administering and deploying system center 2012 ... · from the category drop-down list, ... e....

113
Administering and Deploying System Center 2012 Configuration Manager Number : 70-243 Passing Score : 700 Time Limit : 120 min File Version : 1.9 http:/ /www.gratisexam.com/ This dump is based on previous released dumps, has (hopefully most of) the correct answers with detailed explanations and all the duplicates removed. Good luck! Disclaimer : This dump is provided as is. I do not take any responsibility on the correctness of these answers or whether you pass the test or not. You should study and understand what Microsoft System Center Configuration Manager 2012 is all about. Sections 1. Design and Plan System Center Configuration Manager Infrastructure (13%) 2. Manage Operating System Deployment (OSD) (12%) 3. Deploy Applications and Software Updates (14%) 4. Manage Compliance Settings (11%) 5. Manage Sites (12%) 6. Manage Clients (14%) 7. Manage Inventory (12%) 8. Manage Reports and Queries (12%)

Upload: trankhanh

Post on 04-Sep-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Administering and Deploying System Center 2012 Conf iguration Manager

Number: 70-243Passing Score: 700Time Limit: 120 minFile Version: 1.9

ht t p:/ / w w w .gratisexam.com/

This dump is based on previous released dumps, has (hopefully most of) the correct answers with detailedexplanations and all the duplicates removed.

Good luck!

Disclaimer:

This dump is provided as is. I do not take any responsibility on the correctness of these answers orwhether you pass the test or not.You should study and understand what Microsoft System Center Configuration Manager 2012 is allabout.

Sections1. Design and Plan System Center Configuration Manager Infrastructure (13%)2. Manage Operating System Deployment (OSD) (12%)3. Deploy Applications and Software Updates (14%)4. Manage Compliance Settings (11%)5. Manage Sites (12%)6. Manage Clients (14%)7. Manage Inventory (12%)8. Manage Reports and Queries (12%)

Exam A

QUESTION 1You recently migrated from System Center Configuration Manager 2007 to System Center 2012Configuration Manager.

Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bitversion of Windows 7 . Some client computers have the Microsoft Application Virtualization (App-V) client installed. You have an Application named App1 . You have a 64-bit version of App1 , a 32-bit version of App1 , and a virtual version of App1 . You need to deploy the Application to all of the client compute rs . The solution must minimize the amount of administrative effort .

What should you do?

A. Create a new Application that has three different deployment types and create a target collection foreach of the deployment types.

B. Create a new Application that has three different deployment types and configure global conditions foreach of the deployment types.

C. Create a new package for each version of App1.D. Create a new Application for each version of App1.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer : Create a new Application that has three different deployment types and configure globalconditions for each of the deployment types.

Explanation:http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step2How to Create Deployment Types in Configuration Manager

...Supplemental Procedures to Create a Deployment Type...Step 6: Specify Requirements for the Deployment Type

1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the CreateRequirement dialog box, and add a new requirement.2. From the Category drop-down list, select whether this requirement is for a device or a user, or selectCustom to use a previously created global condition. When you select Custom, you can also clickCreate to create a new global condition. For more information about global conditions, see How toCreate Global Conditions in Configuration Manager.3. From the Condition drop-down list, select the condition that you want to use to assess whether theuser or device meets the installation requirements. The contents of this list will vary depending on theselected category.4. From the Operator drop-down list, choose the operator that will be used to compare the selectedcondition to the specified value to assess whether the user or device meets in the installationrequirement. The available operators will vary depending on the selected condition.5. In the Value field, specify the values that will be used with the selected condition and operatorwhether the user or device meets in the installation requirement. The available values will varydepending on the selected condition and the selected operator.6. Click OK to save the requirement rule and exit the Create Requirement dialog box.7. On the Requirements page of the Create Deployment Type Wizard, click Next.

...

QUESTION 2You have an Application named App1 .

You need to ensure that users in the finance department can install App1 by using the ApplicationCatalog .

What should you do?

A. Create a required user deployment and target the deployment to all of the finance departmentusers .

B. Create a required user deployment and target the deployment to all of the client computers in thefinance department .

C. Create an available user deployment and target the deployment to all of the finance departmentusers .

D. Create an available user deployment and target the deployment to all of the client computers in thefinance department .

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Create an available user deployment and target the deployment to all of the finance departmentusers.

Explanation:By selecting "Available" it will be selectable for the users in the Application Catalog.The "Required" option would force the installation to all users in the finance department.

Further information:http://technet.microsoft.com/en-us/library/gg682082.aspxHow to Deploy Applications in Configuration Manager

To deploy an application...8. On the Deployment Settings page of the Deploy Software Wizard, specify the following information:

* Action – From the drop-down list, choose whether this deployment is intended to Install or Uninstallthe application.* Purpose – From the drop-down list, choose one of the following options:

* Available - If the application is deployed to a user, the user sees the published application in theApplication Catalog and can request it on demand. If the application is deployed to a device, theuser will see it in the Software Center and can install it on demand.* Required - The application is deployed automatically according to the configured schedule.However, a user can track the application deployment status if it is not hidden, and can install theapplication before the deadline by using the Software Center.

...

QUESTION 3Your company uses System Center 2012 Configuration Manager with Microsoft Forefront EndpointProtection integration.

You deploy Forefront Endpoint Protection to all client computers. The company uses a management Application named App1 . You discover that Forefront Endpoint Protection blocks App1 .

You need to ensure that App1 can run.

How should you configure the Default Client Malware Policy ?(Each correct answer presents a complete solution. Choose two.)

A. Create a software restriction policy.B. Add a process exclusion.C. Add a file location exclusion.D. Modify the schedule scan settings.E. Click the Use behavior monitoring check box.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Answer : Add a process exclusion. Add a file location exclusion.

Explanation:http://technet.microsoft.com/en-us/library/hh508785.aspxHow to Create and Deploy Antimalware Policies for Endpoint Protection in Configuration Manager

QUESTION 4Your network contains a System Center 2012 Configuration Manager environment.

You deploy a Microsoft Office 2007 package to all client computers by using Configuration Manager. Your company purchases Office 2010 .

You need to ensure that all users can install Office 20 10 from the Application Catalog .

What should you do?

ht t p:/ / w w w .gratisexam.com/

A. Deploy a new package for Office 2010.B. Deploy Office 2010 by using a Group Policy Object (GPO).C. Update the Office 2007 source file and redeploy the package.

D. Deploy a new Application for Office 2010.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer: Deploy a new Application for Office 2010.

Explanation:http://technet.microsoft.com/en-us/library/gg699369.aspxPackages and Programs in Configuration Manager

Microsoft System Center 2012 Configuration Manager continues to support packages and programs thatwere used in Configuration Manager 2007...You can use Microsoft System Center Configuration Manager Package Conversion Manager to convertpackages and programs into Configuration Manager applications .

Further information:http://technet.microsoft.com/en-us/library/gg682125.aspxIntroduction to Application Management in Configuration Manager

QUESTION 5You deploy Windows 7 by using Operating System Deployment (OSD). The development task sequence contains steps to install software updates and Applications . The amount of time required to deploy the Windows 7 image has increased significantly during the lastsix months.

You need to recommend a solution to reduce the amount o f time it takes to deploy the image .

What should you recommend?

A. Synchronize software updates before deploying the image.B. Use offline servicing for the image.C. Create a new automatic deployment rule.D. Add an additional Install Software Updates step to the deployment task sequence.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer : Use offline servicing for the image.

Explanation:http://blogs.technet.com/b/inside_osd/archive/2011/04/18/configuration-manager-2012-offline-servicing-for-operating-system-images.aspxConfiguration Manager 2012: Offline Servicing for Operating System Images

In Configuration Manager 2012 there is a new feature for applying updates to operating system imageswhile they are in the Configuration Manager library. This means any operating system image you see in theOperating Systems > Operating Systems Images node from the Software Library wunderbar can beupdated with Component Based Servicing (CBS) updates. By updating an image in the Software Libraryinstead of performing a new build and capture of the operating system image you will gain a few distinctadvantages. You will be able to reduce the risk of vulnerabilities during operating system deployments andreduce the overall operating system deployment to the end user. You will also reduce the administrativeeffort to maintain your operating system images.

The feature is applicable for Component Based Servicing (CBS) updates and for the following operatingsystems:

Microsoft Windows Vista SP2 and later Microsoft Windows Server 2008 SP2 and later Microsoft Windows 7 RTM Microsoft Windows 2008 R2

Further information:http://www.windows-noob.com/forums/index.php?/topic/4683-using-sccm-2012-rc-in-a-lab-part-12-updating-an-operating-system-image-using-offline-servicing/using SCCM 2012 RC in a LAB - Part 12. Updating an Operating System image using Offline Servicing.

QUESTION 6You have Windows 7 images that are rebuilt quarterly and sported to System Center 2012 ConfigurationManager. The Microsoft Deployment Toolkit (MDT) 2012 is integrat ed with Configuration Manager.

You need to reduce the network security risks when the images are deployed by using OperatingSystem Deployment (OSD).

What should you do? (Choose all that Apply.)

A. After the Apply Operating System Image task sequence step, add a step to install softwareupdates offline .

B. Before the Apply Operating System image task sequence step, add a step to install DeploymentImaging Servicing and Management (DISM).

C. After the installation of the final Application , add an Install Software Updates task sequence step.D. After the Apply Operating System Image task sequence step, add a Run Command line step that

runs wuauclt.exe /detectnowE. Before the Apply Operating System image task sequence step, add a step to install the Windows

Automated Installation Kit (Windows AIK).

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Answer: After the Apply Operating System Image task sequence step, add a step to install softwareupdates offline. After the installation of the final Application, add an Install Software Updates task sequence step.

Explanation:http://blogs.technet.com/b/inside_osd/archive/2011/04/18/configuration-manager-2012-offline-servicing-for-operating-system-images.aspxConfiguration Manager 2012: Offline Servicing for Operating System Images

In Configuration Manager 2012 there is a new feature for applying updates to operating system imageswhile they are in the Configuration Manager library. This means any operating system image you see in theOperating Systems > Operating Systems Images node from the Software Library wunderbar can beupdated with Component Based Servicing (CBS) updates. By updating an image in the Software Libraryinstead of performing a new build and capture of the operating system image you will gain a few distinctadvantages. You will be able to reduce the risk of vulnerabilities during operating system deployments andreduce the overall operating system deployment to the end user. You will also reduce the administrativeeffort to maintain your operating system images.

The feature is applicable for Component Based Servicing (CBS) updates and for the following operatingsystems:

Microsoft Windows Vista SP2 and later Microsoft Windows Server 2008 SP2 and later Microsoft Windows 7 RTM

Microsoft Windows 2008 R2

http://technet.microsoft.com/en-us/library/hh846237.aspxTask Sequence Steps in Configuration Manager

The following task sequence steps can be added to a System Center 2012 Configuration Manager tasksequence:..

Install Software UpdatesUse the Install Software Updates task sequence step to install software updates on the destinationcomputer. The destination computer is not evaluated for applicable software updates until this tasksequence step runs. At that time, the destination computer is evaluated for software updates like anyother Configuration Manager-managed client. In particular, this step installs only the softwareupdates that are targeted to collections of which the computer is currently a member.

This task sequence step runs only in a standard operating system. It does not run in Windows PE.

Further information:http://technet.microsoft.com/en-us/library/hh824821.aspxDeployment Image Servicing and Management (DISM) Technical Reference

Deployment Image Servicing and Management (DISM) is a command-line tool that is used to mount andservice Windows® images before deployment. You can use DISM image management commands tomount, and get information about, Windows image (.wim) files or virtual hard disks (VHD) and to capture,split, and otherwise manage .wim files.

wuauclt.exe /detectnowThe detectnow switch will force a relatively immediate query to the WSUS server to see if there are anyupdates that are needed. If there are, the yellow shield will appear in the system tray. This is usually prettyquick, within 20-30 seconds.

http://technet.microsoft.com/en-us/library/cc748933%28v=ws.10%29.aspxWindows Automated Installation Kit (Windows AIK)

The Windows Automated Installation Kit (Windows AIK) is designed to help original equipmentmanufacturers (OEMs), system builders, and corporate IT professionals deploy Windows onto newhardware. The Windows AIK is a set of deployment tools supporting the latest release of Windows.

QUESTION 7Your company uses System Center 2012 Configuration Manager to distribute operating system images .

The standard operating system for client computers is Windows 7 Enterprise (x86) . You receive 300 new desktop computers. Each computer has a new storage controller . When you attempt to deploy an existing image to one of the computers, you receive an error messageindicating that a storage device cannot be found during the pre-boo t deployment phase .

You need to ensure that you can deploy Windows 7 to the new computers by using an image .

What should you do?

A. Import the storage drivers to the Drivers container and update the task sequence.B. Create a new x64 boot image and configure the operating system image to use the x64 boot image.C. Create a new driver package and update the task sequence.D. Update the existing x86 boot image to include the storage drivers.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Answer: Update the existing x86 boot image to include the storage drivers.

Explanation:http://technet.microsoft.com/en-us/library/gg712674.aspxPlanning a Device Driver Strategy in Configuration Manager

...Planning a Device Driver Strategy in Configuration Manager

You can add Windows device drivers that have been imported into the driver catalog to boot images.Use the following guidelines when you add device drivers to a boot image:

* Add only mass storage and network adapter device drivers to boot images because other types ofdrivers are not generally required. Drivers that are not required increase the size of the boot imageunnecessarily.* Add only device drivers for Windows 7 to a boot image because the required version of WindowsPE is based on Windows 7.* Ensure that you use the correct device driver for the architecture of the boot image. Do not add anx86 device driver to an x64 boot image.

QUESTION 8Your network contains a System Center 2012 Configuration Manager environment.

You plan to create a Build and Capture task sequence to build a reference image of Windows 7.

You need to identify which Application must exist in Co nfiguration Manager before you can createthe Build and Capture task sequence .

Which Applications should you identify?(Choose all that Apply.)

A. Microsoft Deployment Toolkit (MDT)B. Configuration Manager clientC. System Preparation tool (Sysprep)D. User State Migration Tool (USMT)

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer: Microsoft Deployment Toolkit (MDT)

Explanation:http://technet.microsoft.com/en-us/library/bb633062.aspxHow to Create a Task Sequence to Build and Capture an Operating System Image

You can create task sequence to build and capture operating system image for use with operating systemdeployment using the New Task Sequence Wizard. After you have created the task sequence, you can editthe task sequence by selecting the Task Sequences node and right-clicking on the task sequence you wantto change and selecting Edit to launch the Task Sequence Editor.

Personal comment :My personal opinion is that this question is flawed and other than the Configuration Manager console, youdo not need any special application to create the task.

However, as someone else has stated: You should ALWAYS use MDT for building, capturing and testingyour reference images Tool to capture an image from reference computer. So for all intents and purposes,MDT is the most likely answer to this question:

http://www.windows-noob.com/forums/index.php?/topic/5131-using-sccm- 2012-rc-in-a-lab-part-16-integrating-mdt-2012-rc1-with-configuration-manager-2012/ MDT, Microsoft Deployment Toolkit Install MDT and run Configure Configmgr intergration In ManagementConsole, SW lib, OS, Task Sequence, Create MDT task sequence , choose a template ( client task

sequence), joint Domain, product key, capture custom WIM image or not, create new boot imagepackage, source (AIK must be installed on the source machine), location of new MDT package, OS image,Config Mgr Client, USMT package, Setting package, sysprep. Distribute the MDT package to DP.

Further information:http://technet.microsoft.com/en-us/windows/hh147630Choose the Right Microsoft Deployment Tool

http://technet.microsoft.com/en-US/windows/dd641427.aspx?ocid=wc-tn-acceleratorsDeliver and Deploy Windows 7

http://technet.microsoft.com/en-us/library/bb632585.aspxSample Build and Capture Operating System Image Task Sequence

http://www.windows-noob.com/forums/index.php?/topic/6353-using-system-center-2012-configuration-manager-part-7-build-and-capture-windows-7-x64-sp1/using System Center 2012 Configuration Manager - Part 7. Build and Capture Windows 7 X64 SP1

QUESTION 9You are the network administrator for a company named Contoso, Ltd. The network contains 1,000 desktop computers and 500 servers .

The network contains a System Center 2012 Configuration Manager environment.

The names of all the desktop computers in the human resources department start with the letters HR ,for example HR001 and HR023. A device collection named All Server Devices contains all of the servers. A device collection named All Desktop Devices contains all of the desktop computers. You plan tocreate a new collection named All HR Computers and Servers . The new collection must contain all of the human resources department computers and all of the servers. The collection must not contain any other computers.

You need to create a membership rule for the new collec tion .

Which rule should you include in the membership rule ? (Choose all that Apply.)

A. QUERY RULE: select * from SMS_R_System where SMS_R_system.NetbiosName like "HR%"B. INCLUDE RULE: All Server DevicesC. EXCLUDE RULE: All NON HR ComputersD. EXCLUDE RULE: All Desktop DevicesE. QUERY RULE- select * from SMS_R_System where

SMS_R_system.OperatingSystemNameandVersion like. *%Workstation*F. QUERY RULE- select * from SMS_R_System where

SMS_R_system.OperatingSystemNameandVersion not like. *%Server*

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Answer: QUERY RULE: select * from SMS_R_System where SMS_R_system.NetbiosName like "HR%" INCLUDE RULE: All Server Devices

Explanation: select * from SMS_R_System where SMS_R_system.NetbiosName like "HR%"SQL command to select all Systems whose names begin with HR

INCLUDE RULE: All Server Devices

Selects all the Server Devices as asked in the question.

Further information:http://technet.microsoft.com/en-us/library/gg682177.aspxIntroduction to Collections in Configuration Manager

Collections in System Center 2012 Configuration Manager represent logical groupings of resources, suchas users and devices. You can use collections to help you perform many tasks, such as managingapplications, deploying compliance settings, or installing software updates. You can also use collections tomanage groups of client settings. Additionally, System Center 2012 Configuration Manager uses collections with role-based administration tospecify the collections that an administrative user can access.

Collection RulesDirect RuleQuery Rule

Query rules dynamically update the membership of a collection based on a query that ConfigurationManager runs on a schedule.Unlike direct rule collections, this collection membership automatically updates when you add orremove new users to the Human Resources organizational unit.

Include Collections RuleThe include collections rule lets you include the members of another collection in a ConfigurationManager collection. Configuration Manager updates the membership of the current collection on aschedule if the membership of the included collection changes.

Exclude Collections RuleThe exclude collections rule lets you exclude the members of another collection from a ConfigurationManager collection. Configuration Manager updates the membership of the current collection on aschedule if the membership of the excluded collection changes.Note: If a collection includes both include collection and exclude collection rules and there is aconflict, the exclude rule takes priority over the include rule.

Default Collections in Configuration ManagerAll User GroupsAll UsersAll Users and User GroupsAll Mobile DevicesAll SystemsAll Unknown Computers

QUESTION 10Your network contains a System Center 2012 Configuration Manager environment.

Three users named User1, User2, and User3 will perform the following tasks:· User1 will review software metering data and inventory reports .· User2 will deploy Applications and create alerts .· User3 will create configuration items .

You need to identify which security role must be assign ed to which user .

What should you identify? To answer, drag the appropriate security role to the correct user in the answer area. Each security role may be used once, more than once, at all. Additionally, you may need to drag the splitbar between panes or scroll to view content.

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Answer:User1 will review software metering data and inventory reports --> Asset ManagerUser2 will deploy Applications and create alerts --> Application Deployment ManagerUser3 will create configuration items ---> Compliance Settings Manager

Explanation:http://technet.microsoft.com/en-us/library/hh524341.aspxGlossary for Microsoft System Center 2012 Configuration Manager..

Application Deployment Manager - A security role that grants permissions to administrative users sothat they can deploy and monitor applications.Asset Manager - A security role that grants permissions to administrative users so that they canmanage the Asset Intelligence synchronization point, Asset Intelligence reporting classes, softwareinventory, hardware inventory, and metering rules.Compliance Settings Manager - A security role that grants permissions to administrative users so thatthey can define and monitor compliance settings.

QUESTION 11Your network contains a System Center 2012 Configuration Manager environment.

The Client Status node in the Configuration Manager console shows a downward trend in client health . You verify the logs on several clients. You discover that the clients are healthy and are communicatingnormally to management points.

You need to identify the reasons why the Configuration Manager console displays a downwardtrend in client health .

Which reasons should you identify? (Choose all that Apply.)

A. In Client Status Settings Properties, the Heartbeat discovery during the following days interval is shorterthan the Heartbeat Discovery interval.

B. The age set in the Delete Aged Discovery Data maintenance task is shorter than the Heartbeat

Discovery interval.C. The Delete Obsolete Client Discovery Data maintenance task is disabled.D. The Active Directory sites that are members of boundary groups are modified.E. Microsoft SQL Server replication to the management points stopped.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Answer : The age set in the Delete Aged Discovery Data maintenance task is shorter than the HeartbeatDiscovery interval. The Active Directory sites that are members of boundary groups are modified.

Explanation :http://technet.microsoft.com/en-us/library/gg712308.aspx#BKMK_HeartbeatDiscPlanning for Discovery in Configuration Manager - About Heartbeat Discovery

Heartbeat Discovery differs from other Configuration Manager discovery methods. It is enabled by defaultand runs on each computer client to create a discovery data record (DDR). ..Heartbeat Discovery runs either on a schedule configured for all clients in the hierarchy, or if manuallyinvoked, on a specific client by running the Discovery Data Collection Cycle on the Action tab in a client’sConfiguration Manager program. When Heartbeat Discovery runs, it creates a discovery data record (DDR)that contains the client’s current information including network location, NetBIOS name, and operationalstatus details. It is a small file, about 1KB, which is copied to a management point, and then processed by aprimary site. The submission of a Heartbeat Discovery DDR can maintain an active client’s record in thedatabase, and also force discovery of an active client that might have been removed from the database, orthat has been manually installed and not discovered by another discovery method...The default schedule for Heartbeat Discovery is set to every 7 days. If you change the heartbeatdiscovery interval, ensure that it runs more freque ntly than the site maintenance task Delete AgedDiscovery Data , which deletes inactive client records from the site database. You can configure the DeleteAged Discovery Data task only for primary sites.

http://technet.microsoft.com/en-us/library/gg712679.aspxPlanning for Boundaries and Boundary Groups in Configuration Manager

In System Center 2012 Configuration Manager, a boundary is a network location on the intranet that cancontain one or more devices that you want to manage. Boundaries can be an IP subnet, Active Directorysite name, IPv6 Prefix, or an IP address range, and the hierarchy can include any combination of theseboundary types. To use a boundary, you must add the boundary to one or more boundary groups. Boundarygroups are collections of boundaries. By using boundary groups, clients on the intranet can find anassigned site and locate content when they have to install software, such as applications, software updates,and operating system images.

When clients are on the Internet, or they are configured as Internet-only clients, they do not use boundaryinformation. These clients cannot use automatic site assignment and always download content from anydistribution point in their assigned site when the distribution point is configured to allow client connectionsfrom the Internet. ...Site AssignmentYou can configure each boundary group with an assigned site for clients. Clients join the assigned site of aboundary group that contains the client’s current network location. When a boundary is added to multipleboundary groups that have different assigned sites, clients will nondeterministically select one of the sites.System Center 2012 Configuration Manager does not support this overlapping boundary configuration forsite assignment.

If you make a change to the site assignment configuration of a boundary group, only new site assignmentactions are affected. Clients that have previously been assigned to a site, do not re-evaluate their siteassignment based on changes to the configuration of a boundary group.

