review?
A. the Colleval.log file.
B. the Despool.log file
C. the Rcmctrl.log file
D. the Sender.log file


Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
Software Inventory and Hardware Inventory are enabled for all of the client computers.
All of the client computers have an Application named App1 installed.
App1 saves files to the C:Program FilesApp1 folder. All of the files saved by App1 have a file name extension of .xyz.
You configure Software Inventory to inventory all of the files that have the .xyz extension and the .exe extension.
After six months, you discover that some of the client computers fail to inventory .xyz files.
All of the client computers inventory .exe files.
You need to ensure that the .xyz files are inventoried.
What should you do?
A. Modify C:NO_SMS_On_Drive.sms.
B. Delete C:NO_SMS_On_Drive.sms.
C. Modify C:Program FilesApp1Skpswi.dat.
D. Delete C:Program FilesApp1Skpswi.dat.


Answer Clike
Which log file should you review?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You deploy the Configuration Manager client to all client computers.
You enable Hardware Inventory and Software Inventory for all of the client computers.
You discover that one of the client computers fails to report inventory data.
You confirm that the inventory files are copied correctly to the site server. You discover, however, that the site server does not contain any data from the client computer.
You need to identify what is causing the reporting issue.
Which log file should you review?
A. Dataldr.log
B. Mp_hinv.log
C. Inventoryagent.log
D. Contenttransfermanager.log


Answer Clike
What should you do?

Your company uses System Center 2012 Configuration Manager to distribute operating system images.
You receive 300 new desktop computers. All of the client computers have the same hardware configuration.
When you attempt to deploy a Windows 7 image to one of the client computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase.
You need to ensure that you can deploy Windows 7 to the new computers by using an image.
What should you do?
A. Update the existing boot image to include the storage drivers.
B. Clear the contents of the Drivers container and update the task sequence.
C. Import the storage drivers to the Drivers container and update the task sequence.
D. Create a new driver package and update the task sequence.


Answer Clike
What should you create?

Your company uses System Center 2012 Configuration Manager to deploy applications.
The company purchases a new application named App1. App1 can be installed only on client computers that run Windows 7.
You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of memory and 300 Gb of free disk space.
What should you create?
A. a Query object
B. custom client user settings
C. a configuration baseline
D. requirement rules


Answer Clike
What should you do?

Your network contains a single Active Directory forest named contoso.com.
Contoso.com contains three System Center 2012 Configuration Manager sites and one System Center Configuration Manager 2007 site.
You need to ensure that you can transfer objects from Configuration Manager 2007 to Configuration Manager 2012.
What should you do?
A. Assign the computer account of the Central Administration site server permission to the Configuration Manager 2007 site.Assign the computer account of the Central Administration site server permissions to the Microsoft SQL Server database instance.
B. Extend the Active Directory schema and assign the Central Administration site server permissions to the SystemSystem Management container.
C. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration Manager 2012 primary site.
D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration Manager 2007 primary site.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
The Configuration Manager databases are located on a remote server that runs Microsoft SQL Server.
You need to ensure that you can restore the Central Administration site.
What should you do?
A. From the Configuration Manager console, enable the Backup Site Server maintenance task and set a schedule.
B. From Microsoft SQL Server Management Studio, create a maintenance plan for the site databases.
C. From Task Scheduler, create a scheduled task that runs smssqlbkup.exe.
D. From Windows Server Backup, schedule a full system backup.


Answer Clike
Which Configuration Manager discovery method should you use?

Your network contains a single Active Directory domain.
You plan to deploy System Center 2012 Configuration Manager.
The hierarchy will have a Central Administration Site and five Primary Sites.
You need to ensure that you can target user groups for software distribution.
The solution must minimize network traffic.
Which Configuration Manager discovery method should you use?
A. Active Directory User Discovery and Active Directory Group Discovery on the primary sites
B. Active Directory User Discovery and Active Directory Group Discovery on the Central Administration site
C. Active Directory User Discovery on the Central Administration site and Active Directory Group Discovery on the primary sites
D. Active Directory User Discovery on the primary sites and Active Directory Group Discovery on every site


Answer Clike
What should you do?

Your network contains an Active Directory forest named litwareinc.com.
The forest has a single domain.
The forest contains a System Center 2012 Configuration Manager environment.
The environment contains a single primary site.
You create a group named InstallTechs.
You need to ensure that the members of InstallTechs can deploy Applications to desktop computers by using Configuration Manager.
The solution must minimize the number of permissions assigned to InstallTechs.
What should you do?
A. Assign the Application Administrator security role to InstallTechs. Create a new collection that contains all of the desktop computers. Scope InstallTechs to the new collection.
B. Assign the Application Deployment Manager security role to InstallTechs. Create a new collection that contains all of the desktop computers. Scope InstallTechs to the new collection.
C. Add the Application Deployment Manager security role to InstallTechs. Create a new collection that contains computers. Add InstallTechs to the local Administrators group on each desktop computer.
D. Assign the Application Administrator security role to InstallTechs. Create a new collection that contains all of the desktop computers. Add InstallTechs to the local Administrators group on each desktop computer.


