2015 Timesaving Comprehensive Guides For Microsoft 70-243 Exam: Using Latst Released Braindump2go 70-243 Practice Tests Questions, Quickly Pass 70-243 Exam 100%! Following Questions and Answers are all the New Published By Microsoft Official Exam Center!
Vendor: Microsoft
Exam Code: 70-243
Exam Name: Administering and Deploying System Center 2012 Configuration Manager
QUESTION 21
Note: This question is part of a series of questions that use the same set of answer choices. n answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Manager environment.
The network contains 10 database servers that run Microsoft SQL Server 2008.
You have a configuration baseline that is used to monitor the database servers.
You add new configuration items to the configuration baseline.
Two days later, you discover that only eight of the database servers report any information about the new configuration items.
You need to identify whether the new configuration items downloaded to the database servers. Which log file should you review?
A. Hman.log
B. Sitestat.log
C. Dcmagent.log
D. Wsyncmgr.log
E. Ccm.log
F. Contenttransfermanager.log
G. Sdmagent.log
H. Rcmctri.log
I. Ciagent.log
J. Smsexec.log
K. Locationservices.log
Answer: I
Explanation:
Ciagent.log
Not related to US foreign security policy but provides information about processing
configuration items, including software updates.
Incorrect:
Not B: Sitestat.log: Records the monitoring process of all site systems.
QUESTION 22
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
You create a deployment to install Microsoft Office 2010.
The deployment targets 5,000 client computers on the network.
Two weeks after you create the deployment, you discover that Office 2010 fails to install on a client computer named Computer 1.
You need to identify whether Computer1 started downloading the Application of Office 2010. Which log file should you review?
A. Locationservices.log
B. Ccm.log
C. Sdmagent.log
D. Sitestat.log
E. Rcmctrl.log
F. Dcmagent.log
G. Contenttransfermanager.log
H. Smsexec.log
I. Wsyncmgr.log
J. Ciagent.log
K. Hman.tog
Answer: G
Explanation:
How to find if download start, TS using log file: ContentTransferManager.log SDMAgent.log – desired configuration management and contains the tracking process of remediation and compliance. dcmagent.log – Provides high-level information about the evaluation of assigned configuration baselines CIAgent.log – Tracks the process of remediation and compliance Updateshandler.log – provides more informative details on installing the software updates wsyncmgr.log -Provides information about the software updates synchronization process
Smsexec.log – Records processing of all site server component threads. ContentTransferManager.log
– Schedules the Background Intelligent Transfer Service (BITS) or the Server
QUESTION 23
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Management environment.
The environment contains a Central Administration site and two primary child sites named Child1 and Child2.
You create a new Application on the Central Administration site.
You view the new Application on Child 1, but the new Application fails to appear on Child2.
You need to identify whether the Application transferred to Child2.
Which log file should you review?
A. Locabonservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: F
Explanation:
Rcmctrl.log
Replication related information.
Incorrect:
Not A: Locatonservices.log Finds management points and distribution points.
Not B: Smsexec.log Records processing of all site server component threads.
Not C: Ccm.log
Client Configuration Manager tasks.
Not D: Sdmagent.log
Shared with the Configuration Manager feature desired configuration management and
contains the tracking process of remediation and compliance.
Not E: Dcmagent.log
Provides high-level information about the evaluation of assigned configuration baselines
and desired configuration management processes.
Not G: Wsyncmgr.log
Provides information about the software updates synchronization process.
Not H: Ciagent.log
Not related to US foreign security policy but provides information about processing
configuration items, including software updates.
Not I: Hman.log
Records site configuration changes, and publishes site information in Active Directory
Domain Services.
Not J: ContentTransferManager.log
Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block
(SMB) to download or to access SMS packages.
Not K: Sitestat.log
Records the monitoring process of all site systems.
QUESTION 24
Your network contains an Active Directory forest. The forest contains a System Center 2012 Configuration Manager environment. The environment contains one primary site.
You need to unsure that the members of a group named Group1 are allowed to deploy applications to desktop computers.
The solution must minimize the number of permissions assigned to Group1.
What should you do?
A. Assign the Application Administrator security role to Group1.
Create a new collection that contains all of the desktop computers.
Add Group1 to the local Administrators group on each desktop computer.