Further information :

http://technet.microsoft.com/en-us/library/bb632879.aspxDelete Obsolete Client Discovery Data Task Overview

The Delete Obsolete Client Discovery Data task deletes obsolete client records from the ConfigurationManager 2007 site database. A record that is marked obsolete typically was superseded by a newer recordfor the same client. The newer record becomes the client's current record, and the older record becomesobsolete.

When you enable this task, you should configure the schedule to run at an interval greater than theheartbeat discovery schedule. This allows clients to send Discovery Data Records (DDRs) so that theobsolete bit is set correctly.

http://technet.microsoft.com/en-us/library/gg682132.aspx#BKMK_ClientHealthIntroduction to Client Deployment in Configuration Manager - Monitoring the Status of Client Computers inConfiguration Manager

Use the Client Status node in the Monitoring workspace of the Configuration Manager console to monitorthe health and activity of client computers in your hierarchy. Configuration Manager uses the following twomethods to evaluate the overall status of client computers.Client Activity: You can configure thresholds to determine whether a client is active, for example:

Whether the client requested policy during the last seven days.Whether Heartbeat Discovery found the client during the last seven days.Whether the client sent hardware inventory during the last seven days.

When all these thresholds are exceeded, the client is determined to be inactive.Client Check: A client evaluation engine is installed with the Configuration Manager client, which periodicallyevaluates the health of the Configuration Manager client and its dependencies. This engine can check orremediate some problems with the Configuration Manager client...Client status uses the monitoring and reporting capabilities of Configuration Manager to provide informationin the Configuration Manager console about the health and activity of the client. You can configure alerts tonotify you when clients check results or client activity drops below a specified percentage of clients in acollection or when remediation fails on a specified percentage of clients.

QUESTION 12Your network contains a System Center 2012 Configuration Manager environment.

The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2 . You discover that none of the packages created on Site1 are displayed in Site2 .

You need to identify whether there is a replication iss ue between the sites .

What should you review?

A. the Inventoryagent.log fileB. the Rcmctrl.log fileC. the Microsoft SQL Server replication diagnostic filesD. the Despool.log file

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer: the Rcmctrl.log file

Explanation:http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_SiteSiteServerLogTechnical Reference for Log Files in Configuration Manager - Site Server and Site System Server Logsrcmctrl.log :

Site server log fileRecords the activities of database replication between sites in the hierarchy.

Further information 1 :http://blogs.technet.com/b/sudheesn/archive/2012/10/21/drs-initialization-in-configuration-manager-2012.aspxDRS Initialization In Configuration Manager 2012 ...We have two kind of logging in ConfigMgr 2012. For DRS initialization we can use the rcmctrl.log andinside the database vlogs view. ...

http://anoopcnair.com/2012/06/20/sccm-configmgr-2012-site-to-site-replication-sql-data-replication-service-replication-configuration-management-sql-service-broker-replication-groups-and-manual-sync/SCCM ConfigMgr 2012 Site to Site replication and SQL Replication Guide

New (SQL) site to site replication model is the most challenging but very interesting part (at least for me) ofSystem Center 2012 Configuration Manager. So, I thought of sharing the some points which are mainpillars of SQL replication model.Key components of new (SQL) replication model 1. DRS – Data Replication Service2. SSB – SQL Service Broker3. RCM – Replication Configuration Management/Monitoring4. RG – Replication Group5. Replication Pattern6. Article Name/s

DRS – Data Replication Service / SSB – SQL Service BrokerTo replicate the data between configmgr sites, Conf iguration Manager uses Database ReplicationService (DRS). The DRS intern uses SQL Server Service Broker (SSB) to replicate data between the sites.

http://blogs.technet.com/b/server-cloud/archive/2012/03/06/data-replication-in-system-center-2012-configuration-manager.aspxData Replication in System Center 2012 Configuration Manager

http://technet.microsoft.com/en-us/library/gg712701.aspx#Planning_Inter_Site_ComPlanning for Communications in Configuration Manager - Planning for Intersite Communications inConfiguration Manager

Further information 2 :http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_DiscoveryLogTechnical Reference for Log Files in Configuration Manager - DiscoveryInventoryAgent.log :

Client log fileRecords activities of hardware inventory, software inventory, and heartbeat discovery actions on theclient.

http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_SiteSiteServerLogTechnical Reference for Log Files in Configuration Manager - Site Server and Site System Server LogsDespool.log

Site server log fileRecords incoming site-to-site communication transfers.

QUESTION 13Your network contains two Active Directory forests named contoso.com and litwareinc.com .

You implement System Center 2012 Configuration Manager in the contoso.com forest. You deploy the Configuration Manager client to all of the client computers in contoso.com by using a logonscript.

You need to ensure that the Configuration Manager clie nt is automatically deployed to all of the

client computers in the litwareinc.com forest.

What should you do? (Choose all that Apply.)

A. Configure a Client Push Installation account.B. Enable Client Push installation.C. Enable Active Directory System Discovery.D. Configure an administrative user.E. Enable Active Directory Forest Discovery.

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:Answer: Configure a Client Push Installation account. Enable Client Push installation. Enable Active Directory System Discovery.

Explanation:http://technet.microsoft.com/en-us/library/gg682042.aspx#BKMK_prereqs_computersPrerequisites for Windows Client Deployment in Configuration Manager - Prerequisites for ComputerClients

Installation Method DependenciesClient push installation:

Client push installation accounts are used to connect to computers to install the client and arespecified on the Accounts tab of the Client Push Installation Properties dialog box. The account must bea member of the local administrators group on the destination computer.

If you do not specify a client push installation account , the site server computer account will beused.

The computer on which you are installing the client must have been discovered by at least oneSystem Center 2012 Configuration Manager discovery method.The computer has an ADMIN$ share.Enable client push installation to assigned resources must be selected in the Client Push InstallationProperties dialog box if you want to automatically push the System Center 2012 Configuration Managerclient to discovered resources.The client computer must be able to contact a distribution point or a management point to download thesupporting files.

You must have the following security permissions to install the Configuration Manager client by using clientpush:

To configure the Client Push Installation account: Modify and Read permission for the Site object. To use client push to install the client to collections, devices and queries: Modify Resource and Readpermission for the Collection object.

The Infrastructure Administrator security role includes the required permissions to manage client pushinstallation.

Further information:http://blogs.technet.com/b/configmgrteam/archive/2011/03/30/active-directory-forest-discovery-and-publishing-in-configuration-manager-2012-beta-2.aspxActive Directory Forest Discovery and Publishing in Configuration Manager 2012 Beta 2Forest Discovery and Publishing Overview

To improve manageability of an ever-changing network environment, Active Directory Forest Discovery isadded in Configuration Manager 2012 Beta 2. With it, Configuration Manager can discover Active Directoryforests, their domains, AD Sites and IP subnets. Because domain users (or domain computer accounts)have permission to query forest relationships, Active Directory Forest Discovery can return informationabout other forests and their trust direction. The system can programmatically connect to all the forests andbuild a complete mapping of the corporate environment. It can also cross forest boundaries using specificcredentials for each forest regardless of the trust type. The information obtained through Active DirectoryForest Discovery can be directly exported as boundaries or boundary groups. Changes to discovered data

are updated dynamically and aged out from the database if no longer present in Active Directory DomainServices. The discovered data is also used when clients request a management point or distribution point toensure they receive the best possible site system.

http://technet.microsoft.com/en-us/library/gg712308.aspx#BKMK_DiscoveryMethodsPlanning for Discovery in Configuration ManagerDiscovery Methods in Configuration Manager

http://technet.microsoft.com/en-us/library/gg682132.aspx#BKMK_DeployClientComputersIntroduction to Client Deployment in Configuration Manager - Deploying the Configuration Manager Client toWindows-Based Computers

The following table lists the various methods that you can use to install the Configuration Manager clientsoftware on computers:

Client push installation - Automatically installs the client to assigned resources and manually installsthe client to resources that are not assigned.Software update point installation - Installs the client by using the Configuration Manager softwareupdates feature.Group Policy installation - Installs the client by using Windows Group Policy.Logon script installation - Installs the client by using a logon script.Manual installation - Manually installs the client software.Upgrade installation by using application management - Upgrades clients to a newer version by usingConfiguration Manager application management. You can also use Configuration Manager 2007software distribution to upgrade clients to System Center 2012 Configuration Manager.Automatic client upgradeClient imaging - Prestages the client installation in an operating system image.

QUESTION 14Your network contains a System Center 2012 Configuration Manager environment.

The environment contains a single primary site .

You need to provide users with the ability to remotely reset their mobile device to the factorysettings .

What should you install?

A. Application Catalog web service point and Application Catalog website pointB. Out of Band service point and Application Catalog web service pointC. Device management point and System Health validator pointD. System Health Validator point and Application Catalog website point

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer: Application Catalog web service point and Application Catalog website point

Explanation:http://technet.microsoft.com/en-us/library/gg682125.aspxIntroduction to Application Management in Configuration Manager

Application management in Microsoft System Center 2012 Configuration Manager provides bothConfiguration Manager administrative users and Configuration Manager client device users the tools tomanage applications in the enterprise. ...For client device users, the benefits of application management include the following:

A new client program, Software Center, provides a user-friendly interface that lets the user of aWindows client computer perform typical tasks to help manage software that Configuration Managerinstalls on their devices.A self-service application website, the Application Catalog, lets users search for, install, and requestWindows applications. Users who have mobile devices can also use this web site to wipe theirmobile devices .Users can configure when software and updates must not be installed by specifying their own workinghours.

http://technet.microsoft.com/en-us/library/gg682145.aspxPrerequisites for Application Management in Configuration Manager

Configuration Manager DependenciesThe following table lists the dependencies within Configuration Manager for application management:

Management pointDistribution pointClient settingsFor the Application Catalog: Discovered user accountsApp-V 4.6 SP1 or later client to run virtual applicationsApplication Catalog web service point

The Application Catalog web service point is a site system role that provides information aboutavailable software from the Software Library to the Application Catalog website.

Application Catalog website pointThe Application Catalog website point is a site system role that provides users with a list of availablesoftware.

Reporting services pointSecurity permissions for application management

Further information:

http://technet.microsoft.com/en-us/library/gg682076.aspxIntroduction to Out of Band Management in Configuration Manager

Out of band management in System Center 2012 Configuration Manager provides a powerful managementcontrol for computers that have the Intel vPro chip set and a version of Intel Active ManagementTechnology (Intel AMT) that Configuration Manager supports.

Out of band management lets an administrative user connect to a computer's AMT management controllerwhen the computer is turned off, in hibernation, or otherwise unresponsive through the operating system. Incontrast, in-band management is the classic approach that Configuration Manager and its predecessorsuse, whereby an agent runs in the full operating system on the managed computer, and the managementcontroller accomplishes tasks by communicating with the management agent.

http://technet.microsoft.com/en-us/library/bb680491.aspxHow to Enable a Mobile Device Management Point

The Configuration Manager device management point is an extension to the Configuration Manager 2007management point or proxy management point. The device management point allows mobile devices toconnect to Configuration Manager 2007 servers and receive policy and configuration settings. Mobiledevice management also allows mobile devices to report asset management information and status toConfiguration Manager.

http://technet.microsoft.com/en-us/library/gg682106.aspxFundamentals of Configuration Manager

QUESTION 15Your network contains a Windows Server Update Services (WSUS) server .

All client computers are configured as WSUS clients . All of the client computers have Windows Firewall enabled . Windows Firewall is configured to block File and Printer Sharing . Users are not configured as local Administrators on their client computers.

You deploy System Center 2012 Configuration Manager.

You need to identify which methods you can use to deplo y the Configuration Manager client to all ofthe client computers .

Which client installation methods should you identify? (Choose all that Apply.)

A. a logon script installationB. a manual client installationC. a software update-based client installationD. a Client Push InstallationE. an Active Directory Group Policy-based installation

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer: a software update-based client installation

Explanation:The Logon script runs with the user's credentials.Manual installation also runs with the user's credentials.Software update point uses the Local System account and All client computers are configured as WSUSclients. So the firewall should not affect functionality.Client Push Installation requires File and Printer Sharing.Group Policy Installation requires File and Printer Sharing.

Further information 1:http://technet.microsoft.com/en-us/library/cc787076%28v=ws.10%29.aspxFile and Printer Sharing Does Not Work

File and printer sharing can fail when you turn on Windows Firewall because file and printer sharingrequires your computer to respond to unsolicited incoming traffic on one or more of the following ports: TCP ports 139 and 445and UDP ports 137 and 138Windows Firewall blocks incoming traffic through these ports.

http://technet.microsoft.com/en-us/library/gg682180.aspxWindows Firewall and Port Settings for Client Computers in Configuration Manager

Ports that are used for all installation methodsTCP 80 - Hypertext Transfer Protocol (HTTP) from the client computer to a fallback status point, when afallback status point is assigned to the client.

Ports that are used with client push installation

TCP 445 - Server Message Block (SMB) between the site server and client computer.TCP 135 + UDP 135 - endpoint mapper between the site server and the client computer.TCP DYNAMIC - dynamic ports between the site server and the client computer.TCP 80 - Hypertext Transfer Protocol (HTTP) from the client computer to a management point when theconnection is over HTTP.TCP 443 - Secure Hypertext Transfer Protocol (HTTPS) from the client computer to a management pointwhen the connection is over HTTPS.

Ports that are used with software update point-based installationTCP 80 or 8530 - Hypertext Transfer Protocol (HTTP) from the client computer to the software updatepoint.TCP 443 or 8531 - Secure Hypertext Transfer Protocol (HTTPS) from the client computer to the softwareupdate point.TCP 445 - Server Message Block (SMB) between the source server and the client computer when youspecify the CCMSetup command-line property /source:<Path>.

Ports that are used with Group Policy-based installationTCP 80 - Hypertext Transfer Protocol (HTTP) from the client computer to a management point when theconnection is over HTTP.TCP 443 - Secure Hypertext Transfer Protocol (HTTPS) from the client computer to a management pointwhen the connection is over HTTPS.TCP 445 - Server Message Block (SMB) between the source server and the client computer when youspecify the CCMSetup command-line property /source:<Path>.

Ports that are used with manual installation and logon script-based installa tionTCP 445 - Server Message Block (SMB) between the client computer and a network share from whichyou run CCMSetup.exe.

Note: When you install System Center 2012 Configuration Manager, the client installationsource files are copied and automatically shared from the <InstallationPath>\Client folder onmanagement points. However, you can copy these files and create a new share on anycomputer on the network. Alternatively, you can eliminate this network traffic by runningCCMSetup.exe locally, for example, by using removable media.

TCP 80 - Hypertext Transfer Protocol (HTTP) from the client computer to a management point when theconnection is over HTTP.TCP 443 - Secure Hypertext Transfer Protocol (HTTPS) from the client computer to a management pointwhen the connection is over HTTPS.TCP 445 - Server Message Block (SMB) between the source server and the client computer when youspecify the CCMSetup command-line property /source:<Path>.

Ports that are used with software distribution-based installationTCP 445 - Server Message Block (SMB) between the site server and client computer.TCP 80 - Hypertext Transfer Protocol (HTTP) from the client computer to a management point when theconnection is over HTTP.TCP 443 - Secure Hypertext Transfer Protocol (HTTPS) from the client computer to a management pointwhen the connection is over HTTPS.

Further information 2:http://technet.microsoft.com/en-us/library/gg682180.aspxWindows Firewall and Port Settings for Client Computers in Configuration ManagerPrograms and Ports that Configuration Manager Requires

Client Push InstallationTo use client push to install the System Center 2012 Configuration Manager client, add the following asexceptions to the Windows Firewall:

Outbound and inbound: File and Printer SharingInbound: Windows Management Instrumentation (WMI)

Client Installation by Using Group PolicyTo use Group Policy to install the Configuration Manager client, add File and Printer Sharing as anexception to the Windows Firewall.

Further information 3:

http://technet.microsoft.com/en-us/library/gg682191.aspxDetermine the Client Installation Method to Use for Windows Computers in Configuration Manager

The following table outlines the advantages and disadvantages of each client installation method to helpyou determine which will work best in your organization:

Client push installationCan be used to install the client on a single computer, a collection of computers, or to the resultsfrom a query.Can be used to automatically install the client on all discovered computers.Automatically uses client installation properties defined on the Client tab in the Client PushInstallation Properties dialog box.

Can cause high network traffic when pushing to large collections.Can only be used on computers that have been discovered by System Center 2012 ConfigurationManager.Cannot be used to install clients in a workgroup.A client push installation account must be specified that has administrative rights to the intendedclient computer.Windows Firewall must be configured on client computers with exceptions so that client pushinstallation can be completed.You cannot cancel client push installation. When you use this client installation method for a site,Configuration Manager tries to install the client on all discovered resources and retries any failuresfor up to 7 days.

Software update point-based installationCan use your existing software updates infrastructure to manage the client software.Can automatically install the client software on new computers if Windows Server Update Services(WSUS) and Group Policy settings in Active Directory Domain Services are configured correctly.Does not require computers to be discovered before the client can be installed.Computers can read client installation properties that have been published to Active DirectoryDomain Services.Will reinstall the client software if it is removed.Does not require you to configure and maintain an installation account for the intended clientcomputer.

Requires a functioning software updates infrastructure as a prerequisite.Must use the same server for client installation and software updates, and this server must reside ina primary site.To install new clients, you must configure an Group Policy Object (GDO) in Active Directory DomainServices with the client's active software update point and port.If the Active Directory schema is not extended for System Center 2012 Configuration Manager, youmust use Group Policy settings to provision computers with client installation properties.

Group Policy installationDoes not require computers to be discovered before the client can be installed.Can be used for new client installations or for upgrades.Computers can read client installation properties that have been published to Active DirectoryDomain Services.Does not require you to configure and maintain an installation account for the intended clientcomputer.

Can cause high network traffic if a large number of clients are being installed.If the Active Directory schema is not extended for System Center 2012 Configuration Manager, youmust use Group Policy settings to add client installation properties to computers in your site.

Logon script installationDoes not require computers to be discovered before the client can be installed.Supports using command-line properties for CCMSetup.

Can cause high network traffic if a large number of clients are being installed over a short timeperiod.Can take a long time to install on all client computers if users do not frequently log on to the network.

Manual installationDoes not require computers to be discovered before the client can be installed.

Can be useful for testing purposes.Supports using command-line properties for CCMSetup.

No automation, therefore time consuming.

QUESTION 16Your network contains a System Center 2012 Configuration Manager environment.

You create a collection named All Managed Servers . You need to inventory the environment variables of the All Managed Servers collection.

What should you do?To answer, move the four appropriate actions from the List of Actions to the Answer Area and arrange.

Build List and Reorder:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Answer: 1. Create a custom client device setting named Env. 2. In the Env custom setting, select Hardware Inventory. 3. In the Env custom setting, select Environment (Win32_Environment). 4. Deploy the Env custom setting to the All Managed Servers collection.

Explanation:http://technet.microsoft.com/en-us/library/gg712290.aspxHow to Extend Hardware Inventory in Configuration Manager

System Center 2012 Configuration Manager hardware inventory reads information about devices by using

Windows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-basedEnterprise Management (WBEM), which is an industry standard for accessing management information inan enterprise environment. In previous versions of Configuration Manager, you could extend hardware inventory by modifying the filesms_def.mof on the site server. ..In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did inConfiguration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes tocollect by hardware inventory by using client settings. Configuration Manager provides the followingmethods to extend hardware inventory:

Enable or disable existing inventory classes - You can enable or disable the default inventory classesused by Configuration Manager or you can create custom client settings that allow you to collectdifferent hardware inventory classes from specified collections of clients. Add a new inventory class - You can add a new inventory class from the WMI namespace ofanother device. Import and export hardware inventory classes - You can import and export Managed Object Format(MOF) files that contain inventory classes from the Configuration Manager console. Create NOIDMIF Files - Use NOIDMIF files to collect information about client devices that cannot beinventoried by Configuration Manager.Create IDMIF Files - Use IDMIF files to collect information about assets in your organization that arenot associated with a Configuration Manager client, for example, projectors, photocopiers and networkprinters.

http://msdn.microsoft.com/en-us/library/windows/desktop/aa394143%28v=vs.85%29.aspxWin32_Environment class (Windows)

The Win32_Environment�WMI class represents an environment or system environment setting on aWindows computer system. Querying this class returns environment variables found in:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Sessionmanager\EnvironmentandHKEY_USERS\<user>\Environment

QUESTION 17Your network contains a single Active Directory domain . The functional level of the domain is Server 2003. The domain contains the following server:· Ten servers that run Windows Server 2003· Twenty servers that run Windows Server 2008· One server that has Microsoft Exchange Server 2007 installed · One server that has System Center 2012 Configuration Manager installed

Users have mobile devices that run Windows Mobile 6.5 and Windows Phone .

You need to ensure that you can manage the settings of the mobile devices and perform remotedevice wipes by using Configuration Manager .

What should you do?

A. Upgrade the Exchange server to Exchange Server 2010. Configure an Exchange connector.B. Change the functional level of the domain to windows 2008. Upgrade the Exchange server to Exchange

Server 2010.C. Upgrade all Windows 2003 domain controllers to Windows 2008.D. Upgrade all of the domain controllers to Windows 2008 R2. Configure an Exchange connector.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer: Upgrade the Exchange server to Exchange Server 2010. Configure an Exchange connector.

Explanation:

http://technet.microsoft.com/en-us/library/gg682077.aspx#BKMK_SupConfigMobileClientReqSupported Configurations for Configuration Manager - Configuration Manager System Requirements -Mobile Device Requirements

The following sections describe the hardware and operating systems that are supported for managingmobile devices in System Center 2012 Configuration Manager:

Windows Mobile 6.1Windows Mobile 6.5Nokia Symbian BelleWindows Phone 8Windows RTiOSAndroidWindows CE 5.0 (Arm and x86 processors) Windows CE 6.0 (Arm and x86 processors) Windows CE 7.0 (Arm and x86 processors) Windows CE 7.0 (Arm and x86 processors)

Mobile Device Support by Using the Exchange Server ConnectorSystem Center 2012 Configuration Manager offers limited management for mobile devices when you usethe Exchange Server connector for Exchange Active Sync (EAS) capable devices that connect to a serverrunning Exchange Server or Exchange Online.

The following table lists the platforms that support the Exchange Server connector and which versions ofConfiguration Manager support each platform:

Exchange Server 2010 SP1 Configuration Manager with no service packConfiguration Manager with SP1

Exchange Server 2010 SP2Configuration Manager with SP1

Exchange Server 2013Configuration Manager with SP1

Exchange Online (Office 365)Configuration Manager with no service packConfiguration Manager with SP1

http://technet.microsoft.com/en-us/library/gg682022.aspxDetermine How to Manage Mobile Devices in Configuration Manager

Use the following information to help you decide how to manage mobile devices in System Center 2012Configuration Manager. You can use Configuration Manager to enroll mobile devices and install theConfiguration Manager client, you can use the mobile device legacy client (for example, for Windows CEmobile operating systems), and you can use the Exchange Server connector. In addition, in ConfigurationManager SP1, you can enroll devices that run Windows Phone 8, Windows RT, and iOS by using theWindows Intune connector...Settings:

Enrollment by Windows Intune Enrollment by Configuration Manager Exchange Server connector

..Remote wipe:

Enrollment by Windows Intune Enrollment by Configuration Manager Exchange Server connector

QUESTION 18Your network contains a System Center 2012 Configuration Manager environment.

You need to change the organization name displayed by Configuration Manager .

Which settings should you modify from the Configuration Manager console?

A. Client PolicyB. Computer AgentC. User and Device AffinityD. Compliance Settings

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer: Computer Agent

Explanation:

Administration -> Client Settings -> Default Client Settings -> Computer Agent

QUESTION 19Your network contains a System Center 2012 Configuration Manager environment.