Answer Clike
What should you do?

You have Windows 7 images that are rebuilt quarterly and sported to System Center 2012 Configuration Manager.
The Microsoft Deployment Toolkit (MDT) 2012 is integrated with Configuration Manager.
You need to reduce the network security risks when the images are deployed by using Operating System Deployment (OSD).
What should you do? (Choose all that Apply.)
A. After the Apply Operating System Image task sequence step, add a step to install software updates offline.
B. Before the Apply Operating System image task sequence step, add a step to install Deployment Imaging Servicing and Management (DISM).
C. After the installation of the final Application, add an Install Software Updates task sequence step.
D. After the Apply Operating System Image task sequence step, add a Run Command line step that runs wuauclt.exe /detectnow
E. Before the Apply Operating System image task sequence step, add a step to install the Windows Automated Installation Kit (Windows AIK).


Answer Clike
What should you recommend?

You deploy Windows 8.1 by using Operating System Deployment (OSD). The deployment task sequence contains steps to install software updates and applications.
The amount of time required to deploy the Windows 8.1 image has increased significantly during the last six months.
You need to recommend a solution to reduce the amount of time it takes to deploy the image.
What should you recommend?
A. Synchronize software updates before deploying the image.
B. Use offline servicing for the image.
C. Create a new automatic deployment rule.
D. Add an additional Install Software Updates step to the deployment task sequence.


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
You deploy a Microsoft Office 2007 package to all client computers by using Configuration Manager.
Your company purchases Office 2010.
You need to ensure that all users can install Office 2010 from the Application Catalog.
What should you do?
A. Deploy a new package for Office 2010.
B. Deploy Office 2010 by using a Group Policy Object (GPO).
C. Update the Office 2007 source file and redeploy the package.
D. Deploy a new Application for Office 2010.


Answer Clike
How should you configure the Default Client Malware Policy?

Your company uses System Center 2012 Configuration Manager with Microsoft Forefront Endpoint Protection integration.
You deploy Forefront Endpoint Protection to all client computers.
The company uses a management Application named App1.
You discover that Forefront Endpoint Protection blocks App1.
You need to ensure that App1 can run.
How should you configure the Default Client Malware Policy? (Each correct answer presents a complete solution. Choose two.)
A. Create a software restriction policy.
B. Add a process exclusion.
C. Add a file location exclusion.
D. Modify the schedule scan settings.
E. Click the Use behavior monitoring check box.


Answer Clike
What should you recommend?

You deploy Windows 7 by using Operating System Deployment (OSD).
The development task sequence contains steps to install software updates and Applications.
The amount of time required to deploy the Windows 7 image has increased significantly during the last six months.
You need to recommend a solution to reduce the amount of time it takes to deploy the image.
What should you recommend?
A. Synchronize software updates before deploying the image.
B. Use offline servicing for the image.
C. Create a new automatic deployment rule.
D. Add an additional Install Software Updates step to the deployment task sequence.
E. Upgrade the image to Windows 7 SP1.


Answer Clike
What should you do?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server 2012. Server2 contains the
Configuration Manager database.
Server2 fails.
You install SQL Server 2012 on a new server. You name the server Server2.
You need to restore the Configuration Manager database to the new server.
What should you do?
A. From Server1, run the Configuration Manager 2012 Setup Wizard.
B. From Server2, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.
C. From Server2, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database and log files.
D. From Server1, run the Site Repair Wizard.


Answer Clike
Which client installation methods should you identify?

Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients.
All of the client computers have Windows Firewall enabled. Windows Firewall is configured to allow File and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center 2012 Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager client to an of the client computers.
Which client installation methods should you identify? (Choose all that Apply.)
A. a logon script installation
B. a manual client installation
C. a software update-based client installation
D. a Client Push Installation
E. an Active Directory Group Policy-based installation


Answer Clike
What should you create?

Your company uses System Center 2012 Configuration Manager to deploy applications.
The company purchases a new application named App1. App1 can be installed only on client computers that run Windows 7.
You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of memory and 300 Gb of free disk space.
What should you create?
A. a Query object
B. custom client user settings
C. a configuration baseline
D. a query-based collection


Answer Clike
What should you review?

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. the Inventoryagent.log file
B. the Colleval.log file
C. the Microsoft SQL Server replication diagnostic files
D. the Despool.log file (or Replmgr.log IN EXAM!)


Answer Clike
Which log file should you review?