B. Add the Application Deployment Manager security role to Group1.
Create a new collection that contains all of the desktop computers.
Add Group1 to the local Administrators group on each desktop computer.
C. Assign the Application Deployment Manager security role to Group1.
Create a new collection that contains all of the desktop computers.
Scope Group1 to the new collection.
D. Assign the Application Administrator security role to Group1.
Create a new collection that contains all of the desktop computers.
Scope Group1 to the new collection.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh524341.aspx
Glossary for Microsoft System Center 2012 Configuration Manager Application Administrator
A security role that grants permissions to administrative users so that they can perform both the
Application Deployment Manager role and the Application Author role.
Application Deployment Manager
A security role that grants permissions to administrative users so that they can deploy and
monitor applications.
http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-systemcenter-
2012-configuration-manager.aspx
Role-Based Administration in System Center 2012 Configuration Manager
In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions (operations) for assignment to an Administrator. Instead of an individual permission set on a single instance of object, the Security Role provides a single Role assignment to an administrator; reducing the overall complexity with permission management. An “object” in the Security Role is something that you want to manage access to and “permission” is the operational functions, such as Read, Modify and Delete.
QUESTION 25
Your network contains a single Active Directory domain.
You plan to deploy System Center 2012 Configuration Manager.
The hierarchy will have a Central Administration site and five primary sites.
You need to ensure that you can target user groups for software distribution.
The solution must minimize network traffic.
Which Configuration Manager discovery method should you use?
A. Active Directory User Discovery on the primary sites
B. Active Directory User Discovery on the primary sites and Active Directory Group Discovery on
every site
C. Active Directory User Discovery on the Central Administration site and Active Directory Group
Discovery on the primary sites
D. Active Directory User Discovery and Active Directory Group Discovery on the Central Administration
site
Answer: B
Explanation:
AD User discovery for Primary Site and Group discover for Each Primary Site:
When discovery of a resource is successful, discovery puts information about the resource in a file that is referred to as a discovery data record (DDR). DDRs are in turn processed by site servers and entered into the Configuration Manager database where they are then replicated by database- replication with all sites. The replication makes discovery data available at each site in the hierarchy, regardless of where it was discovered or processed.Caution
When you clear the option to publish a site to an Active Directory forest, all previously published information for that site, including available site system roles, is removed from the Active Directory of that forest.
When you run Active Directory System Discovery and Active Directory User Discovery, the additional Active Directory attributes for each object type are available, and as a result, Active Directory Group Discovery runs more efficiently.
Active Directory System Group Discovery works only for systems that are already discovered and assigned to the local primary site and any direct child secondary sites
Use Configuration Manager Active Directory Forest Discovery to discover IP subnets and Active Directory sites and to add them to Configuration Manager as boundaries.
Consider the scope of the discovery configuration and limit discovery to only those Active Directory locations and groups that you have to discover.
Only Network Discovery available on Secondary site. Others not available for secondary site.
http://technet.microsoft.com/en-us/library/6a0e2b40-672f-45e1-a12d- 6d403ab39780#BKMK_DiscMethods
Personal comment:
From my point of view, the correct answer would be Active Directory User Discovery and Active Directory Group Discovery on the primary sites
The remaining possible correct answers might be:
Active Directory User Discovery on the primary sites and Active Directory Group Discovery on every site
or
Active Directory User Discovery and Active Directory Group Discovery on the Central Administration site
Update:
It seems that more recent exams contain the answer “Active Directory User Discovery and Active Directory Group Discovery on the primary sites”
So if you are lucky and have it, choose this one.
QUESTION 26
Your network contains a System Center 2012 Configuration Manager environment. The Configuration Manager databases are located on a remote server that runs Microsoft SQL Server.
You need to ensure that you can restore the Central Administration site.
What should you do?
A. From the Configuration Manager console, enable the Backup Site Server maintenance task and set
a schedule.
B. From Microsoft SQL Server Management Studio, create a maintenance plan for the site databases.
C. From Task Scheduler, create a scheduled task that runs smssqlbkup.exe.
D. From Windows Server Backup, schedule a full system backup.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/gg712697.aspx
Backup and Recovery in Configuration Manager
Enterprise solutions such as System Center 2012 Configuration Manager must prepare for both backup and recovery operations to avoid loss of critical data. For Configuration Manager sites, this preparation ensures that sites and hierarchies are recovered with the least data loss and in the quickest possible time.