Software Inventory and Hardware Inventory are enabled for all of the client computers. All of the client computers have an Application named App1 installed. App1 saves files to the C:\ABC folder. All of the files saved by App1 have a file name extension of .abc. You configure Software Inventory to inventory all of the files that have the .abc extension and the .exeextension. After six months, you discover that some of the client computers failed to inventory .a bc files . All of theclient computers inventory .exe files.

You need to ensure that the .abc files are inventoried .

What should you do?

A. Modify C:\Program Files\App1\NO_SMS_On_Drive.sms.B. Delete C:\Program Files\App1\NO_SMS_On_Drive.sms.C. Modify C:\ABC\Skpswi.dat.D. Delete C:\ABC\Skpswi.dat.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer: Delete C:\ABC\Skpswi.dat.

Explanation: http://technet.microsoft.com/en-us/library/hh691018.aspxHow to Exclude Folders from Software Inventory in Configuration Manager

You can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude itfrom System Center 2012 Configuration Manager software inventory. You can also place this file in the rootof any folder structure you want to exclude from software inventory. This procedure can be used to disablesoftware inventory on a single workstation or server client, such as a large file server.

Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive onthe client computer.

QUESTION 20Your network contains a System Center 2012 Configuration Manager environment.

In Default Client Agent Settings, you enable Hardware Inventory and Software Inventory . You discover that a group of client computers fails to report software inventory data . The client computers report hardware inventory data . You confirm that Configuration Manager can deploy Applications to the group of client comp uters .

You need to identify what is causing the reporting issu e.

Which log files should you review? (Choose all that Apply.)

A. Filesystemfile.logB. Dataldr.logC. Mp_sinv.logD. Inventoryagent.logE. Hman.log

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Answer: Dataldr.log Inventoryagent.log

Explanation: http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

Configuration Manager Site Server Log Files - Site Server and Site System Server Logsdataldr.log

Site server log fileRecords information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database.

Configuration Manager Client Logs - Client OperationsInventoryagent.log

Client log fileRecords activities of hardware inventory, software inventory, and heartbeat discovery actions on theclient.

Further information: Configuration Manager Client Logs - Client OperationsFileSystemFile.log

Client log fileRecords the activity of the Windows Management Instrumentation (WMI) provider for softwareinventory and file collection.

Management Point Logs FilesMp_sinv.log

Site system server log fileRecords details about the conversion of XML software inventory records from clients and the copy ofthose files to the site server.

Configuration Manager Site Server Log Files - Site Server and Site System Server LogsHman.log

Site server log fileRecords information about site configuration changes, and the publishing of site information in ActiveDirectory Domain Services.

QUESTION 21Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment.

The network contains 10 database servers that run Microsoft SQL Server 2008. You have a configuration baseline that is used to monitor the database servers . You add new configuration items to the configuration baseline. Two days later, you discover that only eight of the database servers report any information about thenew configuration items.

You need to identify whether the new configuration item s downloaded to the database servers .

Which log file should you review?

A. Hman.logB. Sitestat.logC. Dcmagent.logD. Wsyncmgr.logE. Ccm.logF. Contenttransfermanager.log

G. Sdmagent.logH. Rcmctrl.logI. Ciagent.logJ. Smsexec.logK. Locationservices.log

Correct Answer: ISection: (none)Explanation

Explanation/Reference:Answer : Ciagent.log

Explanation : http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

Ciagent.logClient log fileRecords details about the process of remediation and compliance for compliance settings, softwareupdates, and application management.

Further information:hman.log

Site server log fileRecords information about site configuration changes, and the publishing of site information in ActiveDirectory Domain Services.

Sitestat.logSite server log fileRecords the availability and disk space monitoring process of all site systems.

DCMAgent.logClient log fileRecords high-level information about the evaluation, conflict reporting, and remediation ofconfiguration items and applications.

wsyncmgr.logSite server log fileRecords details about the software updates synchronization process.

Ccm.logSite server log fileRecords client push installation activities.

ContentTransferManager.logClient log fileSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB)to download or to access packages.

Sdmagent.logClient log fileRecords details about tracking of remediation and compliance. However, the software updates logfile, Updateshandler.log, provides more informative details about installing the software updatesrequired for compliance.

Rcmctrl.logSite server log fileRecords the activities of database replication between sites in the hierarchy.

Smsexec.logSite server or site system server log fiel

Records the processing of all site server component threads.

Locationservices.logClient log fileRecords the client activity for locating management points, software update points, and distributionpoints.

QUESTION 22Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

You create a deployment to install Microsoft Office 2010. The deployment targets 5,000 client computers on the network. Two weeks after you create the deployment, you discover that Office 2010 fails to install on a clientcomputer named Computer 1 .

You need to identify whether Computer1 started downloading the Application of Office 2010 .

Which log file should you review?

A. Locationservices.logB. Ccm.logC. Sdmagent.logD. Sitestat.logE. Rcmctrl.logF. Dcmagent.logG. Contenttransfermanager.logH. Smsexec.logI. Wsyncmgr.logJ. Ciagent.logK. Hman.tog

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Answer :Contenttransfermanager.log

Explanation : http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

ContentTransferManager.logClient log fileSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB)to download or to access packages.

Further information:hman.log

Site server log fileRecords information about site configuration changes, and the publishing of site information in ActiveDirectory Domain Services.

Sitestat.logSite server log fileRecords the availability and disk space monitoring process of all site systems.

DCMAgent.logClient log file

Records high-level information about the evaluation, conflict reporting, and remediation ofconfiguration items and applications.

wsyncmgr.logSite server log fileRecords details about the software updates synchronization process.

Ccm.logSite server log fileRecords client push installation activities.

Sdmagent.logClient log fileRecords details about tracking of remediation and compliance. However, the software updates logfile, Updateshandler.log, provides more informative details about installing the software updatesrequired for compliance.

Rcmctrl.logSite server log fileRecords the activities of database replication between sites in the hierarchy.

Ciagent.logClient log fileRecords details about the process of remediation and compliance for compliance settings, softwareupdates, and application management.

Smsexec.logSite server or site system server log fielRecords the processing of all site server component threads.

Locationservices.logClient log fileRecords the client activity for locating management points, software update points, and distributionpoints.

QUESTION 23Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Management environment.

The environment contains a Central Administration site and two primary child sites named Child1 andChild2 . You create a new Application on the Central Administra tion site . You view the new Application on Child1, but the new Application fails to appear on Child2 .

You need to identify whether the Application transferred to Chi ld2 .

Which log file should you review?

A. Locationservices.logB. Smsexec.logC. Ccm.logD. Sdmagent.logE. Dcmagent.logF. Rcmctrl.logG. Wsyncmgr.logH. Ciagent.logI. Hman.logJ. Contenttransfermanager.logK. Sitestat.log

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Answer : Rcmctrl.log

Explanation : http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

Rcmctrl.logSite server log fileRecords the activities of database replication between sites in the hierarchy.

Further information:hman.log

Site server log fileRecords information about site configuration changes, and the publishing of site information in ActiveDirectory Domain Services.

Sitestat.logSite server log fileRecords the availability and disk space monitoring process of all site systems.

DCMAgent.logClient log fileRecords high-level information about the evaluation, conflict reporting, and remediation ofconfiguration items and applications.

wsyncmgr.logSite server log fileRecords details about the software updates synchronization process.

Ccm.logSite server log fileRecords client push installation activities.

ContentTransferManager.logClient log fileSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB)to download or to access packages.

Sdmagent.logClient log fileRecords details about tracking of remediation and compliance. However, the software updates logfile, Updateshandler.log, provides more informative details about installing the software updatesrequired for compliance.

Ciagent.logClient log fileRecords details about the process of remediation and compliance for compliance settings, softwareupdates, and application management.

Smsexec.logSite server or site system server log fielRecords the processing of all site server component threads.

Locationservices.logClient log fileRecords the client activity for locating management points, software update points, and distributionpoints.

QUESTION 24Your network contains an Active Directory forest named litwareinc.com . The forest has a single domain . The forest contains a System Center 2012 Configuration Manager environment. The environment contains a single primary site . You create a group named InstallTechs .

You need to ensure that the members of InstallTechs can deploy Applications to desktop computersby using Configuration Manager . The solution must minimize the number of permissions assigned to Inst allTechs .

What should you do?

A. Assign the Application Administrator security role to InstallTechs. Create a new collection thatcontains all of the desktop computers. Scope InstallTechs to the new collection.

B. Assign the Application Deployment Manager security role to InstallTechs. Create a new collectionthat contains all of the desktop computers. Scope InstallTechs to the new collection.

C. Add the Application Deployment Manager security role to InstallTechs. Create a new collection thatcontains computers. Add InstallTechs to the local Administrators group on each desktop computer.

D. Assign the Application Administrator security role to InstallTechs. Create a new collection thatcontains all of the desktop computers. Add InstallTechs to the local Administrators group on eachdesktop computer.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer : Assign the Application Deployment Manager security role to InstallTechs. Create a newcollection that contains all of the desktop computers. Scope InstallTechs to the new collection.

Explanation :http://technet.microsoft.com/en-us/library/hh524341.aspxGlossary for Microsoft System Center 2012 Configuration Manager

Application AdministratorA security role that grants permissions to administrative users so that they can perform both theApplication Deployment Manager role and the Application Author role.

Application Deployment ManagerA security role that grants permissions to administrative users so that they can deploy and monitorapplications.

http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-2012-configuration-manager.aspxRole-Based Administration in System Center 2012 Configuration Manager

In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions(operations) for assignment to an Administrator. Instead of an individual permission set on a single instanceof object, the Security Role provides a single Role assignment to an administrator; reducing the overallcomplexity with permission management. An “object” in the Security Role is something that you want tomanage access to and “permission” is the operational functions, such as Read, Modify and Delete.

QUESTION 25Your network contains a single Active Directory domain . You plan to deploy System Center 2012 Configuration Man ager . The hierarchy will have a Central Administration Site and five Primary Sit es.

You need to ensure that you can target user groups for software distribution . The solution must minimize network traffic .

Which Configuration Manager discovery method should you use?

A. Active Directory User Discovery on the primary sitesB. Active Directory User Discovery on the primary sites and Active Directory Group Discovery

on every siteC. Active Directory User Discovery on the Central Administration site and Active Directory

Group Discovery on the primary sitesD. Active Directory User Discovery and Active Directory Group Discovery on the Central

Administration site

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer : Active Directory User Discovery on the primary sites and Active Directory GroupDiscovery on every site

Personal comment:From my point of view, the correct answer would be Active Directory User Discovery and ActiveDirectory Group Discovery on the primary sitesThe remaining possible correct answers might be: Active Directory User Discovery on the primary sites and Active Directory Group Discovery onevery siteor Active Directory User Discovery and Active Directory Group Discovery on the CentralAdministration site

Update:It seems that more recent exams contain the answer "Active Directory User Discovery and ActiveDirectory Group Discovery on the primary sites " So if you are lucky and have it, choose this one.

Explanation : http://technet.microsoft.com/en-us/library/gg712681.aspx#BKMK_ChooseCASDetermine Whether to Install a Central Administration Site

Install a central administration site if you plan to install multiple primary sites. Use a central administrationsite to configure hierarchy-wide settings and to monitor all sites and objects in the hierarchy. This site typedoes not manage clients directly but it does coordinate inter-site data replication, which includes theconfiguration of sites and clients throughout the hierarchy.Use the following information to help you plan for a central administration site:..

You can manage all clients in the hierarchy and perform site management tasks for any primary sitewhen you use a Configuration Manager console that is connected to the central administration site.

..You can configure discovery operations throughout the hierarchy from the central administration site byassigning discovery methods to run at individual sites.

http://technet.microsoft.com/en-us/library/gg712308.aspxPlanning for Discovery in Configuration Manager

System Center 2012 Configuration Manager discovery identifies computer and user resources that you canmanage by using Configuration Manager. It can also discover the network infrastructure in yourenvironment.

Discovery Methods in Configuration Manager

Before you enable discovery methods for Configuration Manager, ensure you understand what eachmethod can discover. Because discovery can generate a large volume of network traffic, and the resultantDDRs can result in a significant use of CPU resources during processing, plan to use only those discoverymethods that you require to meet your goals. You could use only one or two discovery methods to be

successful, and you can always enable additional methods in a controlled manner to extend the level ofdiscovery in your environment...

Active Directory User Discovery Discovers user accounts from the specified locations in Active Directory Domain Services.

Active Directory Group DiscoveryDiscovers local, global, and universal security groups, the membership within these groups, and themembership within distribution groups from the specified locations in Active directory DomainServices. Distribution groups are not discovered as group resources.

..

About Discovery Data Records

Discovery data records (DDRs) are files created by a discovery method that contain information about aresource you can manage in Configuration Manager. DDRs contain information about computers, usersand in some cases, network infrastructure. They are processed at primary sites or at central administrationsites. After the resource information in the DDR is entered into the database, the DDR is deleted and theinformation replicates as global data to all sites in the hierarchy.

The site at which a DDR is processed depends on the information it contains:DDRs for newly discovered resources that are not in the database are processed at the top-level site ofthe hierarchy. The top-level site creates a new resource record in the database and assigns it a uniqueidentifier. DDRs transfer by file-based replication until they reach the top-level site.DDRs for previously discovered objects are processed at primary sites. Child primary sites do nottransfer DDRs to the central administration site when the DDR contains information about a resourcethat is already in the database.Secondary site do not process discovery data records and always transfer them by file-based replicationto their parent primary site.

DDR files are identified by the .ddr extension, and have a typical size of about 1 KB.

..

Decide Which Discovery Methods to UseDiscover Users

When you want to discover information about users, you can use Active Directory User Discovery. Similarto Active Directory System Discovery, this method discovers users from Active Directory and includes basicinformation in addition to extended Active Directory information. You can use this information to buildcomplex queries and collections similar to those for computers.

Discover Group InformationWhen you want to discover information about groups and group memberships, use Active Directory GroupDiscovery. This discovery method creates resource records for security groups.

You can use this method to search a specific Active Directory group to identify the members of that group inaddition to any nested groups within that group. You can also use this method to search an Active Directorylocation for groups, and recursively search each child container of that location in Active Directory DomainServices.

This discovery method can also search the membership of distribution groups. This can identify the grouprelationships of both users and computers.

When you discover a group, you can also discover limited information about its members. This does notreplace Active Directory System or User Discovery and is usually insufficient to build complex queries andcollections or serve as the bases of a client push installation.

Decide Where to Run DiscoveryWhen you plan to use discovery in Configuration Manager, you must consider where to run each discoverymethod.

After Configuration Manager adds discovery data to a database, it is quickly shared between all sites in thehierarchy. Because there is no benefit to discovering the same information at multiple sites in your

hierarchy, consider configuring a single instance of each discovery method that you use to run at a singlesite instead of running multiple instances of a single method at different sites.

Further information :

Best Practices for Discovery

Run Active Directory System Discovery and Active Directory User Discovery before you run Active DirectoryGroup DiscoveryWhen Active Directory Group Discovery identifies a previously undiscovered user or computer as amember of a group, it attempts to discover basic details for the user or computer. Because Active DirectoryGroup Discovery is not optimized for this type of discovery, this process can cause Active Directory GroupDiscovery to run slow. Additionally, Active Directory Group Discovery identifies only the basic details aboutusers and computers is discovers, and does not create a complete user or computer discovery record.When you run Active Directory System Discovery and Active Directory User Discovery, the additional ActiveDirectory attributes for each object type are available, and as a result, Active Directory Group Discoveryruns more efficiently.

When you configure Active Directory Group Discovery, only specify groups that you use with ConfigurationManagerTo help control the use of resources by Active Directory Group Discovery, specify only those groups thatyou use with Configuration Manager. This is because Active Directory Group Discovery recursivelysearches each group it discovers for users, computers, and nested groups. The search of each nestedgroup can expand the scope of Active Directory Group Discovery and reduce performance. Additionally,when you configure delta discovery for Active Directory Group Discovery, the discovery method monitorseach group for changes. This further reduces performance when the method must search unnecessarygroups.

..

Run Active Directory Discovery methods at primary site that has a network location that is closest to yourActive Directory domain controllerTo improve the performance of Active Directory discovery, it is recommended to run discover at a primarysite that has a fast network connection to your domain controllers. If you run the same Active Directorydiscovery method at multiple sites, it is recommended to configure each discovery method to avoid overlap.Unlike past versions of Configuration Manager, discovery data is shared between sites. Therefore, it is notnecessary to discovery the same information at multiple sites.

http://configmgrblog.com/2011/12/29/discovery-methods-in-configuration-manager-2012/Discovery Methods in Configuration Manager 2012

..Active Directory User Discovery can be configured on Central Administration Sites and Primary Sites...Active Directory Group Discovery can be configured on Central Administration Sites and Primary Sites...

QUESTION 26Your network contains a System Center 2012 Configuration Manager environment.

The Configuration Manager databases are located on a remote server that runs Microsoft SQL Server.

You need to ensure that you can restore the Central Adm inistration site .

What should you do?

A. From the Configuration Manager console, enable the Backup Site Server maintenance task and set aschedule.

B. From Microsoft SQL Server Management Studio, create a maintenance plan for the site databases.C. From Task Scheduler, create a scheduled task that runs smssqlbkup.exe.D. From Windows Server Backup, schedule a full system backup.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : From the Configuration Manager console, enable the Backup Site Server maintenance task andset a schedule.

Explanation : http://technet.microsoft.com/en-us/library/gg712697.aspxBackup and Recovery in Configuration Manager

Enterprise solutions such as System Center 2012 Configuration Manager must prepare for both backupand recovery operations to avoid loss of critical data. For Configuration Manager sites, this preparationensures that sites and hierarchies are recovered with the least data loss and in the quickest possible time. ..Back up a Configuration Manager SiteSystem Center 2012 Configuration Manager provides a backup maintenance task that runs on a scheduleand backs up the site database, specific registry keys, and specific folders and files...Backup Maintenance TaskYou can automate backup for Configuration Manager sites by scheduling the predefined Backup SiteServer maintenance task. You can back up a central administration site and primary site, but there is nobackup support for secondary sites or site system servers...To enable the site backup maintenance task1. In the Configuration Manager console, click Administration.2. In the Administration workspace, expand Site Configuration, and then click Sites.3. Select the site in which you want to enable the site backup maintenance task.4. On the Home tab, in the Settings group, click Site Maintenance Tasks.5. Click Backup Site Server and then click Edit.6. Select Enable this task, and then click Set Paths to specify the backup destination. 7. Configure an appropriate schedule for the site backup task. As a best practice, consider a backup

schedule that is outside active working hours. If you have a hierarchy, consider a schedule that runs atleast two times a week to ensure maximum data retention in the event of site failure.

8. Select whether to create an alert if the site backup task fails, click OK, and then click OK. Whenselected, Configuration Manager creates a critical alert for the backup failure that you can review in theAlerts node in the Monitoring workspace.

QUESTION 27Your network contains a single Active Directory forest named contoso.com . Contoso.com contains three System Center 2012 Configuration Manager site s and one System CenterConfiguration Manager 2007 site .

You need to ensure that you can transfer objects from C onfiguration Manager 2007 to ConfigurationManager 2012 .

What should you do?

A. Assign the computer account of the Central Administration site server permission to the ConfigurationManager 2007 site. Assign the computer account of the Central Administration site server permissions to the Microsoft SQL

Server database instance.B. Extend the Active Directory schema and assign the Central Administration site server permissions to the

System\System Management container.C. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration

Manager 2012 primary site.D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration

Manager 2007 primary site.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : Assign the computer account of the Central Administration site server permission to theConfiguration Manager 2007 site. Assign the computer account of the Central Administration site server permissions to the MicrosoftSQL Server database instance.

Explanation : http://technet.microsoft.com/en-us/library/gg712991.aspxDetermine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration Manager

In Microsoft System Center 2012 Configuration Manager, the built-in migration functionality replaces in-place upgrades of existing Configuration Manager infrastructure by providing a process that transfers datafrom active Configuration Manager 2007 sites. The functionality provided by migration helps you maintaininvestments that you have made in configurations and deployments while you can take full advantage ofcore changes in the product introduced in System Center 2012 Configuration Manager. These changesinclude a simplified Configuration Manager hierarchy that uses fewer sites and resources, and the improvedprocessing by use of native 64-bit code that runs on 64-bit hardware.Migration can transfer most data from Configuration Manager 2007.

http://technet.microsoft.com/en-us/library/gg681981.aspxPlanning for Migration to System Center 2012 Configuration Manager

You must first install a System Center 2012 Configuration Manager hierarchy to be the destination hierarchybefore you can migrate data from a supported source hierarchy.After you install the destination hierarchy, configure the management features and functions that you wantto use in your destination hierarchy before you start to migrate data.

http://technet.microsoft.com/en-us/library/gg712313.aspxPrerequisites for Migration in System Center 2012 Configuration Manager

To migrate from a supported source hierarchy, you must have access to each applicable ConfigurationManager source site, and permissions within the System Center 2012 Configuration Manager destinationsite to configure and run migration operations.

Required Configurations for Migration..

Data GatheringTo enable the destination site to gather data, you must configure the following two source siteaccess accounts for use with each source site:

* Source Site Account: This account is used to access the SMS Provider of the source site. * For a Configuration Manager 2007 SP2 source site, this account requires Read permissionto all source site objects.* For a System Center 2012 Configuration Manager source site, this account requires Readpermission to all source site objects, You grant this permission to the account by using role-based administration.

* Source Site Database Account: This account is used to access the SQL Server database of thesource site and requires Read and Execute permissions to the source site database.

You can configure these accounts when you configure a new source hierarchy, data gathering for anadditional source site, or when you reconfigure the credentials for a source site. These accounts canuse a domain user account, or you can specify the computer account of the top-level site of the

destination hierarchy.

Security Note: If you use the Configuration Manager computer account for either access account,ensure that this account is a member of the security group Distributed COM Users in the domainwhere the source site resides.

When gathering data, the following network protocols and ports are used: NetBIOS/SMB – 445 (TCP) RPC (WMI) - 135 (TCP) SQL Server - 1433 (TCP)

...

QUESTION 28Your network contains a System Center 2012 Configuration Manage environment.

The environment contains a primary site server named Server1 and a server named Server2 that runsMicrosoft SQL Server 2008 R2. Server2 contains the Configuration Manager database . Server2 fails . You install SQL Server 2008 R2 on a new server. You name the server Server3 .

You need to restore the Configuration Manager database to Server3.

What should you do?

A. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. FromServer1, run the Configuration Manager 2012 Setup Wizard.

B. From Server3, run Microsoft SQL Server Management Studio, and then restore the backed up SQLServer database and log files.

C. From Server3, run Microsoft SQL Server Management Studio, and then attach the backed up SQLServer database and log files.

D. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. FromServer1, run the Site Repair Wizard.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : Register the Service Principal Name (SPN) for the SQL Server service account of Server3. FromServer1, run the Configuration Manager 2012 Setup Wizard.

Explanation : http://technet.microsoft.com/en-us/library/gg712697.aspxBackup and Recovery in Configuration Manager

Recover a Configuration Manager SiteA Configuration Manager site recovery is required whenever a Configuration Manager site fails or data lossoccurs in the site database. Repairing and resynchronizing data are the core tasks of a site recovery andare required to prevent interruption of operations. Site recovery is started by running the ConfigurationManager Setup Wizard from installation media or by configuring the unattended installation script and thenusing the Setup command /script option. Your recovery options vary depending on whether you have abackup of the Configuration Manager site database.