Your network contains a System Center 2012 Configuration Manager environment.
You add a software update point to the environment.
You receive a message indicating that SMS WSUS Synchronization failed.
You need to retrieve additional information about the message.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log


Answer Clike
Which log file should you review?

You enable Client Push.
You run Active Directory System Discovery.
You discover that some of the discovered computers do not have the System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) client installed.
You need to identify why Client Push fails on some of the client computers.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log


Answer Clike
Which log file should you review?

Your network contains a System Center 2012 Configuration Management environment.
The network contains 10 database servers that run Microsoft SQL Server 2008.
You have a configuration baseline that is used to monitor database servers.
You confirm that all of the database servers downloaded the configuration baseline.
You discover that a database server named Server1 fails to report any data for the configuration baseline.
You need to identify whether Server 1 evaluates the configuration items that are part of the configuration baseline.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log


Answer Clike
What should you do?

Your network contains a single Active Directory domain.
The domain contains a System Center Configuration Manager 2007 site and a System Center 2012 Configuration Manager site.
You need to ensure that you can migrate objects from Configuration Manager 2007 to Configuration Manager 2012.
What should you do?
A. Assign the computer account of the Central Administration site server permission to the Configuration Manager 2007 site. Assign the computer account of the Central Administration site server permission to the Microsoft SQL Server database instance.
B. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration Manager 2012 primary site.
C. Extend the Active Directory schema and assign the Central Administration site server permissions to the SystemSystem Management container.
D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration Manager 2007 primary site.


Answer Clike
What should you do?

Your network contains an Active Directory forest.
The forest contains a System Center 2012 Configuration Manager environment.
The environment contains one primary site.
You need to ensure that the members of a group named Group1 are allowed to deploy applications to desktop computers.
The solution must minimize the number of permissions assigned to Group1.
What should you do?
A. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
B. Add the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
C. Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.
D. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.


Answer Clike
What should you configure the report to do?

Your network contains a System Center 2012 Configuration Manager environment.
You create a report that lists compliance information.
You schedule the report to run every day at 20:00.
You need to ensure that on Friday, you can review the results of the report created on the previous Monday.
What should you configure the report to do?
A. Use caching.
B. Use a shared schedule.
C. Render on Friday.
D. Use snapshots.


Answer Clike
Which query should you use?

Your network contains a System Center 2012 Configuration Manager environment.
You need to create a collection that contains all of the virtual machines.
Which query should you use?
A. select * from SMS_R_System where SMS_R_System.ResourceID not in (select ResourceID from SMS_R_System where SMS_R_System.IsVirtualMachine != 1)
B. select * from SMS_R_System where SMS_R_System.IsVirtualMachine != 1
C. select * from SMS_R_System where SMS_R_System.IsVirtualMachine = 1
D. select * from SMS_R_System where SMS_R_System.ResourceID not in (select ResourceID from SMS_R_System where SMS_R_System.IsVirtualMachine = 1)


Answer Clike
What should you do?

Your network contains a System Center 2012 Configuration Manager environment.
Two weeks ago, you deployed a Windows Installer package named App1.
You need to remediate a registry value that applies only to the client computers that have App1 installed.
The solution must minimize network traffic.
What should you do?
A. Modify the App1 Windows Installer package to contain the registry setting, and then create a new application for App1.
B. Modify the App1 Windows Installer package to contain the registry setting, and then configure the existing application for App1 to use the new Windows Installer package.
C. Create an application-based configuration item, configure a rule for an existential type, and then import the registry setting from a client computer that has App1 installed.
D. Create an application-based configuration item, configure the detection method to use the Windows Installer product code of App1, and then import the registry setting from a client computer that has App1 installed.


Answer Clike
What should you do?

You network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You have an application named App1.
You need to ensure that users in the finance department can install App1 by using the Application Catalog.
What should you do?
A. Create a required user deployment and target the deployment to all of the finance department users.
B. Create a required user deployment and target the deployment to all of the client computers in the finance department.
C. Create an available user deployment and target the deployment to all of the finance department users.
D. Create an available user deployment and target the deployment to all of the client computers in the finance department.


Answer Clike
What should you do?

You recently migrated from System Center Configuration Manager 2007 to System Center 2012 Configuration Manager.
Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bit version of Windows 7.
Some client computers have the Microsoft Application Virtualization (App-V) client installed.
You have an Application named App1.
You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1.
You need to deploy the Application to all of the client computers.
The solution must minimize the amount of administrative effort.
What should you do?
A. Create a new Application that has three different deployment types and create a target collection for each of the deployment types.
B. Create a new Application that has three different deployment types and configure global conditions for each of the deployment types.
C. Create a new package for each version of App1.
D. Create a new Application for each version of App1.


Answer Clike