...

Site Database Recovery OptionsWhen you run Setup, you have the following recovery options for the site database:

* Recover the site database using a backup set: Use this option when you have a backup of theConfiguration Manager site database that was created as part of the Backup Site Server maintenance taskrun on the site before the site database failure. When you have a hierarchy, the changes that were made to

the site database after the last site database backup are retrieved from the central administration site for aprimary site, or from a reference primary site for a central administration site. When you recover the sitedatabase for a stand-alone primary site, you lose site changes after the last backup.

When you recover the site database for a site in a hierarchy, the recovery behavior is different for a centraladministration site and primary site, and when the last backup is inside or outside of the SQL Serverchange tracking retention period....

Further information :

SCCM 2007 needed you to run Site Repair Wizard.

QUESTION 29Your network contains a System Center 2012 Configuration Manager environment.

The environment contains a single primary site . The primary site has a distribution point and a management point .

You need to recommend a communication solution that mee ts the following requirements :· Communication between the client computes in the re search department and the managementpoint must use HTTPS.· Communication between all of the other client com puters and the management point must be ableto use HTTP.· Minimize the number of site system.

What should you do?

A. Configure the existing management point to use HTTPS. Configure the research department computers always to use HTTPS.

B. Create a new primary child site and configure the site to use native mode. Assign all of the research department computers to the new site.

C. Install a new management point and configure the management point always to use HTTPS.Configure the research department computers always to use HTTPS.

D. Install a new management point and configure Windows Firewall to block abound TCP port 80.Configure the research department computes always to use HTTPS.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Install a new management point and configure the management point always to use HTTPS. Configure the research department computers always to use HTTPS.

Explanation : http://technet.microsoft.com/en-us/library/gg712282.aspx#BKMK_Site_System_RolesPlanning for Site Systems in Configuration Manager

Optional Site System RolesOptional site system roles are site system roles that are not required for the core operation of aConfiguration Manager site. However, by default, the management point and distribution point, which areoptional site system roles, are installed on the site server when you install a primary or secondary site.Although these two site system roles are not required for the core operation of the site, you must have atleast one management point to support clients at those locations. After you install a site, you can move thedefault location of the management point or distribution point to another server, install additional instancesof each site system role, and install other optional site system roles to meet your business requirements.

The optional site system roles are described in the following table:..

Management pointA site system role that provides policy and service location information to clients and receivesconfiguration data from clients.

You must install at least one management point at each primary site that manages clients, and ateach secondary site where you want to provide a local point of contact for clients to obtain computerand user polices.

..

http://technet.microsoft.com/en-us/library/gg682060.aspxHow to Assign Clients to a Site in Configuration Manager

Locating Management PointsAfter a client is successfully assigned to a site, it locates a management point in the site.

Client computers download a list of management points in the site that they can connect to. This processhappens whenever the client restarts, every 25 hours, and if the client detects a network change, such asthe computer disconnects and reconnects on the network or it receives a new IP address. The list includesmanagement points on the intranet and whether they accept client connections over HTTP or HTTPS.When the client computer is on the Internet and the client doesn’t yet have a list of management points, itconnects to the specified Internet-based management point to obtain a list of management points. Whenthe client has a list of management points for its assigned site, it then selects one to connect to:

When the client is on the intranet and it has a valid PKI certificate that it can use, the client choosesHTTPS management points before HTTP management points. It then locates the closest managementpoint, based on its forest membership.When the client is on the Internet, it non-deterministically chooses one of the Internet-basedmanagement points.

Personal comment:From my point of view, the correct answer would have been:

Configure the existing management point to use HTTPS or HTTP . Configure the Research Department client computers to use PKI certificates ; considering the factthat the client chooses HTTPS management points before HTTP management points, that wouldhave ensured the requirements.

However, if there is a dedicated Management Point for the Research Department, that guarantees therequirements and makes the above answer the only correct one.

Further information 1:

Further information 2:http://blogs.technet.com/b/configmgrteam/archive/2012/05/25/system-center-2012-configuration-manager-r-i-p-native-mode.aspxSystem Center 2012 Configuration Manager: R.I.P. Native Mode

efore System Center Configuration Manager 2012, Configuration Manager 2007 had concepts called nativemode and mixed mode: The philosophy behind native mode was to secure the site server and all its sitesystems, in addition to securing all site-to-site communication. This involved configuring a site signingcertificate on all installed sites, plus there was an added restriction that a native mode site must alwaysreport to a native mode site.

During the planning phase for System Center 2012 Configuration Manager, we listened to customerfeedback and revisited this native and mixed mode model, and debated our previous concept of securingthe site. The result was client computer communication.

Key concepts for client computer communication:Client computer communication is about securing end points. The two end points in this case are theclient and the site system roles that the client talks to.A client can communicate by using either the HTTP or HTTPS protocol. HTTPS requires the client andsite system roles to be configured with valid PKI certificates for mutual authentication.Intelligent client behavior: This enables the client to select the most secure communication optionavailable:

1. If the client is configured with a valid PKI certificate and there are HTTPS site system roles

available, the client uses HTTPS.2. If the client is configured with a valid PKI certificate and there are NO HTTPS site system rolesavailable and the client is configured to use HTTP, the client uses HTTP to communicate with sitesystem roles.

QUESTION 30Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment.

Your company deploys 1,000 client computers . You discover that information about printers fails to appear in any inventory queries or reports . Information about other hardware devices appears in the inventory queries and reports.

You need to ensure that Configuration Manager data includes inf ormation about the printers .

What should you do?

A. Add a WMI class to the Hardware inventory Classes list.B. Enable a default WMI class in the Hardware Inventory Classes list.C. Add a file name to the Software Inventory configuration.D. Add a file name to the Hardware inventory configuration.E. Add a file name to Software Metering.F. Select Collect NOIDMIF files in Hardware Inventory.G. Add a WMI class to the Sms_def.mof file.H. Modify the Enable software inventory on clients setting.I. Modify the Enable hardware inventory on clients setting.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer : Enable a default WMI class in the Hardware Inventory Classes list.

Explanation :http://technet.microsoft.com/en-us/library/gg712290.aspxHow to Extend Hardware Inventory in Configuration Manager

System Center 2012 Configuration Manager hardware inventory reads information about devices by usingWindows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-basedEnterprise Management (WBEM), which is an industry standard for accessing management information inan enterprise environment. In previous versions of Configuration Manager, you could extend hardware inventory by modifying the filesms_def.mof on the site server. ..In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did inConfiguration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes tocollect by hardware inventory by using client settings. Configuration Manager provides the followingmethods to extend hardware inventory:

Enable or disable existing inventory classes - You can enable or disable the default inventoryclasses used by Configuration Manager or you can create custom client settings that allow you to collectdifferent hardware inventory classes from specified collections of clients. Add a new inventory class - You can add a new inventory class from the WMI namespace of anotherdevice. Import and export hardware inventory classes - You can import and export Managed Object Format(MOF) files that contain inventory classes from the Configuration Manager console. Create NOIDMIF Files - Use NOIDMIF files to collect information about client devices that cannot beinventoried by Configuration Manager.Create IDMIF Files - Use IDMIF files to collect information about assets in your organization that are

not associated with a Configuration Manager client, for example, projectors, photocopiers and networkprinters.

Further information :

QUESTION 31Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment.

Your company develops a custom hardware device and installs the device on all of the clientcomputers in the research department . You discover that information about the device fails to appear in any inventory queries or reports. Information about other hardware devices appears in the inventory queries and reports.

You need to ensure that Configuration Manager data includes inf ormation about the customhardware device .

What should you do?

A. Enable a default WMI class in the Hardware Inventory Classes list.

B. Modify the Enable hardware inventory on clients setting.C. Add a WMI class to the Hardware inventory Classes list.D. Add a file name to the Software Inventory configuration.E. Select Collect NOIDMIF files in Hardware Inventory.F. Add a file name to the Hardware inventory configuration.G. Add a file name to Software Metering.H. Add a WMI class to the Sms_def.mof file.I. Modify the Enable software inventory on clients setting.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Add a WMI class to the Hardware inventory Classes list.

Explanation :http://technet.microsoft.com/en-us/library/gg712290.aspxHow to Extend Hardware Inventory in Configuration Manager

System Center 2012 Configuration Manager hardware inventory reads information about devices by usingWindows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-basedEnterprise Management (WBEM), which is an industry standard for accessing management information inan enterprise environment. In previous versions of Configuration Manager, you could extend hardware inventory by modifying the filesms_def.mof on the site server. ..In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did inConfiguration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes tocollect by hardware inventory by using client settings. Configuration Manager provides the followingmethods to extend hardware inventory:

Enable or disable existing inventory classes - You can enable or disable the default inventory classesused by Configuration Manager or you can create custom client settings that allow you to collectdifferent hardware inventory classes from specified collections of clients. Add a new inventory class - You can add a new inventory class from the WMI namespace ofanother device. Import and export hardware inventory classes - You can import and export Managed Object Format(MOF) files that contain inventory classes from the Configuration Manager console. Create NOIDMIF Files - Use NOIDMIF files to collect information about client devices that cannot beinventoried by Configuration Manager.Create IDMIF Files - Use IDMIF files to collect information about assets in your organization that arenot associated with a Configuration Manager client, for example, projectors, photocopiers and networkprinters.

http://msdn.microsoft.com/en-us/library/windows/desktop/aa394143%28v=vs.85%29.aspxWin32_Environment class (Windows)

The Win32_Environment�WMI class represents an environment or system environment setting on aWindows computer system. Querying this class returns environment variables found in:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Sessionmanager\EnvironmentandHKEY_USERS\<user>\Environment

Further information :

QUESTION 32Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment.

Your company deploys a custom Application to 2,000 client comput ers by using ConfigurationManager. The Application is not listed in Add Remove Programs . You discover that information about the Application fails to appear in the inventory queries andinventory reports. You verify that information about other Applications appear in the inventory reports. You need to ensure that Configuration Manager data includes ins tallation information about thecustom Application .

What should you do?

A. Add a file name to Software Metering.B. Add a WMI class to the Hardware Inventory Classes file.C. Add a file name to the Hardware Inventory configuration.D. Enable a default WMI Cass in the Hardware Inventory Classes list.

E. Select Collect NOIDMIF files in Hardware Inventory.F. Add a file name to the Software Inventory configuration.G. Modify the Enable hardware inventory on Cents setting.H. Add a WMI class to the Sms_def.mof file.

Correct Answer: FSection: (none)Explanation

Explanation/Reference:Answer : Add a file name to the Software Inventory configuration.

Explanation :http://technet.microsoft.com/en-us/library/gg682049.aspxIntroduction to Software Inventory in Configuration Manager

Use software inventory in System Center 2012 Configuration Manager to collect information about files thatare contained on client devices in your organization. Additionally, software inventory can collect files fromclient devices and store these on the site server. Software inventory is collected when the Enable softwareinventory on clients setting is enabled in client settings.

Further information :http://technet.microsoft.com/en-us/library/hh509028.aspxHow to Configure Software Inventory in Configuration Manager

http://technet.microsoft.com/en-us/library/4acd0c29-e453-4863-8194-e479263291c8#BKMK_SoftInventoryDeviceSettingsAbout Client Settings in Configuration Manager - Software Inventory

QUESTION 33Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment.

Your company deploys a third-party Application to 10,000 client computers .

You need to ensure that you can run a report that lists all of the client computers that ran theApplication last month .

What should you do?

A. Modify the Enable hardware inventory on clients setting.B. Enable a default WMI class in the Hardware Inventory Classes list.C. Modify the Enable software inventory on clients setting.D. Add a file name to the Hardware Inventory configuration.E. Add a WMI class to the Hardware Inventory Classes list.F. Add a file name to the Software Inventory configuration.G. Add a file name to Software Metering.

H. Add a WMI class to the Sms_def.mof file.I. Select Collect NOIDMIF files in Hardware Inventory.

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Answer : Add a file name to Software Metering.

Explanation :http://technet.microsoft.com/en-us/library/gg682005.aspxIntroduction to Software Metering in Configuration Manager

Use software metering in System Center 2012 Configuration Manager to monitor and collect softwareusage data from Configuration Manager clients.To collect this usage data, configure software metering rules or use the Configuration Manager inventory togenerate these rules automatically. Client computers evaluate these rules and collect metering data to sendto the site.

QUESTION 34Your network contains a System Center 2012 Configuration Manager environment.

You need to create a report that lists all of the client computers that do not have an Applicationnamed App1 installed .

Which query should you use to create the report?

A. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP. ResourceID WHEREARP.DisplayName0 NOT IN ('App1')

B. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID IN(SELECT SYS.ResourceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID - ARP.ResourceID. WHEREARP.DisplayName0 = 'App1')

C. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID NOT IN(SELECT SYS.ResourceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHEREARP.DisplayName0 = 'App1')

D. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_System AS SYS INNER JOINV_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID - ARP.ResourceID WHEREARP.DisplayName0 NOT LIKE 'App1'

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer :

SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID NOT IN(SELECT SYS.ResourceIDFROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHEREARP.DisplayName0 = 'App1')

Explanation :SELECT computer name FROM table v_R_System (SQL Syntax)WHERE resource ResourceID is NOT INAdd Remove Programs WHERE DisplayName0 = 'App1'

http://www.w3schools.com/sql/sql_join_inner.aspSQL INNER JOIN Keyword

The INNER JOIN keyword returns rows when there is at least one match in both tables.

QUESTION 35Your network contains a System Center 2012 Configuration Manager environment.

You have the following query :

Select R.Name, U.UserNamefromSMS_R_System Rjoin SMS_R_User Uon R.LastLogonUserName = U.UserName

You need to ensure that all of the client computers are listed in the query results .

Which join type should you use?

A. LEFTB. FULLC. INNERD. RIGHT

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : LEFT

Explanation :http://www.w3schools.com/sql/sql_join_left.aspSQL LEFT JOIN Keyword

The LEFT JOIN keyword returns all rows from the left table (table_name1), even if there are no matches inthe right table (table_name2).

Further information :http://www.w3schools.com/sql/sql_join_full.aspSQL FULL JOIN Keyword

The FULL JOIN keyword return rows when there is a match in one of the tables.

http://www.w3schools.com/sql/sql_join_inner.aspSQL INNER JOIN Keyword

The INNER JOIN keyword returns rows when there is at least one match in both tables.

http://www.w3schools.com/sql/sql_join_right.aspSQL RIGHT JOIN Keyword

The RIGHT JOIN keyword returns all the rows from the right table (table_name2), even if there are nomatches in the left table (table_name1).

QUESTION 36Your network contains a System Center 2012 Configuration Manager environment.

You write the following query :

select SYS.Name from SMS_R_System SYSjoin SMS_G_System_ADD_REMOVE_PROGRAMS ARPon ARP.ResourceId = SYS.ResourceId

You need to create a list of all the client computers t hat have a version of Visual Studio installed.

What should you add to the query?

A. where ARP.DisplayName like "Visual Studio*"B. where ARP.DisplayName = "*Visual Studio*"C. where ARP.DisplayName = "%%Visual Studio"D. where ARP.DisplayName like "Visual studio%"

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer : where ARP.DisplayName like "Visual studio%"

Explanation :You need to use "LIKE" not "=" otherwise the WildCard "%" is seen as a real identifier.

QUESTION 37Your network contains a System Center 2012 Configuration Manager environment.

You need to receive an email message every day that lists all n on-compliant clients .

What should you do?

A. Create an alert subscription.B. Configure a Microsoft SQL Server Reporting Services (SSRS) report.C. Configure an in-console alert.D. Create a ConfigMgr query.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Answer : Configure a Microsoft SQL Server Reporting Services (SSRS) report.

Personal comment:My first option was "Create an alert subscription.".However, the question says that you need to receive an email "every day ", not instantly. You might call it adaily digest.When you set up an alert subscription, you receive an email alert instantly, whenever that alert happens. Sothis might not be the answer that this question is looking for.I've noticed that this test emphasises somewhat on the "SQL Server Business Intelligence DevelopmentStudio" and the "Reports Builder".

Explanation :http://technet.microsoft.com/en-us/library/gg508710.aspx

Overview of Custom Reports

Custom reports are intended for advanced users who are comfortable creating their own reports by using Microsoft SQL Server Reporting Services and SQL Server Business Intelligence Development Studio, SQLServer Reporting Services Report Builder, or Microsoft Visual Studio Report Designer.

http://technet.microsoft.com/library/ms159155%28SQL.100%29.aspxConfiguring a Report Server for E-Mail Delivery

Reporting Services includes an e-mail delivery extension so that you can distribute reports through e-mail.Depending on how you define the e-mail subscription, a delivery might consist of a notification, link,attachment, or embedded report.

The report server e-mail delivery extension is not configured by default. You must use the ReportingServices Configuration tool to minimally configure the extension.

Further information :http://technet.microsoft.com/en-us/library/hh427334.aspxConfiguring Alerts in Configuration Manager

Alerts in System Center 2012 Configuration Manager are generated by some operations when a specificcondition occurs. Typically, alerts are generated when an error occurs that you must resolve. Additionally,an alert might be generated to warn you that a condition exists so that you can continue to monitor thesituation. You can configure alerts for some Configuration Manager operations, such as EndpointProtection and client status, whereas some alerts are configured automatically. Additionally, you canconfigure subscriptions to alerts for client status and Endpoint Protection that will be emailed to you.

http://technet.microsoft.com/en-us/library/hh508782.aspxHow to Configure Alerts for Endpoint Protection in Configuration Manager

You can configure Endpoint Protection alerts in Microsoft System Center 2012 Configuration Manager tonotify administrative users when specific security events occur in your hierarchy. Notifications display in theEndpoint Protection dashboard in the Configuration Manager console, in reports, and you can configurethem to be emailed to specified recipients.

http://technet.microsoft.com/en-us/library/jj591552.aspxWhat’s New in Configuration Manager SP1..

Email alert subscriptions are now supported for all features, not just Endpoint Protection....

QUESTION 38Your network contains a System Center 2012 Configuration Manager environment.

The environment contains a reporting services point . A group of users is responsible for creating custom r eports . The custom reports will be published .

You need to identify which tools can be used to create and publish custom reports to Microsoft SQLServer Reporting Services (SSRS) .

Which tools should you identify? (Choose all that apply.)

A. Report BuilderB. Microsoft SQL Server Business Intelligence Development StudioC. Microsoft Access 2010D. Reporting Services Configuration ManagerE. Microsoft SQL Server Management Studio

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Answer : Microsoft SQL Server Business Intelligence Development Studio

Explanation :http://technet.microsoft.com/en-us/library/gg508710.aspxOverview of Custom Reports

Custom reports are intended for advanced users who are comfortable creating their own reports by using Microsoft SQL Server Reporting Services and SQL Server Business Intelligence Development Studio, SQLServer Reporting Services Report Builder, or Microsoft Visual Studio Report Designer.

Further information :http://msdn.microsoft.com/en-us/library/ms155792(v=sql.100)Reporting Services Components and Tools

http://msdn.microsoft.com/en-us/library/ms345231.aspxCustom Report Items

http://msdn.microsoft.com/en-us/library/ms345253Custom Report Item Implementation Requirements

http://technet.microsoft.com/en-us/library/gg682105.aspxIntroduction to Reporting in Configuration Manager

http://technet.microsoft.com/en-us/library/hh338693.aspxCreating Custom Report Models in SQL Server Reporting Services

QUESTION 39Your network contains a System Center 2012 Configuration Manager environment.

You create a report named Report1 . Report1 is used by multiple users . Users report that it takes too long to load Report1.

You need to reduce the amount of time it takes to load Report1 .

What should you do?

A. Enable caching for the report.B. Decrease the Size of the ReportServer database.C. Decrease the session timeout value for the Reports website.D. Increase the size of the ReportServerTempDB database.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : Enable caching for the report.

Explanation :http://technet.microsoft.com/en-us/library/bb522786.aspxPerformance, Snapshots, Caching (Reporting Services)

Report server performance is affected by a combination of factors that include hardware, number ofconcurrent users accessing reports, the amount of data in a report, and output format. To understand theperformance factors that are specific to your installation and which remedies will produce the results youwant, you will need to get baseline data and run tests.

General principles to consider include the following:Report processing and rendering are memory intensive operations. When possible, choose a computerthat has a lot of memory.Hosting the report server and the report server database on separate computers tends to provide betterperformance than hosting both on a single high-end computer.If all reports are processing slowly, consider a scale-out deployment where multiple report serverinstances support a single report server database. For best results, use load balancing software todistribute requests evenly across the deployment.If a single report is processing slowly, tune report dataset queries if the report must run on demand. Youmight also consider using shared datasets that you can cache, caching the report, or running the reportas a snapshot.If all reports process slowly in a specific format (for example, while rendering to PDF), consider fileshare delivery, adding more memory, or choosing a different format.To find out how long it takes to process a report and other usage metrics, review the report serverexecution log.

http://technet.microsoft.com/en-us/library/ms155927.aspxCaching Reports (SSRS)

A report server can cache a copy of a processed report and return that copy when a user opens the report.To a user, the only evidence available to indicate the report is a cached copy is the date and time that thereport ran. If the date or time is not current and the report is not a snapshot, the report was retrieved fromcache.

Caching can shorten the time required to retrieve a report if the report is large or accessed frequently. If theserver is rebooted, all cached instances are reinstated when the Report Server Web service comes backonline.

Caching is a performance-enhancement technique. The contents of the cache are volatile and can changeas reports are added, replaced, or removed.

QUESTION 40Your network contains a System center 2012 Configuration Manager environment.

You are creating a configuration item that contains application settings for Microsoft Office 2010.

You need to detect whether Office 2010 is installed bef ore validating the configuration item .

What should you do?

A. Create a query-based collection.B. Create an automatic deployment rule.C. Create a report to display all installed software.D. Enable Use Windows Installer detection.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Answer : Enable Use Windows Installer detection.

Explanation :http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager

Compliance settings in System Center 2012 Configuration Manager provides a unified interface and userexperience that lets you manage the configuration and compliance of servers, laptops, desktop computers,and mobile devices in your organization. Compliance settings contains tools to help you assess thecompliance of users and client devices for many configurations, such as whether the correct Windowsoperating system versions are installed and configured appropriately, whether all required applications areinstalled and configured correctly, whether optional applications are configured appropriately, and whetherprohibited applications are installed. Additionally, you can check for compliance with software updates,security settings, and mobile devices. Configuration item settings of the type Windows ManagementInstrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let youautomatically remediate noncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items thatyou want to evaluate and settings and rules that describe the level of compliance you must have. You canimport this configuration data from the web in Microsoft System Center Configuration ManagerConfiguration Packs as best practices that are defined by Microsoft and other vendors, in ConfigurationManager, and that you then import into Configuration Manager. Or, an administrative user can create newconfiguration items and configuration baselines.

http://technet.microsoft.com/en-us/library/gg712331.aspxHow to Create Windows Configuration Items for Compliance Settings in Configuration Manager

Create configuration items in System Center 2012 Configuration Manager to define configurations that youwant to manage and assess for compliance on devices.There are different types of configuration items:

Application configuration itemUsed to determine compliance for an application. This can include whether the application isinstalled and details about its configuration.

Operating system configuration item Used to determine compliance for settings that relate to the operating system and its configuration.

Software updates configuration item Automatically created when you download software updates with Configuration Manager.You do not create or see these configuration items in the Compliance Settings node, but you canselect them when you define configuration baselines.

General configuration item Used to determine compliance for mobile devices.

...

Steps to Create a New Configuration Item for Client ComputersUse the following required steps to create a configuration item by using the Create Configuration ItemWizard:Step 1: Start the Create Configuration Item Wizard.Step 2: Provide general information about the configuration item.Step 3: Provide detection method information for the configuration item.Step 4: Configure settings for the configuration item.Step 5: Configure compliance rules for the configuration item.Step 6: Specify supported platforms for the configuration item.Step 7: Complete the wizard.

...

http://technet.microsoft.com/en-us/library/gg712331.aspx#BKMK_Step3Step 3: Provide Detection Method Information for the Configuration Item

Use this procedure to provide detection method information for the configuration item.

Note: Applies only if you selected This configuration item contains application settings on the Generalpage of the wizard.

A detection method in Configuration Manager contains rules that are used to detect whether an applicationis installed on a computer. This detection occurs before the configuration item is assessed for compliance.To detect whether an application is installed, you can detect the presence of a Windows Installer file for theapplication, use a custom script, or select Always assume application is installed to assess theconfiguration item for compliance regardless of whether the application is installed.

Further information :

QUESTION 41Your network contains a System Center 2012 Configuration Manager environment.

Two weeks ago, you deployed a Windows Installer package named App1 .

You need to remediate a registry value that applies onl y to the client computers that have App1installed . The solution must minimize network traffic .

What should you do?

A. Modify the App1 Windows Installer package to contain the registry setting, and then create a newapplication for App1.

B. Modify the App1 Windows Installer package to contain the registry setting, and then configure theexisting application for App1 to use the new Windows Installer package.

C. Create an application-based configuration item, configure a rule for an existential type, and then importthe registry setting from a client computer that has App1 installed.

D. Create an application-based configuration item, configure the detection method to use the WindowsInstaller product code of App1, and then import the registry setting from a client computer that has App1installed.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer : Create an application-based configuration item, configure the detection method to use theWindows Installer product code of App1, and then import the registry setting from a client computer thathas App1 installed.

Explanation :http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager

Compliance settings in System Center 2012 Configuration Manager provides a unified interface and userexperience that lets you manage the configuration and compliance of servers, laptops, desktop computers,and mobile devices in your organization. Compliance settings contains tools to help you assess thecompliance of users and client devices for many configurations, such as whether the correct Windowsoperating system versions are installed and configured appropriately, whether all required applications areinstalled and configured correctly, whether optional applications are configured appropriately, and whetherprohibited applications are installed. Additionally, you can check for compliance with software updates,security settings, and mobile devices. Configuration item settings of the type Windows ManagementInstrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let youautomatically remediate noncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items thatyou want to evaluate and settings and rules that describe the level of compliance you must have. You canimport this configuration data from the web in Microsoft System Center Configuration ManagerConfiguration Packs as best practices that are defined by Microsoft and other vendors, in ConfigurationManager, and that you then import into Configuration Manager. Or, an administrative user can create newconfiguration items and configuration baselines.

http://technet.microsoft.com/en-us/library/gg712331.aspx

How to Create Windows Configuration Items for Compliance Settings in Configuration Manager

Create configuration items in System Center 2012 Configuration Manager to define configurations that youwant to manage and assess for compliance on devices.There are different types of configuration items:

Application configuration itemUsed to determine compliance for an application. This can include whether the application isinstalled and details about its configuration.

Operating system configuration item Used to determine compliance for settings that relate to the operating system and its configuration.

Software updates configuration item Automatically created when you download software updates with Configuration Manager.You do not create or see these configuration items in the Compliance Settings node, but you canselect them when you define configuration baselines.

General configuration item Used to determine compliance for mobile devices.

...

Steps to Create a New Configuration Item for Client ComputersUse the following required steps to create a configuration item by using the Create Configuration ItemWizard:Step 1: Start the Create Configuration Item Wizard.Step 2: Provide general information about the configuration item.Step 3: Provide detection method information for the configuration item.Step 4: Configure settings for the configuration item.Step 5: Configure compliance rules for the configuration item.Step 6: Specify supported platforms for the configuration item.Step 7: Complete the wizard.

...

http://technet.microsoft.com/en-us/library/gg712331.aspx#BKMK_Step3Step 3: Provide Detection Method Information for the Configuration Item

Use this procedure to provide detection method information for the configuration item.

Note: Applies only if you selected This configuration item contains application settings on the Generalpage of the wizard.

A detection method in Configuration Manager contains rules that are used to detect whether an applicationis installed on a computer. This detection occurs before the configuration item is assessed for compliance.To detect whether an application is installed, you can detect the presence of a Windows Installer file for theapplication, use a custom script, or select Always assume application is installed to assess theconfiguration item for compliance regardless of whether the application is installed.

Further information :

QUESTION 42Your company uses System Center 2012 Configuration Manager to monitor compliance .

The company has a configuration baseline for each server that has the Web Server (IIS) server ro leinstalled. A new corporate policy specifies that the maximum TCP window size for all of the Web servers mustbe 131,072 bytes . You discover that the TCP window size is set in the following registry entry:

HKEY_LOCAL_ MACHINE\System\CurrentControlSet\Services\HTTP\Parameters\MaxBytesPerSend

You need to generate an error message for all of the We b servers that do NOT comply with thecorporate policy .

What should you do?

A. Add a new configuration item that has a registry value setting type to the configuration baseline.B. Create a query-based collection that contains all of the Web servers, and then initiate an inventory

collection.C. Create a query that returns a list of all the Web servers, and then search the query results for the

registry value.D. Add a new configuration item that has an Internet Information Services (IIS) metabase setting type to

the configuration baseline.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : Add a new configuration item that has a registry value setting type to the configuration baseline.

Explanation :http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager

Compliance settings in System Center 2012 Configuration Manager provides a unified interface and userexperience that lets you manage the configuration and compliance of servers, laptops, desktop computers,and mobile devices in your organization. Compliance settings contains tools to help you assess thecompliance of users and client devices for many configurations, such as whether the correct Windowsoperating system versions are installed and configured appropriately, whether all required applications areinstalled and configured correctly, whether optional applications are configured appropriately, and whetherprohibited applications are installed. Additionally, you can check for compliance with software updates,security settings, and mobile devices. Configuration item settings of the type Windows ManagementInstrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let youautomatically remediate noncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items thatyou want to evaluate and settings and rules that describe the level of compliance you must have. You canimport this configuration data from the web in Microsoft System Center Configuration ManagerConfiguration Packs as best practices that are defined by Microsoft and other vendors, in ConfigurationManager, and that you then import into Configuration Manager. Or, an administrative user can create newconfiguration items and configuration baselines.

http://technet.microsoft.com/en-us/library/gg712331.aspxHow to Create Windows Configuration Items for Compliance Settings in Configuration Manager

Create configuration items in System Center 2012 Configuration Manager to define configurations that youwant to manage and assess for compliance on devices.There are different types of configuration items:

Application configuration itemUsed to determine compliance for an application. This can include whether the application isinstalled and details about its configuration.

Operating system configuration item Used to determine compliance for settings that relate to the operating system and its configuration.

Software updates configuration item Automatically created when you download software updates with Configuration Manager.You do not create or see these configuration items in the Compliance Settings node, but you canselect them when you define configuration baselines.

General configuration item Used to determine compliance for mobile devices.

...

Steps to Create a New Configuration Item for Client ComputersUse the following required steps to create a configuration item by using the Create Configuration ItemWizard:Step 1: Start the Create Configuration Item Wizard.Step 2: Provide general information about the configuration item.

Step 3: Provide detection method information for the configuration item.Step 4: Configure settings for the configuration item.Step 5: Configure compliance rules for the configuration item.Step 6: Specify supported platforms for the configuration item.Step 7: Complete the wizard.

QUESTION 43Your company has a production network and a test network . Both networks have System Center 2012 Configuration Manager deployed.

You create the following objects on the test network :· A configuration item named SQLServerCI· A configuration baseline named SQLServerBaseline that contains the configuration item · A collection named SQLServers that contains all of the servers on the test network that run MicrosoftSQL Server.

You export the configuration baseline to SQLServerBaseline.cab . You open the Configuration Manager console, you click Assets and Compliance, and then you expandCompliance Settings.

You need to apply the configuration baseline to the ser vers on the production network that run SQLServer. You create a collection named SQLServers that contains all SQL Servers from the production network.

What should you do next? (Choose all that apply.)

A. Right-click SQLServersBaseline , select Categorize, and then select Server.B. Right-click SQLServerCI , select Export, and then specify SQLServer Baseline.cab as the export file.C. Right-click SQLServersBaseline , select Deploy, and then select the SQLServers collection.D. Right-click Configuration Baselines , and then select Import Configuration DataE. Right-click SQLServersBaseline , and then select Properties. In the Deployments tab, type SQLServers

in the Filter... box.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Answer : Right-click Configuration Baselines , and then select Import Configuration Data Right-click SQLServersBaseline , select Deploy, and then select the SQLServers collection.

Explanation :http://technet.microsoft.com/en-us/library/hh691016.aspxHow to Import Configuration Data in Configuration Manager

In addition to creating configuration baselines and configuration items in the System Center 2012Configuration Manager console, you can import configuration data if it is contained in a cabinet (.cab) fileformat and adheres to the supported SML schema. You can import configuration data from the followingsources:

Best practice configuration data (Configuration Packs) that has been downloaded from Microsoft or fromother software vendor sites.Configuration data that has been exported from System Center 2012 Configuration Manager.Configuration data that was externally authored and that conforms to the Service Modeling Language(SML) schema.

How to Import Configuration DataWhen you import a configuration baseline, some or all of the configuration items that are referenced in theconfiguration baseline might also be included in the cabinet file. During the import process, ConfigurationManager verifies that all of the configuration items that are referenced in the configuration baseline areeither also included in the cabinet file or already exist in the Configuration Manager site. The import processfails if you attempt to import a configuration baseline that references configuration data that Configuration

Manager cannot locate...To import configuration data1. In the Configuration Manager console, click Assets and Compliance.2. In the Assets and Compliance workspace, expand Configuration Items or Configuration Baselines, and

then in the Home tab, in the Create group, click Import Configuration Data.3. On the Select Files page of the Import Configuration Data Wizard, click Add, and then in the Open

dialog box, select the .cab files you want to import.4. Select the Create a new copy of the imported configuration baselines and configuration items check box

if you want the imported configuration data to be editable in the Configuration Manager console.5. On the Summary page of the wizard, review the actions that will be taken, and then complete the wizard.

The imported configuration data displays in the Compliance Settings node in the Assets andCompliance workspace.

http://technet.microsoft.com/en-us/library/hh219289.aspxHow to Deploy Configuration Baselines in Configuration Manager

Configuration baselines in System Center 2012 Configuration Manager must be deployed to one or morecollections of users or devices before client devices in those collections can assess their compliance withthe configuration baseline.

Use the Deploy Configuration Baselines dialog box to define configuration baseline deployments, whichincludes adding or removing configuration baselines from deployments in addition to specifying theevaluation schedule.

To deploy a configuration baseline1. In the Configuration Manager console, click Assets and Compliance.2. In the Assets and Compliance workspace, expand Compliance Settings, and then click Configuration

Baselines.3. In the Configuration Baselines list, select the configuration baseline that you want to deploy, and then in

the Home tab, in the Deployment group, click Deploy.4. In the Deploy Configuration Baselines dialog box, select the configuration baselines that you want to

deploy in the Available configuration baselines list. Click Add to add these to the Selected configurationbaselines list.

5. Specify the following additional information:* Remediate noncompliant rules when supported – Enable this option to automatically remediate anyrules that are noncompliant for Windows Management Instrumentation (WMI), the registry, scripts,and all settings for mobile devices that are enrolled by Configuration Manager.* Allow remediation outside the maintenance window – If a maintenance window has beenconfigured for the collection to which you are deploying the configuration baseline, enable this optionto let compliance settings remediate the value outside of the maintenance window.

6. Generate an alert – Enable this option to configure an alert that is generated if the configuration baselinecompliance is less than a specified percentage by a specified date and time. You can also specifywhether you want an alert to be sent to System Center Operations Manager.

7. Collection: Click Browse to select the collection where you want to deploy the configuration baseline.8. Specify the compliance evaluation schedule for this configuration baseline: Specifies the schedule by

which the deployed configuration baseline is evaluated on client computers. This can be either a simpleor a custom schedule.

9. Click OK to close the Deploy Configuration Baselines dialog box and to create the deployment.

QUESTION 44Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Manager environm ent that contains sixservers configured as shown in the following table:

Server5 and Server6 are in the perimeter network , while Server1, Server2, Server3, and Server4 are inthe internal network .

You plan to deploy servers to the perimeter network by using Configuration Manager. The operating system for each server will be installed over the network . The installations will begin automatically , as soon as each server starts for the first time.

You need to recommend a solution to minimize the amount of netw ork traffic between the perimeternetwork and the internal network during the installation of the operating systems.

What should you do?

A. Install a software update point on Server3.B. Configure IIS to support only HTTP on Server3.C. Install a PXE-enabled protected distribution point on Server6.D. Install a management point on Servers.E. Install Windows Server Update Services (WSUS) on Server3.F. Install Network Load Balancing (NLB) on Server6.G. Install the Windows Cluster service on Server6.H. Install a PXE-enabled protected distribution point on Server4.I. Install a management point on Server2.J. Install a protected distribution point on Server1.K. Install the Windows Cluster service on Server3.L. Install Network Load Balancing (NLB) on Server3.M. Configure the Exchange connector on Server3.N. Configure IIS to support only HTTPS on Server5.O. Install an enrollment proxy point on Server6.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer :

Explanation :http://technet.microsoft.com/en-us/library/gg682108.aspxIntroduction to Operating System Deployment in Configuration Manager

Methods Used to Deploy Operating Systems

There are several methods that you can use to deploy operating systems to Configuration Manager clientcomputers.:

PXE initiated deployments: PXE-initiated deployments let client computers request a deployment overthe network. In this method of deployment, the operating system image and a Windows PE boot imageare sent to a distribution point that is configured to accept PXE boot requests.Multicast deployments: Multicast deployments conserve network bandwidth by concurrently sendingdata to multiple clients instead of sending a copy of the data to each client over a separate connection.In this method of deployment, the operating system image is sent to a distribution point. This in turndeploys the image when client computers request the deployment.Bootable Media Deployments: Bootable media deployments let you deploy the operating system whenthe destination computer starts. When the destination computer starts, it retrieves the task sequence,the operating system image, and any other required content from the network. Because that content isnot included on the media, you can update the content without having to re-create the media.

http://technet.microsoft.com/en-us/library/gg712275.aspxPlanning a Content Deployment Migration Strategy in System Center 2012 Configuration Manager...System Center 2012 Configuration Manager sites use the concept of preferred distribution points instead ofprotected distribution points....

http://technet.microsoft.com/en-us/library/gg682083.aspx#BKMK_PreferredDistributionPointIntroduction to Content Management in Configuration Manager - Preferred Distribution Points

When you install and configure a distribution point, you have the option to assign boundary groups to thedistribution point. When the client’s current network location is in a boundary group that is associated withthe distribution point, it is considered a preferred distribution point for that client. When a client requestscontent, the client first connects to a preferred distribution point to retrieve the application or packagecontent. If the content is not available on any preferred distribution points, depending on the configurationoptions that you set, the client can retrieve the content from a fallback distribution point.

Further information :A protected distribution point will limit deployment to a predefined boundary. (the perimeter network)With PXE enabled the servers will be installed when they boot.

QUESTION 45Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Manager environm ent that contains sixservers configured as shown in the following table:

Server5 and Server6 are in the perimeter network , while Server1, Server2, Server3, and Server4 are inthe internal network .

A corporate security policy states that remote computers are forbidden to communicate dire ctly withservers on the internal network .

You need to ensure that you collect inventory data from the remote computers .

What should you do?

A. Install Windows Server Update Serves (WSUS) on Server3.B. Configure the Exchange connector on Server3.C. Install a management point on Server2.D. Install a PXE-enabled protected distribution point on Server6.E. Install a software update point on Server3.F. Install Network Load Balancing (NLB) on Server6.G. Install an enrollment proxy point on Server6.H. Install the Windows Cluster service on Server3.I. Install a protected distribution point on Server1.J. Configure IIS to support only HTTPS on Servers.K. Install a management point on Server5.L. Install the Windows Cluster service on Server6.M. Configure IIS to support only HTTP on Server5.N. Install Network Load Balancing (NLB) on Server3.O. Install a PXE-enabled protected distribution point on Server4.

Correct Answer: KSection: (none)Explanation

Explanation/Reference:Answer : Install a management point on Server5.

Explanation :http://technet.microsoft.com/en-us/library/gg712701.aspxPlanning for Communications in Configuration Manager

Planning for Communications Across Forests in Configuration ManagerWhen your Configuration Manager design spans multiple Active Directory domains and forests, use theadditional information in the following table to help you plan for the following types of communication:..

Communication in a site that spans forests: Does not require a two-way forest trust.To support clients primary sites support the installation of each site system role on computers inother forests.

Note: Two exceptions are the out of band service point and the Application Catalog webservice point. Each must be installed in the same forest as the site server.

When the site system role accepts connections from the Internet, as a security best practice, installthese site system roles in an untrusted forest (for example, in a perimeter network) so that the forestboundary provides protection for the site server.

When you specify a computer to be a site system server, you must specify the Site SystemInstallation Account. This account must have local administrative credentials to connect to, and theninstall site system roles on the specified computer.

When you install a site system role in an untrusted forest, you must select the site system optionRequire the site server to initiate connections to this site system. This configuration enables the siteserver to establish connections to the site system server to transfer data. This prevents the sitesystem server that is in the untrusted location from initiating contact with the site server that is insideyour trusted network. These connections use the Site System Installation Account that you use toinstall the site system server.

The management point and enrollment point site system roles connect to the site database. Bydefault, when these site system roles are installed, Configuration Manager configures the computeraccount of the new site system server as the connection account and adds the account to theappropriate SQL Server database role. When you install these site system roles in an untrusteddomain, you must configure the site system role connection account to enable the site system role toobtain information from the database.

If you configure a domain user account for these connection accounts, ensure that the account hasappropriate access to the SQL Server database at that site:

* Management point: Management Point Database Connection Account* Enrollment point: Enrollment Point Connection Account

Consider the following additional information when you plan for site system roles in other forests:* If you run a Windows Firewall, configure the applicable firewall profiles to passcommunications between the site database server and computers that are installed withremote site system roles. * When the Internet-based management point trusts the forest that contains the useraccounts, user policies are supported. When no trust exists, only computer policies aresupported.

Further information :The Management Point will collect all Client data and forward it to the Primary Site Server.

QUESTION 46Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Manager environm ent that contains sixservers configured as shown in the following table:

Server5 and Server6 are in the perimeter network , while Server1, Server2, Server3, and Server4 are inthe internal network .

Administrators currently apply software updates to servers manuall y. You discover that Server4 was never updated .

You need to centrally manage software updates for all o f the servers by using ConfigurationManager .

What should you do first ?

A. Install a management point on Server5.B. Configure IIS to support only HTTPS on Server6.C. Install a management point on Server2.D. Install Network Load Balancing (NLB) on Server3.E. Install an enrollment proxy point on Server6.F. Configure IIS to support only HTTP on Server3.G. Configure the Exchange connector on Server3.H. Install Network Load Balancing (NLB) on Server6.I. Install a PXE-enabled protected distribution point on Server5.J. Install the Windows Cluster service on Server3.K. Install a PXE-enabled protected distribution point on Server4.L. Install the Windows Cluster service on Server6.M. Install Windows Server Update Services (WSUS) on Server3.N. Install a protected distribution point on Server1.O. Install a software update point on Server3.

Correct Answer: MSection: (none)Explanation

Explanation/Reference:Answer : Install Windows Server Update Services (WSUS) on Server3.

Explanation :http://technet.microsoft.com/en-us/library/gg682168.aspxIntroduction to Software Updates in Configuration Manager

Software updates in System Center 2012 Configuration Manager provides a set of tools and resources thatcan help manage the complex task of tracking and applying software updates to client computers in theenterprise. An effective software update management process is necessary to maintain operational

efficiency, overcome security issues, and maintain the stability of the network infrastructure. However,because of the changing nature of technology and the continual appearance of new security threats,effective software update management requires consistent and continual attention.

http://technet.microsoft.com/en-us/library/gg712312.aspxConfiguring Software Updates in Configuration Manager

...Step 1: Install and Configure a Software Update Point

The software update point is required on the central administration site and on the primary sites in order toenable software updates compliance assessment and to deploy software updates to clients. The softwareupdate point is optional on secondary sites. The software update point site system role must be created ona server that has WSUS installed. The software update point interacts with the WSUS services to configurethe software update settings and to request synchronization of software updates metadata. When you havea Configuration Manager hierarchy, install and configure the software update point on the centraladministration site first, then on child primary sites, and then optionally, on secondary sites. When you havea stand-alone primary site, not a central administration site, install and configure the software update pointon the primary site first, and then optionally, on secondary sites. Some settings are only available when youconfigure the software update point on a top-level site. There are different options that you must considerdepending on where you installed the software update point.

You can add the software update point site system role to an existing site system server or you can create anew one. On the System Role Selection page of the Create Site System Server Wizard or Add Site SystemRoles Wizard , depending on whether you add the site system role to a new or existing site server, selectSoftware update point, and then configure the software update point settings in the wizard....

Further information :A WSUS service will simplify and automate software updates for all servers from a single managementinterface.

QUESTION 47Your company has a production network and a test network . Both networks have System Center 2012 Configuration Manager deployed.

You create the following objects on the test network:· A configuration item named WebCI· A configuration baseline named WebBaseline that contains WebCI · A collection named WebServers that contains all of the Web servers on the test network. You export the configuration baseline to Baseline.cab . You open the Configuration Manager console , you click Assets and Compliance , and then you expandCompliance Settings . You need to apply the configuration baseline to the Web servers on the production network .

What should you do next? (Choose all that apply.)

A. Right-click WebBaseline , select Categorize, and then select Server.B. Right-click Configuration Baselines , and then select Import Configuration DataC. Right-click WebCI, select Export, and then specify Baseline.cab as the export file.D. Right-click WebBaseline , and then select Properties. In the Deployments tab, type WebServers in the

Filter... box.E. Right-click WebBaseline , select Deploy, and then select the WebServers collection.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Answer : Right-click Configuration Baselines , and then select Import Configuration Data

Right-click WebBaseline , select Deploy, and then select the WebServers collection.

Explanation :http://technet.microsoft.com/en-us/library/hh691016.aspxHow to Import Configuration Data in Configuration Manager

In addition to creating configuration baselines and configuration items in the System Center 2012Configuration Manager console, you can import configuration data if it is contained in a cabinet (.cab) fileformat and adheres to the supported SML schema. You can import configuration data from the followingsources:

Best practice configuration data (Configuration Packs) that has been downloaded from Microsoft or fromother software vendor sites.Configuration data that has been exported from System Center 2012 Configuration Manager.Configuration data that was externally authored and that conforms to the Service Modeling Language(SML) schema.

How to Import Configuration DataWhen you import a configuration baseline, some or all of the configuration items that are referenced in theconfiguration baseline might also be included in the cabinet file. During the import process, ConfigurationManager verifies that all of the configuration items that are referenced in the configuration baseline areeither also included in the cabinet file or already exist in the Configuration Manager site. The import processfails if you attempt to import a configuration baseline that references configuration data that ConfigurationManager cannot locate...To import configuration data1. In the Configuration Manager console, click Assets and Compliance.2. In the Assets and Compliance workspace, expand Configuration Items or Configuration Baselines, and

then in the Home tab, in the Create group, click Import Configuration Data.3. On the Select Files page of the Import Configuration Data Wizard, click Add, and then in the Open

dialog box, select the .cab files you want to import.4. Select the Create a new copy of the imported configuration baselines and configuration items check box

if you want the imported configuration data to be editable in the Configuration Manager console.5. On the Summary page of the wizard, review the actions that will be taken, and then complete the wizard.

The imported configuration data displays in the Compliance Settings node in the Assets andCompliance workspace.

http://technet.microsoft.com/en-us/library/hh219289.aspxHow to Deploy Configuration Baselines in Configuration Manager

Configuration baselines in System Center 2012 Configuration Manager must be deployed to one or morecollections of users or devices before client devices in those collections can assess their compliance withthe configuration baseline.

Use the Deploy Configuration Baselines dialog box to define configuration baseline deployments, whichincludes adding or removing configuration baselines from deployments in addition to specifying theevaluation schedule.

To deploy a configuration baseline1. In the Configuration Manager console, click Assets and Compliance.2. In the Assets and Compliance workspace, expand Compliance Settings, and then click Configuration

Baselines.3. In the Configuration Baselines list, select the configuration baseline that you want to deploy, and then in

the Home tab, in the Deployment group, click Deploy.4. In the Deploy Configuration Baselines dialog box, select the configuration baselines that you want to

deploy in the Available configuration baselines list. Click Add to add these to the Selected configurationbaselines list.

5. Specify the following additional information:* Remediate noncompliant rules when supported – Enable this option to automatically remediate anyrules that are noncompliant for Windows Management Instrumentation (WMI), the registry, scripts,and all settings for mobile devices that are enrolled by Configuration Manager.* Allow remediation outside the maintenance window – If a maintenance window has beenconfigured for the collection to which you are deploying the configuration baseline, enable this optionto let compliance settings remediate the value outside of the maintenance window.

6. Generate an alert – Enable this option to configure an alert that is generated if the configuration baseline

compliance is less than a specified percentage by a specified date and time. You can also specifywhether you want an alert to be sent to System Center Operations Manager.

7. Collection: Click Browse to select the collection where you want to deploy the configuration baseline.8. Specify the compliance evaluation schedule for this configuration baseline: Specifies the schedule by

which the deployed configuration baseline is evaluated on client computers. This can be either a simpleor a custom schedule.

9. Click OK to close the Deploy Configuration Baselines dialog box and to create the deployment.

QUESTION 48Your network contains a System center 2012 Configuration Manager environment.

You are creating a configuration item that contains application settings for Microsoft Office 2010 . You need to detect whether Office 2010 is installed bef ore validating the configuration item .

What should you do?

A. Create a report to display all installed software.B. Enable Use a custom script to detect this application.C. Create a direct membership collection.D. Create an automatic deployment rule.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Answer : Enable Use a custom script to detect this application.

Explanation :http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager

Compliance settings in System Center 2012 Configuration Manager provides a unified interface and userexperience that lets you manage the configuration and compliance of servers, laptops, desktop computers,and mobile devices in your organization. Compliance settings contains tools to help you assess thecompliance of users and client devices for many configurations, such as whether the correct Windowsoperating system versions are installed and configured appropriately, whether all required applications areinstalled and configured correctly, whether optional applications are configured appropriately, and whetherprohibited applications are installed. Additionally, you can check for compliance with software updates,security settings, and mobile devices. Configuration item settings of the type Windows ManagementInstrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let youautomatically remediate noncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items thatyou want to evaluate and settings and rules that describe the level of compliance you must have. You canimport this configuration data from the web in Microsoft System Center Configuration ManagerConfiguration Packs as best practices that are defined by Microsoft and other vendors, in ConfigurationManager, and that you then import into Configuration Manager. Or, an administrative user can create newconfiguration items and configuration baselines.

http://technet.microsoft.com/en-us/library/gg712331.aspxHow to Create Windows Configuration Items for Compliance Settings in Configuration Manager

Create configuration items in System Center 2012 Configuration Manager to define configurations that youwant to manage and assess for compliance on devices.There are different types of configuration items:

Application configuration itemUsed to determine compliance for an application. This can include whether the application isinstalled and details about its configuration.

Operating system configuration item

Used to determine compliance for settings that relate to the operating system and its configuration. Software updates configuration item

Automatically created when you download software updates with Configuration Manager.You do not create or see these configuration items in the Compliance Settings node, but you canselect them when you define configuration baselines.

General configuration item Used to determine compliance for mobile devices.

...

Steps to Create a New Configuration Item for Client ComputersUse the following required steps to create a configuration item by using the Create Configuration ItemWizard:Step 1: Start the Create Configuration Item Wizard.Step 2: Provide general information about the configuration item.Step 3: Provide detection method information for the configuration item.Step 4: Configure settings for the configuration item.Step 5: Configure compliance rules for the configuration item.Step 6: Specify supported platforms for the configuration item.Step 7: Complete the wizard.

...

http://technet.microsoft.com/en-us/library/gg712331.aspx#BKMK_Step3Step 3: Provide Detection Method Information for the Configuration Item

Use this procedure to provide detection method information for the configuration item.

Note: Applies only if you selected This configuration item contains application settings on the Generalpage of the wizard.

A detection method in Configuration Manager contains rules that are used to detect whether an applicationis installed on a computer. This detection occurs before the configuration item is assessed for compliance.To detect whether an application is installed, you can detect the presence of a Windows Installer file for theapplication, use a custom script, or select Always assume application is installed to assess theconfiguration item for compliance regardless of whether the application is installed.

Further information :

QUESTION 49Your company has 2,000 desktop computers and 450 portable computers . The desktop computersrun Windows 7 Enterprise (x64) and the portable computers run Windows 7 Professional (x86) .

The network contains a System Center 2012 Configuration Manager environment.

You create a configuration baseline that is targeted to all of the computers .

You discover that you fail to receive compliance inform ation for the configuration baseline from theportable computers .You receive compliance information for the configuration baseline from the desktop computers .You receive compliance information for other configuration baselines from all of the compu ters .

You need to ensure that you receive compliance informat ion for the configuration baseline from allof the computers .

What should you do?

A. Configure the configuration item to be evaluated on all Windows 7 operating systems.B. Create custom client settings for the portable computers and enable Compliance Settings.C. Create a collection containing the portable computers and assign the configuration baseline to the

collection.

D. Add the configuration item to a new configuration baseline.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : Configure the configuration item to be evaluated on all Windows 7 operating systems.

Explanation :http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager

Compliance settings in System Center 2012 Configuration Manager provides a unified interface and userexperience that lets you manage the configuration and compliance of servers, laptops, desktop computers,and mobile devices in your organization. Compliance settings contains tools to help you assess thecompliance of users and client devices for many configurations, such as whether the correct Windowsoperating system versions are installed and configured appropriately, whether all required applications areinstalled and configured correctly, whether optional applications are configured appropriately, and whetherprohibited applications are installed. Additionally, you can check for compliance with software updates,security settings, and mobile devices. Configuration item settings of the type Windows ManagementInstrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let youautomatically remediate noncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items thatyou want to evaluate and settings and rules that describe the level of compliance you must have. You canimport this configuration data from the web in Microsoft System Center Configuration ManagerConfiguration Packs as best practices that are defined by Microsoft and other vendors, in ConfigurationManager, and that you then import into Configuration Manager. Or, an administrative user can create newconfiguration items and configuration baselines.

http://technet.microsoft.com/en-us/library/hh219289.aspxHow to Deploy Configuration Baselines in Configuration Manager

Configuration baselines in System Center 2012 Configuration Manager must be deployed to one or morecollections of users or devices before client devices in those collections can assess their compliance withthe configuration baseline.

Further information :Question says: this and only this new baseline isn't working on portable devices.Reason: Maybe this baseline wasn't deployed to those PCs.

The client/agent on all computers seems to be OK.

What is it?-A Configuration Manager client downloads its client policy on a schedule that you configure as a clientsetting . However, there might be occasions when you want to initiate ad-hoc policy retrieval from the client—for example, in a troubleshooting scenario or when you are testing.Use the following procedures to initiate ad-hoc policy retrieval from the client outside its scheduled pollinginterval, either by using the Actions tab on the Configuration Manager client or by running a script on thecomputer. You must be logged on to the client computer with local administrative rights to perform theseprocedures.

-The reporting services arn't correctly configured

Answer: All answers doesn't make much senseBut: Configure the configuration item to be evaluat ed on all Windows 7 operating systemsIndicates, that this wasn't the case.

QUESTION 50Your network contains a System Center 2012 Configuration Manager environment.

You create two custom client agent settings named ClientSettings1 and ClientSettings2 . You apply ClientSettings1 to all of the client computers in the sales department . You apply ClientSettings2 to all of the client computers in the marketing department .

The client computers in the marketing department contain several custom registry settings .

You need to collect the custom registry settings from the marketing department computers .

What should you do?

A. Edit the default client agent settings and include the custom registry informationB. Edit ClientSettings2 and exclude the custom registry information.C. Create a new set of custom client agent settings for the marketing department and include the

custom registry information.D. Edit ClientSettings2 and include the custom registry information.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Create a new set of custom client agent settings for the marketing department and include thecustom registry information.

Explanation :http://technet.microsoft.com/en-us/library/gg712688.aspxPlanning for Client Settings in Configuration Manager

Use client settings in System Center 2012 Configuration Manager to configure user and device settings forthe hierarchy. Client settings include configuration options such as the hardware inventory and schedule,and the polling schedule for client policy.

All Configuration Manager clients in the hierarchy use the Default Client Settings that are automaticallycreated when you install Configuration Manager. However, you can modify the default client settings andyou can create custom client settings to override the default client settings for specific users or devices.

When you create a set of custom client settings, you must assign it to one or more collections for thesettings to be applied to the collection members. If you apply multiple sets of custom client settings to thesame user or device, you can control the order in which these settings are applied according to the orderthat you specify. Custom device or user settings with an Order value of 1 are always processed last and willoverride any other configurations. The Default Client Settings has a permanent order of 10,000, whichensures it is always applied before any custom settings are applied. When there is a conflict of settings, theclient setting that was applied last (with the lower order value) overrides any previous settings. You canview the resultant client settings for a user or a device by using the System Center 2012 ConfigurationManager reports.

http://technet.microsoft.com/en-us/library/gg682067.aspxAbout Client Settings in Configuration Manager

All client settings in System Center 2012 Configuration Manager are managed in the ConfigurationManager console from the Client Settings node in the Administration workspace. A set of default settings issupplied with Configuration Manager. When you modify the default client settings, these settings areapplied to all clients in the hierarchy. You can also configure custom client settings, which override thedefault client settings when you assign these to collections.

Client settings for devices:Background Intelligent TransferClient PolicyCompliance SettingsComputer AgentComputer RestartEndpoint Protection

Hardware InventoryMetered Internet ConnectionsNetwork Access Protection (NAP)Power ManagementRemote ToolsSoftware DeploymentSoftware InventorySoftware UpdatesUser and Device Affinity

http://technet.microsoft.com/en-us/library/gg682109.aspxHow to Configure Client Settings in Configuration Manager

You manage all client settings in System Center 2012 Configuration Manager from the Client Settings nodein the Administration workspace of the Configuration Manager console. Modify the default settings whenyou want to configure settings for all users and devices in the hierarchy that do not have any customsettings applied. If you want to apply different settings to just some users or devices, create custom settingsand deploy these to collections.

Note:You can also use configuration items to manage clients to assess, track, and remediate theconfiguration compliance of devices.

http://technet.microsoft.com/en-us/library/gg682109.aspx#BKMK_CustomClientSettingsHow to Create and Deploy Custom Client SettingsTo configure and deploy custom client settings

Further information :

http://technet.microsoft.com/en-us/library/gg682109#BKMK_CustomClientSettingsReally not sure:

-Create a new set of custom client agent settings for the marketing department and include the customregistry information.- Edit ClientSettings2 and include the custom registry information. <--- probably not

Because editing isn't that easy. It is common sense, that you just add another client setting and deploy it to the collection.Why? All settings can be separately deleted and especially named. Easier to handle.

QUESTION 51Your network contains a System Center 2012 Configuration Manager environment. You create a collection named All Marketing Users . You need to inventory the desktop settings of the All Marketing Users collection.

What should you do?To answer, move the four appropriate actions from the List of Actions to the Answer Area and arrangethem in the correct order .

Build List and Reorder:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

Answer: 1. Create a custom client device setting named Env. 2. In the Env custom setting, select Hardware Inventory. 3. In the Env custom setting, select Desktop (Win32_Desktop). 4. Deploy the Env custom setting to the All Marketing Users collection.

Explanation:http://technet.microsoft.com/en-us/library/gg712290.aspxHow to Extend Hardware Inventory in Configuration Manager

System Center 2012 Configuration Manager hardware inventory reads information about devices by usingWindows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-basedEnterprise Management (WBEM), which is an industry standard for accessing management information inan enterprise environment. In previous versions of Configuration Manager, you could extend hardware inventory by modifying the filesms_def.mof on the site server. ..In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did inConfiguration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes tocollect by hardware inventory by using client settings. Configuration Manager provides the followingmethods to extend hardware inventory:

Enable or disable existing inventory classes - You can enable or disable the default inventory classesused by Configuration Manager or you can create custom client settings that allow you to collectdifferent hardware inventory classes from specified collections of clients.

Add a new inventory class - You can add a new inventory class from the WMI namespace ofanother device. Import and export hardware inventory classes - You can import and export Managed Object Format(MOF) files that contain inventory classes from the Configuration Manager console. Create NOIDMIF Files - Use NOIDMIF files to collect information about client devices that cannot beinventoried by Configuration Manager.Create IDMIF Files - Use IDMIF files to collect information about assets in your organization that arenot associated with a Configuration Manager client, for example, projectors, photocopiers and networkprinters.

http://msdn.microsoft.com/en-us/library/windows/desktop/aa394121%28v=vs.85%29.aspxWin32_Desktop class (Windows)

The Win32_Desktop WMI class represents the common characteristics of a user's desktop. The propertiesof this class can be modified by the user to customize the desktop.

Further information:The screenshots show the wizard screen. Since we need to inventory WMI information, that means we need Hardware Inventory and you can only dothat with a Custom Client Device Setting:

QUESTION 52Your network contains a single Active Directory domain . The functional level of the domain is Server 2003. The domain contains the following servers:· Ten servers that run Windows Server 2003· Twenty servers that run Windows Server 2008· One server that has Microsoft Exchange Server 2007 installed · One server that has System Center 2012 Configuration Manager installed

Users have mobile devices that run Windows Mobile 6.5 and Windows Phone 7.0 .

You need to ensure that you can manage the settings of the mobile devices and perform remotedevice wipes by using Configuration Manager .

What should you do? (Chose all that apply.)

A. Upgrade all of the Windows 2003 domain controllers to Windows 2008 R2.B. Upgrade the Exchange server to Exchange Server 2010.C. Configure an Exchange connector.D. Change the functional level of the domain to Windows 2008.E. Upgrade all of the domain controllers to Windows 2008 R2.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Answer: Upgrade the Exchange server to Exchange Server 2010. Configure an Exchange connector.

Explanation:http://technet.microsoft.com/en-us/library/gg682077.aspx#BKMK_SupConfigMobileClientReqSupported Configurations for Configuration Manager - Configuration Manager System Requirements -Mobile Device Requirements

The following sections describe the hardware and operating systems that are supported for managingmobile devices in System Center 2012 Configuration Manager:

Windows Mobile 6.1Windows Mobile 6.5Nokia Symbian BelleWindows Phone 8Windows RTiOSAndroidWindows CE 5.0 (Arm and x86 processors) Windows CE 6.0 (Arm and x86 processors) Windows CE 7.0 (Arm and x86 processors) Windows CE 7.0 (Arm and x86 processors)

Mobile Device Support by Using the Exchange Server ConnectorSystem Center 2012 Configuration Manager offers limited management for mobile devices when you usethe Exchange Server connector for Exchange Active Sync (EAS) capable devices that connect to a serverrunning Exchange Server or Exchange Online.

The following table lists the platforms that support the Exchange Server connector and which versions ofConfiguration Manager support each platform:

Exchange Server 2010 SP1 Configuration Manager with no service packConfiguration Manager with SP1

Exchange Server 2010 SP2Configuration Manager with SP1

Exchange Server 2013Configuration Manager with SP1

Exchange Online (Office 365)Configuration Manager with no service packConfiguration Manager with SP1

http://technet.microsoft.com/en-us/library/gg682022.aspxDetermine How to Manage Mobile Devices in Configuration Manager

Use the following information to help you decide how to manage mobile devices in System Center 2012Configuration Manager. You can use Configuration Manager to enroll mobile devices and install theConfiguration Manager client, you can use the mobile device legacy client (for example, for Windows CEmobile operating systems), and you can use the Exchange Server connector. In addition, in ConfigurationManager SP1, you can enroll devices that run Windows Phone 8, Windows RT, and iOS by using theWindows Intune connector...Settings:

Enrollment by Windows Intune Enrollment by Configuration Manager Exchange Server connector

..Remote wipe:

Enrollment by Windows Intune Enrollment by Configuration Manager Exchange Server connector

QUESTION 53Your network contains a System Center 2012 Configuration Manger environment.

You deploy an application to 1,000 client computers .

You need to identify which client computers are in the process of installing the application .

Which node should you select in the Configuration M anager console ?To answer, select the appropriate node in the answer area.

Hot Area:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Answer : the Deployments node

Explanation :http://technet.microsoft.com/en-us/library/gg682201How to Monitor Applications in Configuration Manager

In Microsoft System Center 2012 Configuration Manager, you can monitor the deployment of all software,including software updates, compliance settings, applications, task sequences, and packages andprograms. You can monitor deployments by using the Monitoring workspace in the Configuration Managerconsole or by using reports.

Applications in Configuration Manager support state-based monitoring, which allows you to track the lastapplication deployment state for users and devices. These state messages display information aboutindividual devices. For example, if an application is deployed to a collection of users, you can view thecompliance state of the deployment and the deployment purpose in the Configuration Manager console.

An application deployment state has one of the following compliance states:Success – The application deployment succeeded or was found to be already installed.In Progress – The application deployment is in progress.Unknown – The state of the application deployment could not be determined. This state is not applicablefor deployments with a purpose of Available. This state is typically displayed when state messages fromthe client are not yet received.Requirements Not Met – The application was not deployed because it was not compliant with adependency or a requirement rule, or because the operating system to which it was deployed was notapplicable.Error – The application failed to deploy because of an error.

...

To monitor the state of an application in the Configuration Manager console1. In the Configuration Manager console, click Monitoring.2. In the Monitoring workspace, click Deployments.3. To review deployment details for each compliance state and the devices in that state, select a

deployment, and then, on the Home tab, in the Deployment group, click View Status to open theDeployment Status pane. In this pane, you can view the assets with each compliance state. Click anyasset to view more detailed information about the deployment status to that asset.

4. To review general status information about an application deployment, select a deployment, and thenclick the Summary tab in the Selected Deployment window.

5. To review information about the applications deployment type, select a deployment, and then click theDeployment Types tab in the Selected Deployment window.

QUESTION 54Your network contains a System Center 2012 Configuration Manager environment.

You have a sales department that contains 500 employees , 20 of whom are sales managers . Each salesdepartment employee has a desktop computer that is configured as their primary device .The sales managers frequently log on to computers in the marketing department .You plan to deploy a new sales application named App1 .

You need to ensure that App1 is only available to the s ales department employees when they log onto their primary device .

What should you do?

A. In a requirement rule, set Organization Unit = Sales.B. In Client Settings, set Allow user to define their primary devices to False.C. In a requirement rule, set Primary Device = True.D. In Client Settings, set Allow user to define their primary devices to True.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : In a requirement rule, set Primary Device = True.

Explanation :http://technet.microsoft.com/en-us/library/gg699365.aspxHow to Manage User Device Affinity in Configuration Manager

User device affinity in Microsoft System Center 2012 Configuration Manager is a method of associating auser with one or more specified devices. User device affinity can eliminate the need to know the names of auser’s devices in order to deploy an application to that user. Instead of deploying the application to all of theuser’s devices, you deploy the application to the user. Then, user device affinity automatically ensures thatthe application install on all devices that are associated with that user.

You can define primary devices. These are typically the devices that users use on a daily basis to performtheir work. When you create an affinity between a user and a device, you gain more software deploymentoptions. For example, if a user requires Microsoft Office Visio, you can install it on the user’s primary deviceby using a Windows Installer deployment. However, on a device that is not a primary device, you mightdeploy Microsoft Office Visio as a virtual application. You can also use user device affinity to predeploysoftware on a user’s device when the user is not logged in. Then, when the user logs on, the application isalready installed and ready to run.

http://technet.microsoft.com/en-us/library/gg682174.aspxHow to Create Deployment Types in Configuration Manager

Steps to Create a Deployment TypeStep 1: Start the Create Deployment Type Wizard.Step 2: Specify whether you want to automatically detect or to manually define the deployment typeinformation.Step 3: Specify the content options for the deployment type.Step 4: Configure the detection methods to indicate the presence of the application.Step 5: Specify the user experience options for the deployment type.Step 6: Specify the requirements for the deployment type.

Requirements are used to specify the conditions that must be met before a deployment typecan be installed on a client device.

Step 7: Specify the dependencies for the deployment type.Step 8: Confirm the deployment type settings and complete the wizard.Step 9: Configure additional options for the deployment types that contain virtual applications.

http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step61Step 6: Specify Requirements for the Deployment Type

1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the CreateRequirement dialog box, and add a new requirement.

2. From the Category drop-down list, select whether this requirement is for a device or a user, or selectCustom to use a previously created global condition. When you select Custom, you can also clickCreate to create a new global condition.

Important: If you create a requirement of the category User and the condition Primary Device,and then deploy the application to a device collection, the requirement will evaluate as false.

3. From the Condition drop-down list, select the condition that you want to use to assess whether the useror device meets the installation requirements. The contents of this list will vary depending on theselected category.

4. From the Operator drop-down list, choose the operator that will be used to compare the selectedcondition to the specified value to assess whether the user or device meets in the installationrequirement. The available operators will vary depending on the selected condition.

5. In the Value field, specify the values that will be used with the selected condition and operator whetherthe user or device meets in the installation requirement. The available values will vary depending on theselected condition and the selected operator.

6. Click OK to save the requirement rule and exit the Create Requirement dialog box.7. On the Requirements page of the Create Deployment Type Wizard, click Next.

QUESTION 55Your company uses System Center 2012 Configuration Manager to deploy applications .

The company purchases a new application named App1 . App1 can be installed only on client computersthat run Windows 7 .

You need to ensure that App1 is installed only on Wind ows 7 computers that have at least 2 Gb of

memory and 300 Gb of free disk space .

What should you create ?

A. a Query objectB. custom client user settingsC. a configuration baselineD. requirement rules

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer : a requirement rules

Explanation :http://technet.microsoft.com/en-us/library/gg682082.aspxHow to Deploy Applications in Configuration Manager

Before you can deploy an application in Microsoft System Center 2012 Configuration Manager, you mustcreate at least one deployment type for the application.

http://technet.microsoft.com/en-us/library/gg682174.aspxHow to Create Deployment Types in Configuration Manager

Steps to Create a Deployment TypeStep 1: Start the Create Deployment Type Wizard.Step 2: Specify whether you want to automatically detect or to manually define the deployment typeinformation.Step 3: Specify the content options for the deployment type.Step 4: Configure the detection methods to indicate the presence of the application.Step 5: Specify the user experience options for the deployment type.Step 6: Specify the requirements for the deployment type.

Requirements are used to specify the conditions that must be met before a deployment typecan be installed on a client device.

Step 7: Specify the dependencies for the deployment type.Step 8: Confirm the deployment type settings and complete the wizard.Step 9: Configure additional options for the deployment types that contain virtual applications.

http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step61Step 6: Specify Requirements for the Deployment Type

1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the CreateRequirement dialog box, and add a new requirement.

2. From the Category drop-down list, select whether this requirement is for a device or a user, or selectCustom to use a previously created global condition. When you select Custom, you can also clickCreate to create a new global condition.

Important: If you create a requirement of the category User and the condition Primary Device,and then deploy the application to a device collection, the requirement will evaluate as false.

3. From the Condition drop-down list, select the condition that you want to use to assess whether the useror device meets the installation requirements. The contents of this list will vary depending on theselected category.

4. From the Operator drop-down list, choose the operator that will be used to compare the selectedcondition to the specified value to assess whether the user or device meets in the installationrequirement. The available operators will vary depending on the selected condition.

5. In the Value field, specify the values that will be used with the selected condition and operator whetherthe user or device meets in the installation requirement. The available values will vary depending on theselected condition and the selected operator.

6. Click OK to save the requirement rule and exit the Create Requirement dialog box.7. On the Requirements page of the Create Deployment Type Wizard, click Next.

http://technet.microsoft.com/en-us/library/gg682048.aspx

How to Create Global Conditions in Configuration Manager

In System Center 2012 Configuration Manager, global conditions are rules that represent business ortechnical conditions that you can use to specify how an application is provided and deployed to clientdevices.

QUESTION 56Your company uses System Center 2012 Configuration Manager to distribute operating system images .

You receive 300 new desktop computers. All of the client computers have the same hardwareconfiguration . When you attempt to deploy a Windows 7 image to one of the client computers, you receive an errormessage indicating that a storage device cannot be found during the pre-boo t deployment phase .

You need to ensure that you can deploy Windows 7 to the new computers by using an image .

What should you do?

A. Update the existing boot image to include the storage drivers.B. Clear the contents of the Drivers container and update the task sequence.C. Import the storage drivers to the Drivers container and update the task sequence.D. Create a new driver package and update the task sequence.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer: Update the existing boot image to include the storage drivers.

Explanation:http://technet.microsoft.com/en-us/library/gg712674.aspxPlanning a Device Driver Strategy in Configuration Manager

...Planning a Device Driver Strategy in Configuration Manager

You can add Windows device drivers that have been imported into the driver catalog to boot images.Use the following guidelines when you add device drivers to a boot image:

* Add only mass storage and network adapter device drivers to boot images because other types ofdrivers are not generally required. Drivers that are not required increase the size of the boot imageunnecessarily.* Add only device drivers for Windows 7 to a boot image because the required version of WindowsPE is based on Windows 7.* Ensure that you use the correct device driver for the architecture of the boot image. Do not add anx86 device driver to an x64 boot image.

QUESTION 57Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Manager environm ent as shown in theexhibit. (Click the Exhibit button.)(The exhibit shows that: Server5 and Server6 are in the perimeter network , while Server1, Server2,Server3, and Server4 are in the internal network .)

The network contains six servers. The servers are configured as shown in the following table.

You need to ensure that mobile device information is av ailable in the hardware inventory .

What should you do first?

Exhibit:

A. Install a management point on Server5.B. Configure IIS to support only HTTPS on Server5.C. Install a management point on Server2.D. Install Network Load Balancing (NLB) on Server3.E. Install an enrollment proxy point on Server6.F. Configure IIS to support only HTTP on Server3.

G. Configure the Exchange connector on Server3.H. Install Network Load Balancing (NLB) on Server6.I. Install a PXE-enabled protected distribution point on Server5.J. Install the Windows Cluster service on Server3.K. Install a PXE-enabled protected distribution point on Server4.L. Install the Windows Cluster service on Server6.M. Install Windows Server Update Services (WSUS) on Server3.N. Install a protected distribution point on Server1.O. Install a software update point on Server3.

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Answer : Configure the Exchange connector on Server3.

Personal comment:the "Exchange connector" has precedence over the "enrollment proxy".

Explanation :http://technet.microsoft.com/en-us/library/gg682022.aspxDetermine How to Manage Mobile Devices in Configuration Manager

Use the following information to help you decide how to manage mobile devices in System Center 2012Configuration Manager. You can use Configuration Manager to enroll mobile devices and install theConfiguration Manager client, you can use the mobile device legacy client (for example, for Windows CEmobile operating systems), and you can use the Exchange Server connector. In addition, in ConfigurationManager SP1, you can enroll devices that run Windows Phone 8, Windows RT, and iOS by using theWindows Intune connector.

The following table lists these four mobile device management methods and provides information about themanagement functions that each method supports:..

...

http://technet.microsoft.com/en-us/library/gg681976.aspx#BKMK_Determine_EnrollmentPointsDetermine the Site System Roles for Client Deployment in Configuration Manager - Determine WhetherYou Require an Enrollment Point and an Enrollment Proxy PointConfiguration Manager requires the enrollment point and the enrollment proxy point to enroll mobile devicesand to enroll certificates for Mac computers (Configuration Manager SP1 only). These site system roles arenot required if you will manage mobile devices by using the Exchange Server connector, or if you install themobile device legacy client (for example, for Windows CE), or if you request and install the client certificateon Mac computers independently from Configuration Manager.

QUESTION 58Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Manager environm ent as shown in theexhibit. (Click the Exhibit button.)(The exhibit shows that: Server5 and Server6 are in the perimeter network , while Server1, Server2,Server3, and Server4 are in the internal network .)

The network contains six servers. The servers are configured as shown in the following table.

You need to ensure that mobile device information is av ailable in the hardware inventory .

What should you do first?

Exhibit:

A. Install a management point on Server5.B. Configure IIS to support only HTTPS on Server5.C. Install a management point on Server2.

D. Install Network Load Balancing (NLB) on Server3.E. Install an enrollment proxy point on Server6.F. Configure IIS to support only HTTP on Server3.G. Install a software update point on Server3.H. Install Network Load Balancing (NLB) on Server6.I. Install a PXE-enabled protected distribution point on Server5.J. Install the Windows Cluster service on Server3.K. Install a PXE-enabled protected distribution point on Server4.L. Install the Windows Cluster service on Server6.M. Install Windows Server Update Services (WSUS) on Server3.N. Install a protected distribution point on Server1.

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Answer : Install an enrollment proxy point on Server6.

Personal comment:This is almost a discussion about which came first: the chicken or the egg.At first glance, I would have said that the correct answer is "Configure the Exchange connector on Server3".However, that answer is not available in this question, leaving only the "Enrollment Proxy Point" as apossible answer.

Explanation :http://technet.microsoft.com/en-us/library/gg712327.aspxHow to Install Clients on Mobile Devices and Enroll Them by Using Configuration Manager

When you enroll mobile devices by using System Center 2012 Configuration Manager, this action installsthe System Center 2012 Configuration Manager client to provide management capabilities that include hardware inventory, software deployment for required applications, settings, and remote wipe. ..To enroll these mobile devices, you must use Microsoft Certificate Services with an enterprise certificationauthority (CA) and the Configuration Manager enrollment point and enrollment proxy point site system roles.During and after enrollment, public key infrastructure (PKI) certificates secure the communication betweenthe mobile device and the Configuration Manager site. When the certificate on the mobile device is due forrenewal, users are automatically prompted to renew their certificate. When they confirm the prompt,Configuration Manager automatically re-enrolls their mobile device...Use the following steps and the supplemental procedures to install the client and enroll mobile devices inConfiguration Manager. After you complete these steps, you can monitor the mobile devices that areenrolled by viewing the collections that display mobile devices, and by using the reports for mobile devices:

Further information:http://technet.microsoft.com/en-us/library/gg682022.aspxDetermine How to Manage Mobile Devices in Configuration Manager

Use the following information to help you decide how to manage mobile devices in System Center 2012Configuration Manager. You can use Configuration Manager to enroll mobile devices and install theConfiguration Manager client, you can use the mobile device legacy client (for example, for Windows CEmobile operating systems), and you can use the Exchange Server connector. In addition, in ConfigurationManager SP1, you can enroll devices that run Windows Phone 8, Windows RT, and iOS by using theWindows Intune connector.

The following table lists these four mobile device management methods and provides information about themanagement functions that each method supports:..

...

QUESTION 59Your network contains a System Center 2012 Configuration Manger environment.

You deploy the Configuration Manager client to all client computers .You enable Hardware Inventory and Software Inventory for all of the client computers .You discover that one of the client computers fails to report invent ory data .

You confirm that the inventory files are copied correctly to the sit e server . You discover , however, that the site server does not contain any data from the client computer .

You need to identify what is causing the reporting issu e.

Which log file should you review?

A. Dataldr.logB. Mp_hinv.logC. Inventoryagent.logD. Contenttransfermanager.log

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : dataldr.log

Explanation :http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

dataldr.logSite Server log fileRecords information about the processing of Management Information Format (MIF) files andhardware inventory in the Configuration Manager database.

Further information 1 :

MP_Hinv.logSite system server log fileRecords details about the conversion of XML hardware inventory records from clients and the copyof those files to the site server.

InventoryAgent.logClient log fileRecords activities of hardware inventory, software inventory, and heartbeat discovery actions on theclient.

Contenttransfermanager.logClient log fileSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB)to download or to access packages.

Further information 2 :http://technet.microsoft.com/en-us/library/bb932206.aspxTroubleshooting Configuration Manager Performance

Slow Hardware Inventory Processing - Solution

If you suspect that hardware inventory report processing is slow for a Configuration Manager 2007 site, thefollowing actions should be taken:

Inspect the client inventoryagent.log log file to determine whether the client is sending delta hardwareinventory reports or full reports. After initial client deployment, a very high percentage of hardwareinventory reports should be deltas, which contain much less data than full inventory reports. If you areseeing a significant number of full inventory reports, this could be caused by inconsistent inventoryreport processing by the site server. For example, a delta hardware inventory report could be processedbefore a full inventory report for the same system has been processed. In this situation, a hardwareinventory resynchronization request will be sent to the client and an additional full inventory report will begenerated. To determine whether this is happening, review the dataldr.log log file on the site server.Inspect the size of the hardware inventory files in the site server's inbox directory to determine whetherthe software inventory files have grown significantly from previous inventory reports. If hardwareinventory report file sizes have grown beyond an initial hardware inventory report file size baseline, youshould determine the cause and whether the larger inventory report files are expected to be larger. Onepossibility is that the site’s SMS_def.mof file has been modified to collect more inventory informationfrom clients.Determine whether there is a consistent SMS_def.mof hardware inventory reporting file in usethroughout the hierarchy. If not, the hardware inventory processor might be running very slowly becauseof changes in the database schema caused by the different SMS_def.mof files throughout the hierarchy.The dataloader.log log file will record instances of database schema changes and should be reviewedwhen investigating this issue.

This article was originally written for SMS, but the same principles should apply to SCCM 2012:http://technet.microsoft.com/en-us/library/cc723597.aspx Chapter 20 - Hardware and Software Inventory Flowcharts

If a backlog of MIF files accumulates at the site server (that is, if MIF files are not being processed): Examine the Inventory Data Loader status messages or the Dataldr.log file to determine whether theInventory Data Loader has been able to connect to the SMS site database server. Inventory DataLoader might be unable to write a discovered client's MIF to the database.

If the MIF files are not being processed on the site server: Verify that Inventory Data Loader successfully parsed the MIF file by checking Inventory Data Loaderstatus messages or the Dataldr.log file. If the MIF file cannot be processed, it will be transferred to the\Badmifs directory.

If inventory from clients is not being reported to a new parent site: Examine the Dataldr.log file to verify that Inventory Data Loader has read the *.sha file, stopped all newMIF file processing, and is creating MIF files for each client's data in the site database to forward to theparent site.

QUESTION 60Your network contains a System Center 2012 Configuration Manager environment.

Software Inventory and Hardware Inventory are enabled for all of the client computers .

All of the client computers have an Application named App1 installed . App1 saves files to the C:\Program Files\App1 folder . All of the files saved by App1 have a file name extension of .xyz . You configure Software Inventory to inventory all of the files that have the .xyz exten sion and the .exeextension . After six months, you discover that some of the client computers fad to inventory .xyz files . All of the client computers inventory .exe files. You need to ensure that the .xyz files are inventoried .

What should you do?

A. Modify C:\NO_SMS_On_Drive.sms.B. Delete C:\NO_SMS_On_Drive.sms.C. Modify C:\Program Files\App1\Skpswi.dat.

D. Delete C:\Program Files\App1\Skpswi.dat.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer: Delete C:\Program Files\App1\Skpswi.dat.

Explanation: http://technet.microsoft.com/en-us/library/hh691018.aspxHow to Exclude Folders from Software Inventory in Configuration Manager

You can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude itfrom System Center 2012 Configuration Manager software inventory. You can also place this file in the rootof any folder structure you want to exclude from software inventory. This procedure can be used to disablesoftware inventory on a single workstation or server client, such as a large file server.

Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive onthe client computer.

QUESTION 61Your network contains a System Center 2012 Configuration Manager environment.

The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2 . You discover that none of the collections created on Site1 are displa yed on Site2.

You need to identify whether there is replication issue between the sites .

What should you review ?

A. the Colleval.log file.B. the Despool.log fileC. the Rcmctrl.log fileD. the Sender.log file

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer: the Rcmctrl.log file

Explanation:http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_SiteSiteServerLogTechnical Reference for Log Files in Configuration Manager - Site Server and Site System Server Logsrcmctrl.log :

Site server log fileRecords the activities of database replication between sites in the hierarchy.

Further information 1 :http://blogs.technet.com/b/sudheesn/archive/2012/10/21/drs-initialization-in-configuration-manager-2012.aspxDRS Initialization In Configuration Manager 2012 ...We have two kind of logging in ConfigMgr 2012. For DRS initialization we can use the rcmctrl.log andinside the database vlogs view. ...

http://anoopcnair.com/2012/06/20/sccm-configmgr-2012-site-to-site-replication-sql-data-replication-service-replication-configuration-management-sql-service-broker-replication-groups-and-manual-sync/SCCM ConfigMgr 2012 Site to Site replication and SQL Replication Guide

New (SQL) site to site replication model is the most challenging but very interesting part (at least for me) ofSystem Center 2012 Configuration Manager. So, I thought of sharing the some points which are mainpillars of SQL replication model.Key components of new (SQL) replication model 1. DRS – Data Replication Service2. SSB – SQL Service Broker3. RCM – Replication Configuration Management/Monitoring4. RG – Replication Group5. Replication Pattern6. Article Name/s

DRS – Data Replication Service / SSB – SQL Service BrokerTo replicate the data between configmgr sites, Conf iguration Manager uses Database ReplicationService (DRS). The DRS intern uses SQL Server Service Broker (SSB) to replicate data between the sites.

http://blogs.technet.com/b/server-cloud/archive/2012/03/06/data-replication-in-system-center-2012-configuration-manager.aspxData Replication in System Center 2012 Configuration Manager

http://technet.microsoft.com/en-us/library/gg712701.aspx#Planning_Inter_Site_ComPlanning for Communications in Configuration Manager - Planning for Intersite Communications inConfiguration Manager

Further information 2 :http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_DiscoveryLogTechnical Reference for Log Files in Configuration Manager - DiscoveryInventoryAgent.log :

Client log fileRecords activities of hardware inventory, software inventory, and heartbeat discovery actions on theclient.

http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_SiteSiteServerLogTechnical Reference for Log Files in Configuration Manager - Site Server and Site System Server LogsDespool.log

Site server log fileRecords incoming site-to-site communication transfers.

QUESTION 62Your network contains a System Center 2012 Configuration Manger environment.

You write the following query :

select SYS.Name from SMS_R_System SYS join SMS_G_System_ADD_REMOVE_PROGRAMS ARP on ARP.ResourceID = SYS.ResourceId

You need to create a list of all the client computers that have a version of Microsoft Office installed .

What should you add to the query ?

A. where ARP.DisplayName like "Microsoft Office*"B. where ARP.DisplayName = "Microsoft Office*"C. where ARP.DisplayName like "Microsoft Office%"D. where ARP.DisplayName = "%Microsoft Office"

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : where ARP.DisplayName like "Microsoft Office%"

Explanation :You need to use "LIKE" not "=" otherwise the WildCard "%" is seen as a real identifier.

QUESTION 63Your network contains a System Center 2012 Configuration Manger environment.

The environment contains a reporting services point .

You need to identify which tools can be used to create and publish custom reports to Microsoft SQLServer Reporting Services (SSRS) .

Which tool should you identify?

A. Reporting Services Configuration ManagerB. Microsoft SQL Server Management StudioC. Microsoft SQL Server Business Intelligence Development StudioD. Microsoft Access 2010 and Reporting Services Configuration Manager

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Microsoft SQL Server Business Intelligence Development Studio

Explanation :http://technet.microsoft.com/en-us/library/gg508710.aspxOverview of Custom Reports

Custom reports are intended for advanced users who are comfortable creating their own reports by using Microsoft SQL Server Reporting Services and SQL Server Business Intelligence Development Studio, SQLServer Reporting Services Report Builder, or Microsoft Visual Studio Report Designer.

Further information :http://msdn.microsoft.com/en-us/library/ms155792(v=sql.100)Reporting Services Components and Tools

http://msdn.microsoft.com/en-us/library/ms345231.aspxCustom Report Items

http://msdn.microsoft.com/en-us/library/ms345253Custom Report Item Implementation Requirements

http://technet.microsoft.com/en-us/library/gg682105.aspxIntroduction to Reporting in Configuration Manager

http://technet.microsoft.com/en-us/library/hh338693.aspxCreating Custom Report Models in SQL Server Reporting Services

QUESTION 64Your network contains a System Center 2012 Configuration Manager environment.

You need to use the Configuration Manger console to identify s ervice level agreement (SLA) issuesamong non-compliant clients .

What should you do?

A. Configure a Microsoft SQL Server Reporting Services (SSRS) report.B. Create an alert subscription.C. Configure an in-console alert.D. Create a ConfigMgr query.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Configure an in-console alert.

Explanation :http://myitforum.com/myitforumwp/2012/06/26/client-health-check-in-configmgr-2012in-actionpart-2/Client Health Check in ConfigMgr 2012–In Action–Part 2

...Over here, we can clearly see that it failed to verify if the SMS Agent Host Service exists and it failed witherror code 5 (Access Denied). Other than this, we can also see that few other evaluation tasks did not runbecause the tasks they were dependent on failed.

Once this evaluation was complete, I checked the ConfigMgr Console to see what all is shown over there.So we go to ConfigMgr Console > Monitoring > Client Status > Client Check. Over here we get graphicalview which gives summary of Client Checks.

So now, I can see that there is 1 machine which failed the Client Check. if we click on the Red/Green Areaof the graph, it takes us to a Temporary Monitoring Collection. I clicked on the Red Area and it took me to acollection named “Clients that failed client check from “All Desktop and Server Clients”

So we can see that there is one machine which failed the Client Check. At the bottom on the screen, Iclicked on Client Check Detail Tab

So now, I can see that “Verify SMS Agent Host service exists” task failed with the error “Access is Denied”and this caused 3 other evaluation tasks to fail because they were dependent on the first task. Pretty NiceThing!!

We can even configure alerts based on Client Checks. For this, I opened the properties of the collection myclient is a part of and went Alerts Tab.

Click on Add

I selected the option “Client check pass or no results for active clients falls below threshold (%)”. Afterclicking OK it took me back to the Properties of the Collection.

Now, we get an option to select the Severity of the Alert and SLA. I selected “Warning” as he Severity and90 as the SLA. So whenever the Client Check Fail Percentage falls below 90%, I’ll get an alert in theconsole. Now, if we go to Monitor > Alerts. We can see that an alert has been created.

..

Further information :http://technet.microsoft.com/en-us/library/hh427334.aspxConfiguring Alerts in Configuration Manager

Alerts in System Center 2012 Configuration Manager are generated by some operations when a specificcondition occurs. Typically, alerts are generated when an error occurs that you must resolve. Additionally,an alert might be generated to warn you that a condition exists so that you can continue to monitor thesituation. You can configure alerts for some Configuration Manager operations, such as EndpointProtection and client status, whereas some alerts are configured automatically. Additionally, you canconfigure subscriptions to alerts for client status and Endpoint Protection that will be emailed to you.

Personal comment:"Create an alert subscription." is not a correct answer because it only reffers to e-mailing alerts.

QUESTION 65Your network contains a System Center 2012 Configuration Manger environment.

You need to create a report that list all of the client comput ers that have an application named App1installed .

Which query should you use to create the report?

A. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_Sytem AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceIDWHERE ARP.DisplayName0 NOT LIKE 'App1'

B. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID NOT IN(SELECT SYS.ResouceIDFROM v_R_System AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1')

C. SELECT SYS.Netbios_Name0, ARP.DisplayName0FROM v_R_Sytem AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceIDWHERE ARP.DisplayName0 NOT IN ('App1')

D. SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID IN(SELECT SYS.ResouceIDFROM v_R_System AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1')

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer :

SELECT SYS.Netbios_Name0 from v_R_System SYSWHERE SYS.ResourceID IN(SELECT SYS.ResouceID

FROM v_R_System AS SYS INNER JOINv_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceIDWHERE ARP.DisplayName0 = 'App1')

Explanation :SELECT computer name FROM table v_R_System (SQL Syntax)WHERE resource ResourceID is INAdd Remove Programs WHERE DisplayName0 = 'App1'

http://www.w3schools.com/sql/sql_join_inner.aspSQL INNER JOIN Keyword

The INNER JOIN keyword returns rows when there is at least one match in both tables.

QUESTION 66Your network contains a System Center 2012 Configuration Manager environment.

You need to create a collection that contains all of t he virtual machines .

Which query should you use?

A. select * from SMS_R_Systemwhere SMS_R_System.ResourceID not in (select ResourceID from SMS_R_System where SMS_R_System.IsVirtualMachine != 1)

B. select * from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine != 1

C. select * from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine = 1

D. select * from SMS_R_System

where SMS_R_System.ResourceID not in (select ResourceID from SMS_R_System where SMS_R_System.IsVirtualMachine = 1)

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer :

select * from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine = 1

Explanation :

SELECT all FROM Systems TableWHERE System property IsVirtualMachine = TRUE

QUESTION 67Your network contains a System Center 2012 Configuration Manger environment.

You create a report that lists compliance information .You schedule the report to run every day at 20:00 .

You need to ensure that on Friday, you can review the r esults of the report created on the previousMonday .

What should you configure the report to do ?

A. Use caching.B. Use a shared schedule.C. Render on Friday.D. Use snapshots.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer : Use snapshots.

Explanation :http://technet.microsoft.com/en-us/library/ms156325.aspxCreating, Modifying, and Deleting Snapshots in Report History

Report history is a collection of report snapshots. You can maintain report history by adding and deletingsnapshots, or by modifying properties that affect report history storage. You can create report historymanually or on a schedule.

Further information :http://technet.microsoft.com/en-us/library/ms157447.aspxCache a Report (Report Manager)One way to improve performance is to configure caching properties for a report. When a report is cached, acopy of the rendered report is saved for a short period of time. The first user who requests the report mustwait for all processing to complete before viewing the report. Subsequent users who request the reportwithin the caching period can view it right away because processing has already occurred.

QUESTION 68Your network contains an Active Directory forest . The forest contains a System Center 2012 Configuration Manager environment. The environment contains one primary site .

You need to ensure that the members of a group named G roup1 are allowed to deploy applicationsto desktop computers . The solution must minimize the number of permissions assigned to Grou p1.

What should you do?

A. Assign the Application Administrator security role to Group1. Create a new collection that contains allof the desktop computers. Add Group1 to the local Administrators group on each desktop computer.

B. Add the Applicaton Deployment Manager security role to Group1. Create a new collection thatcontains all of the desktop computers. Add Group1 to the local Administrators group on each desktopcomputer.

C. Assign the Application Deployment Manager security role to Group1. Create a new collection thatcontains all of the desktop computers. Scope Group1 to the new collection.

D. Assign the Application Administrator security role to Group1. Create a new collection that contains allof the desktop computers. Scope Group1 to the new collection.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.

Explanation :http://technet.microsoft.com/en-us/library/hh524341.aspxGlossary for Microsoft System Center 2012 Configuration Manager

Application AdministratorA security role that grants permissions to administrative users so that they can perform both theApplication Deployment Manager role and the Application Author role.

Application Deployment ManagerA security role that grants permissions to administrative users so that they can deploy and monitorapplications.

http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-2012-configuration-manager.aspxRole-Based Administration in System Center 2012 Configuration Manager

In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions(operations) for assignment to an Administrator. Instead of an individual permission set on a single instanceof object, the Security Role provides a single Role assignment to an administrator; reducing the overallcomplexity with permission management. An “object” in the Security Role is something that you want tomanage access to and “permission” is the operational functions, such as Read, Modify and Delete.

QUESTION 69Your network contains a single Active Directory domain . The domain contains a System Center Configuration Manger 2007 site and a System Center 2012Configuration Manager site .

You need to ensure that you can migrate objects from Co nfiguration Manger 2007 to ConfigurationManager 2012 .

What should you do?

A. Assign the computer account of the Central Administration site server permission to the ConfigurationManger 2007 site.Assign the computer account of the Central Administration site server permission to the Microsoft SQLServer database instance.

B. Connect the Configuration Manager 2007 primary site as a child primary site of the ConfigurationManager 2012 primary site.

C. Extend the Active Directory schema and assign the Central Administration site server permissions to theSystem\System Management container.

D. Connect the Configuration Manager 2012 primary site as a child primary site of the ConfigurationManager 2007 primary site.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : Assign the computer account of the Central Administration site server permission to theConfiguration Manger 2007 site. Assign the computer account of the Central Administration site server permission to the MicrosoftSQL Server database instance.

Explanation : http://technet.microsoft.com/en-us/library/gg712991.aspxDetermine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration Manager

In Microsoft System Center 2012 Configuration Manager, the built-in migration functionality replaces in-place upgrades of existing Configuration Manager infrastructure by providing a process that transfers datafrom active Configuration Manager 2007 sites. The functionality provided by migration helps you maintaininvestments that you have made in configurations and deployments while you can take full advantage ofcore changes in the product introduced in System Center 2012 Configuration Manager. These changesinclude a simplified Configuration Manager hierarchy that uses fewer sites and resources, and the improvedprocessing by use of native 64-bit code that runs on 64-bit hardware.Migration can transfer most data from Configuration Manager 2007.

http://technet.microsoft.com/en-us/library/gg681981.aspxPlanning for Migration to System Center 2012 Configuration Manager

You must first install a System Center 2012 Configuration Manager hierarchy to be the destination hierarchybefore you can migrate data from a supported source hierarchy.After you install the destination hierarchy, configure the management features and functions that you wantto use in your destination hierarchy before you start to migrate data.

http://technet.microsoft.com/en-us/library/gg712313.aspxPrerequisites for Migration in System Center 2012 Configuration Manager

To migrate from a supported source hierarchy, you must have access to each applicable ConfigurationManager source site, and permissions within the System Center 2012 Configuration Manager destinationsite to configure and run migration operations.

Required Configurations for Migration..

Data GatheringTo enable the destination site to gather data, you must configure the following two source siteaccess accounts for use with each source site:

* Source Site Account: This account is used to access the SMS Provider of the source site. * For a Configuration Manager 2007 SP2 source site, this account requires Read permissionto all source site objects.* For a System Center 2012 Configuration Manager source site, this account requires Readpermission to all source site objects, You grant this permission to the account by using role-based administration.

* Source Site Database Account: This account is used to access the SQL Server database of thesource site and requires Read and Execute permissions to the source site database.

You can configure these accounts when you configure a new source hierarchy, data gathering for anadditional source site, or when you reconfigure the credentials for a source site. These accounts canuse a domain user account, or you can specify the computer account of the top-level site of thedestination hierarchy.

Security Note: If you use the Configuration Manager computer account for either access account,ensure that this account is a member of the security group Distributed COM Users in the domainwhere the source site resides.

When gathering data, the following network protocols and ports are used: NetBIOS/SMB – 445 (TCP) RPC (WMI) - 135 (TCP) SQL Server - 1433 (TCP)

...

QUESTION 70Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Management environment.

The network contains 10 database servers that run Microsoft SQL Server 2008 . You have a configuration baseline that is used to monitor database servers .You confirm that all of the database servers downloaded the configuration basel ine .You discover that a database server named Server1 fails to report any data for the configurationbaseline .

You need to identify whether Server 1 evaluates the con figuration items that are part of theconfiguration baseline .

Which log file should you review?

A. Locationservices.logB. Smsexec.logC. Ccm.logD. Sdmagent.logE. Dcmagent.logF. Rcmctrl.logG. Wsyncmgr.logH. Ciagent.logI. Hman.logJ. Contenttransfermanager.logK. Sitestat.log

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Answer : Dcmagent.log

Explanation : http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

DCMAgent.logClient log fileRecords high-level information about the evaluation, conflict reporting, and remediation ofconfiguration items and applications.

Further information:Locationservices.log

Client log fileRecords the client activity for locating management points, software update points, and distributionpoints.

Smsexec.logSite server or site system server log fielRecords the processing of all site server component threads.

Ccm.logSite server log fileRecords client push installation activities.

Sdmagent.logClient log fileRecords details about tracking of remediation and compliance. However, the software updates logfile, Updateshandler.log, provides more informative details about installing the software updatesrequired for compliance.

Rcmctrl.logSite server log fileRecords the activities of database replication between sites in the hierarchy.

wsyncmgr.logSite server log fileRecords details about the software updates synchronization process.

Ciagent.logClient log fileRecords details about the process of remediation and compliance for compliance settings, softwareupdates, and application management.

hman.logSite server log fileRecords information about site configuration changes, and the publishing of site information in ActiveDirectory Domain Services.

ContentTransferManager.logClient log fileSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB)to download or to access packages.

Sitestat.logSite server log fileRecords the availability and disk space monitoring process of all site systems.

QUESTION 71Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

You enable Client Push .You run Active Directory System Discovery .You discover that some of the discovered computers do not have the System Center 2012Configuration Manager client installed .

You need to identify why Client Push fails of the clien t computers .

Which log file should you review?

A. Locationservices.logB. Smsexec.logC. Ccm.logD. Sdmagent.logE. Dcmagent.logF. Rcmctrl.log

G. Wsyncmgr.logH. Ciagent.logI. Hman.logJ. Contenttransfermanager.logK. Sitestat.log

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Answer : Ccm.log

Explanation : http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

Ccm.logSite server log fileRecords client push installation activities.

Further information:Locationservices.log

Client log fileRecords the client activity for locating management points, software update points, and distributionpoints.

Smsexec.logSite server or site system server log fielRecords the processing of all site server component threads.

Sdmagent.logClient log fileRecords details about tracking of remediation and compliance. However, the software updates logfile, Updateshandler.log, provides more informative details about installing the software updatesrequired for compliance.

DCMAgent.logClient log fileRecords high-level information about the evaluation, conflict reporting, and remediation ofconfiguration items and applications.

Rcmctrl.logSite server log fileRecords the activities of database replication between sites in the hierarchy.

wsyncmgr.logSite server log fileRecords details about the software updates synchronization process.

Ciagent.logClient log fileRecords details about the process of remediation and compliance for compliance settings, softwareupdates, and application management.

hman.logSite server log fileRecords information about site configuration changes, and the publishing of site information in ActiveDirectory Domain Services.

ContentTransferManager.logClient log file

Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB)to download or to access packages.

Sitestat.logSite server log fileRecords the availability and disk space monitoring process of all site systems.

QUESTION 72Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment.

You add a software update point to the environment.You receive a message indicating that SMS WSUS Synchron ization failed .

You need to retrieve additional information about the m essage .

Which log file should you review?

A. Locationservices.logB. Smsexec.logC. Ccm.logD. Sdmagent.logE. Dcmagent.logF. Rcmctrl.logG. Wsyncmgr.logH. Ciagent.logI. Hman.logJ. Contenttransfermanager.logK. Sitestat.log

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Answer : Wsyncmgr.log

Explanation : http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration Manager

wsyncmgr.logSite server log fileRecords details about the software updates synchronization process.

Further information:Locationservices.log

Client log fileRecords the client activity for locating management points, software update points, and distributionpoints.

Smsexec.logSite server or site system server log fielRecords the processing of all site server component threads.

Ccm.logSite server log file

Records client push installation activities.

Sdmagent.logClient log fileRecords details about tracking of remediation and compliance. However, the software updates logfile, Updateshandler.log, provides more informative details about installing the software updatesrequired for compliance.

DCMAgent.logClient log fileRecords high-level information about the evaluation, conflict reporting, and remediation ofconfiguration items and applications.

Rcmctrl.logSite server log fileRecords the activities of database replication between sites in the hierarchy.

Ciagent.logClient log fileRecords details about the process of remediation and compliance for compliance settings, softwareupdates, and application management.

hman.logSite server log fileRecords information about site configuration changes, and the publishing of site information in ActiveDirectory Domain Services.

ContentTransferManager.logClient log fileSchedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB)to download or to access packages.

Sitestat.logSite server log fileRecords the availability and disk space monitoring process of all site systems.

QUESTION 73Your company has a security policy that contains mandatory registry settings for all servers .You have a collection named servers that contains all servers.

You need to identify which servers do not comply with t he security policy .

It's a selection with 4 answers .

Build List and Reorder:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Answer :

1. Create new config, item2. Create new config. baseline3. Add the config. item to config. baseline4. Deploy the config. baseline to the server collection

Explanation :http://technet.microsoft.com/en-us/library/hh519648.aspxConfiguration Items in System Center 2012 - Service Manager

Configuration items are a way to store information about services, computers, software, software updates,users and other undefined imported objects in the Service Manager database in System Center 2012 –Service Manager. You can then select configuration items when you submit forms, such as an incidentform, a change request form, or a work item form.

http://technet.microsoft.com/en-us/library/gg712268.aspxHow to Create Configuration Baselines for Compliance Settings in Configuration Manager

Configuration baselines in System Center 2012 Configuration Manager contain predefined configurationitems and optionally, other configuration baselines. After a configuration baseline is created, you can deployit to a collection so that devices in that collection download the configuration baseline and assess theircompliance with it.

To create a configuration baseline1. In the Configuration Manager console, click Assets and Compliance.2. In the Assets and Compliance workspace, expand Compliance Settings, and then click Configuration

Baselines.3. On the Home tab, in the Create group, click Create Configuration Baseline.4. In the Create Configuration Baseline dialog box, enter a unique name and a description for the

configuration baseline. You can use a maximum of 255 characters for the name and 512 characters forthe description.

5. The Configuration data list displays all configuration items or configuration baselines that are included inthis configuration baseline. Click Add to add a new configuration item or configuration baseline to thelist. You can choose from the following:

* Configuration Items* Software Updates* Configuration Baselines

6. Use the Change Purpose list to specify the behavior of a configuration item that you have selected in theConfiguration data list. You can select from the following:

* Required: The configuration baseline is evaluated as noncompliant if the configuration item is notdetected on a client device. If it is detected, it is evaluated for compliance* Optional: The configuration item is only evaluated for compliance if the application it references isfound on client computers. If the application is not found, the configuration baseline is not marked asnoncompliant (only applicable to application configuration items).* Prohibited: The configuration baseline is evaluated as noncompliant if the configuration item isdetected on client computers (only applicable to application configuration items).

7. Use the Change Revision list to select a specific or the latest revision of the configuration item to assessfor compliance on client devices or select Always Use Latest to always use the latest revision.

8. If you want to remove a configuration item from the configuration baseline, select a configuration item,and then click Remove.

9. Click OK to close the Create Configuration Baseline dialog box and to create the configuration baseline.

http://technet.microsoft.com/en-us/library/hh219289.aspxHow to Deploy Configuration Baselines in Configuration Manager

Configuration baselines in System Center 2012 Configuration Manager must be deployed to one or morecollections of users or devices before client devices in those collections can assess their compliance withthe configuration baseline.

Use the Deploy Configuration Baselines dialog box to define configuration baseline deployments, whichincludes adding or removing configuration baselines from deployments in addition to specifying theevaluation schedule.

QUESTION 74Your network contains a System Center 2012 Configuration Manager environment.

The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2 .You discover that none of the packages created on Site1 are displayed in Site2 .

You need to identify whether there is a replication is sue between the sites .

What should you review?

A. the Inventoryagent.log file B. the Colleval.log file C. the Microsoft SQL Server replication diagnostic files D. the Despool.log file

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer: the Despool.log file

Explanation:Despool.log

Site server log fileRecords incoming site-to-site communication transfers.

Personal note:Usually, you look at the Rcmctrl.log file. But since that isn't one of the possible answers, you are left withthe Despool.log file.

Further information :http://technet.microsoft.com/en-us/library/hh427342.aspxTechnical Reference for Log Files in Configuration ManagerInventoryAgent.log

Client log fileRecords activities of hardware inventory, software inventory, and heartbeat discovery actions on theclient.

Colleval.logPrimary site and central administration site log fileRecords details about when collections are created, changed, and deleted by the CollectionEvaluator.

http://msdn.microsoft.com/en-us/library/ms151756%28v=sql.105%29.aspx SQL Server 2008 R2 - Troubleshooting (Replication)

QUESTION 75Your company uses System Center 2012 Configuration Manager to deploy applications .

The company purchases a new application named App1 . App1 can be installed only on client computers

that run Windows 7.

You need to ensure that App1 is installed only on Wind ows 7 computers that have at least 2 Gb ofmemory and 300 Gb of free disk space.

What should you create?

A. a Query objectB. custom client user settingsC. a configuration baselineD. a query-based collection

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer : a query-based collection

Personal note : Previous experience with this question is that the answer should be "a requirement rules".However, since this question does not provide that possibility, the next best thing is "a query-basedcollection".

Explanation :http://technet.microsoft.com/en-us/library/gg682177.aspxIntroduction to Collections in Configuration Manager

Collections in System Center 2012 Configuration Manager represent logical groupings of resources, suchas users and devices. You can use collections to help you perform many tasks, such as managingapplications, deploying compliance settings, or installing software updates. You can also use collections tomanage groups of client settings. ..Query RuleQuery rules dynamically update the membership of a collection based on a query that ConfigurationManager runs on a schedule. For example, you can create a collection of users who are a member of theHuman Resources organizational unit in Active Directory Domain Services. Unlike direct rule collections,this collection membership automatically updates when you add or remove new users to the HumanResources organizational unit.

Further information :http://technet.microsoft.com/en-us/library/gg682073.aspxPrerequisites for Compliance Settings in Configuration Manager.. To run queries related to compliance settings: Read permission for the Query object.

http://technet.microsoft.com/en-us/library/gg712688.aspxPlanning for Client Settings in Configuration ManagerUse client settings in System Center 2012 Configuration Manager to configure user and device settings forthe hierarchy. Client settings include configuration options such as the hardware inventory and schedule,and the polling schedule for client policy.

All Configuration Manager clients in the hierarchy use the Default Client Settings that are automaticallycreated when you install Configuration Manager. However, you can modify the default client settings andyou can create custom client settings to override the default client settings for specific users or devices.

http://technet.microsoft.com/en-us/library/gg682139.aspxIntroduction to Compliance Settings in Configuration Manager..Compliance is evaluated by defining a configuration baseline that contains the configuration items that youwant to evaluate and settings and rules that describe the level of compliance you must have.

QUESTION 76Your network contains a Windows Server Update Services (WSUS) server . All client computers are configured as WSUS clients . All of the client computers have Windows Firewall enabled . Windows Firewall is configured to allow File and Printer Sharing . Users are not configured as local Administrators on their client computers . You deploy System Center 2012 Configuration Manager .

You need to identify which methods you can use to deplo y the Configuration Manager client to anof the client computers .

Which client installation methods should you identify? (Choose all that Apply.)

A. a logon script installationB. a manual client installationC. a software update-based client installationD. a Client Push InstallationE. an Active Directory Group Policy-based installation

Correct Answer: CDESection: (none)Explanation

Explanation/Reference:Answer: a software update-based client installation a Client Push Installation an Active Directory Group Policy-based installation

Explanation:The Logon script runs with the user's credentials.Manual installation also runs with the user's credentials.Software update point uses the local SYSTEM account and All client computers are configured as WSUSclients. So the firewall should not affect functionality.Client Push Installation requires File and Printer Sharing and runs with the local SYSTEM account.Group Policy Installation requires File and Printer Sharing and runs with the local SYSTEM account.

Further information:http://technet.microsoft.com/en-us/library/gg682191.aspxDetermine the Client Installation Method to Use for Windows Computers in Configuration Manager

The following table outlines the advantages and disadvantages of each client installation method to helpyou determine which will work best in your organization:

Client push installationCan be used to install the client on a single computer, a collection of computers, or to the resultsfrom a query.Can be used to automatically install the client on all discovered computers.Automatically uses client installation properties defined on the Client tab in the Client PushInstallation Properties dialog box.

Can cause high network traffic when pushing to large collections.Can only be used on computers that have been discovered by System Center 2012 ConfigurationManager.Cannot be used to install clients in a workgroup.A client push installation account must be specified that has administrative rights to the intendedclient computer.Windows Firewall must be configured on client computers with exceptions so that client pushinstallation can be completed.You cannot cancel client push installation. When you use this client installation method for a site,Configuration Manager tries to install the client on all discovered resources and retries any failuresfor up to 7 days.

Software update point-based installationCan use your existing software updates infrastructure to manage the client software.Can automatically install the client software on new computers if Windows Server Update Services(WSUS) and Group Policy settings in Active Directory Domain Services are configured correctly.Does not require computers to be discovered before the client can be installed.Computers can read client installation properties that have been published to Active DirectoryDomain Services.Will reinstall the client software if it is removed.Does not require you to configure and maintain an installation account for the intended clientcomputer.

Requires a functioning software updates infrastructure as a prerequisite.Must use the same server for client installation and software updates, and this server must reside ina primary site.To install new clients, you must configure an Group Policy Object (GDO) in Active Directory DomainServices with the client's active software update point and port.If the Active Directory schema is not extended for System Center 2012 Configuration Manager, youmust use Group Policy settings to provision computers with client installation properties.

Group Policy installationDoes not require computers to be discovered before the client can be installed.Can be used for new client installations or for upgrades.Computers can read client installation properties that have been published to Active DirectoryDomain Services.Does not require you to configure and maintain an installation account for the intended clientcomputer.

Can cause high network traffic if a large number of clients are being installed.If the Active Directory schema is not extended for System Center 2012 Configuration Manager, youmust use Group Policy settings to add client installation properties to computers in your site.

Logon script installationDoes not require computers to be discovered before the client can be installed.Supports using command-line properties for CCMSetup.

Can cause high network traffic if a large number of clients are being installed over a short timeperiod.Can take a long time to install on all client computers if users do not frequently log on to the network.

Manual installationDoes not require computers to be discovered before the client can be installed.Can be useful for testing purposes.Supports using command-line properties for CCMSetup.

No automation, therefore time consuming.

QUESTION 77Your network contains a System Center 2012 Configuration Manger environment.

The environment contains a primary site server named Server1 and a server named Server2 that runsMicrosoft SQL Server 2008 R2. Server2 contains the Configuration Manager database .Server2 fails .You install SQL Server 2008 R2 on a new server. You name the server Server2 .

You need to restore the Configuration Manager database to the new server.

What should you do?

A. From Server1, run the Configuration Manager 2012 Setup Wizard.B. From Server2, run Microsoft SQL Server Management Studio, and then attach the backed up SQL

Server database and log files.

C. From Server2, run Microsoft SQL Server Management Studio, and then restore the backed up SQLServer database and log files.

D. From Server1, run the Site Repair Wizard.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Answer : From Server1, run the Configuration Manager 2012 Setup Wizard.

Explanation : http://technet.microsoft.com/en-us/library/gg712697.aspxBackup and Recovery in Configuration Manager

Recover a Configuration Manager SiteA Configuration Manager site recovery is required whenever a Configuration Manager site fails or data lossoccurs in the site database. Repairing and resynchronizing data are the core tasks of a site recovery andare required to prevent interruption of operations. Site recovery is started by running the ConfigurationManager Setup Wizard from installation media or by configuring the unattended installation script and thenusing the Setup command /script option. Your recovery options vary depending on whether you have abackup of the Configuration Manager site database.

...

Site Database Recovery OptionsWhen you run Setup, you have the following recovery options for the site database:

* Recover the site database using a backup set: Use this option when you have a backup of theConfiguration Manager site database that was created as part of the Backup Site Server maintenance taskrun on the site before the site database failure. When you have a hierarchy, the changes that were made tothe site database after the last site database backup are retrieved from the central administration site for aprimary site, or from a reference primary site for a central administration site. When you recover the sitedatabase for a stand-alone primary site, you lose site changes after the last backup.

When you recover the site database for a site in a hierarchy, the recovery behavior is different for a centraladministration site and primary site, and when the last backup is inside or outside of the SQL Serverchange tracking retention period....

Further information :

SCCM 2007 needed you to run Site Repair Wizard.

QUESTION 78You deploy Windows 7 by using Operating System Deployment (OSD). The development task sequence contains steps to install software updates and Applications . The amount of time required to deploy the Windows 7 image has increased significantly during the lastsix months.

You need to recommend a solution to reduce the amount o f time it takes to deploy the image .

What should you recommend?

A. Synchronize software updates before deploying the image.B. Use offline servicing for the image.C. Create a new automatic deployment rule.D. Add an additional Install Software Updates step to the deployment task sequence.E. Upgrade the image to Windows 7 SP1.

Correct Answer: BESection: (none)

Explanation

Explanation/Reference:Answer : Use offline servicing for the image. Upgrade the image to Windows 7 SP1.

Explanation:http://blogs.technet.com/b/inside_osd/archive/2011/04/18/configuration-manager-2012-offline-servicing-for-operating-system-images.aspxConfiguration Manager 2012: Offline Servicing for Operating System Images

In Configuration Manager 2012 there is a new feature for applying updates to operating system imageswhile they are in the Configuration Manager library. This means any operating system image you see in theOperating Systems > Operating Systems Images node from the Software Library wunderbar can beupdated with Component Based Servicing (CBS) updates. By updating an image in the Software Libraryinstead of performing a new build and capture of the operating system image you will gain a few distinctadvantages. You will be able to reduce the risk of vulnerabilities during operating system deployments andreduce the overall operating system deployment to the end user. You will also reduce the administrativeeffort to maintain your operating system images.

The feature is applicable for Component Based Servicing (CBS) updates and for the following operatingsystems:

Microsoft Windows Vista SP2 and later Microsoft Windows Server 2008 SP2 and later Microsoft Windows 7 RTM Microsoft Windows 2008 R2

Further information:http://www.windows-noob.com/forums/index.php?/topic/4683-using-sccm-2012-rc-in-a-lab-part-12-updating-an-operating-system-image-using-offline-servicing/using SCCM 2012 RC in a LAB - Part 12. Updating an Operating System image using Offline Servicing.

ht t p:/ / w w w .gratisexam.com/