Back up a Configuration Manager Site
System Center 2012 Configuration Manager provides a backup maintenance task that runs on a schedule and backs up the site database, specific registry keys, and specific folders and files.
Backup Maintenance Task
You can automate backup for Configuration Manager sites by scheduling the predefined Backup Site Server maintenance task.
You can back up a central administration site and primary site, but there is no backup support for secondary sites or site system servers.
To enable the site backup maintenance task
1. In the Configuration Manager console, click Administration.
2. In the Administration workspace, expand Site Configuration, and then click Sites.
3. Select the site in which you want to enable the site backup maintenance task.
4. On the Home tab, in the Settings group, click Site Maintenance Tasks.
5. lick Backup Site Server and then click Edit.
6. Select Enable this task, and then click Set Paths to specify the backup destination.
7. Configure an appropriate schedule for the site backup task. As a best practice, consider a backup schedule that is outside active working hours. If you have a hierarchy, consider a schedule that runs at least two times a week to ensure maximum data retention in the event of site failure.
8. Select whether to create an alert if the site backup task fails, click OK, and then click OK. When selected, Configuration Manager creates a critical alert for the backup failure that you can review in the Alerts node in the Monitoring workspace.
QUESTION 27
Your network contains a single Active Directory forest named contoso.com. Contoso.com contains three System Center 2012 Configuration Manager sites and one System Center 2012 Configuration Managersite.
You need to ensure that you can transfer objects from Configuration Manager 2007 to Configuration Manager 2012.
What should you do?
A. Assign the computer account of the Central Administration site server permission to the Configuration
Manager 2007 site.
Assign the computer account of the Central Administration site server permissions to the Microsoft
SQL Server database instance.
B. Extend the Active Directory schema and assign the Central Administration site server permissions to
the System\System Management container.
C. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration
Manager 2012 primary site.
D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration
Manager 2007 primary site.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/gg712991.aspx
Determine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration Manager
In Microsoft System Center 2012 Configuration Manager, the built-in migration functionality replaces in-place upgrades of existing Configuration Manager infrastructure by providing a process that transfers data from active Configuration Manager 2007 sites. The functionality provided by migration helps you maintain investments that you have made in configurations and deployments while you can take full advantage of core changes in the product introduced in System Center 2012 Configuration Manager. These changes include a simplified Configuration Manager hierarchy that uses fewer sites and resources, and the improved processing by use of native 64-bit code that runs on 64-bit hardware.
Migration can transfer most data from Configuration Manager 2007.
http://technet.microsoft.com/en-us/library/gg681981.aspx
Planning for Migration to System Center 2012 Configuration Manager
You must first install a System Center 2012 Configuration Manager hierarchy to be the destination hierarchy before you can migrate data from a supported source hierarchy.
After you install the destination hierarchy, configure the management features and functions that you want to use in your destination hierarchy before you start to migrate data.
http://technet.microsoft.com/en-us/library/gg712313.aspx
Prerequisites for Migration in System Center 2012 Configuration Manager
To migrate from a supported source hierarchy, you must have access to each applicable
Configuration Manager source site, and permissions within the System Center 2012
Configuration Manager destination site to configure and run migration operations.
Required Configurations for Migration
Data Gathering
To enable the destination site to gather data, you must configure the following two source
site access accounts for use with each source site:
* Source Site Account: This account is used to access the SMS Provider of the source site.
* For a Configuration Manager 2007 SP2 source site, this account requires Read
permission to all source site objects.
* For a System Center 2012 Configuration Manager source site, this account requires Read permission to all source site objects, You grant this permission to the account by using role-based administration.
* Source Site Database Account: This account is used to access the SQL Server database of the source site and requires Read and Execute permissions to the source site database.
You can configure these accounts when you configure a new source hierarchy, data gathering for an additional source site, or when you reconfigure the credentials for a source site. These accounts can use a domain user account, or you can specify the computer account of the top-level site of the destination hierarchy.
Security Note: If you use the Configuration Manager computer account for either access account, ensure that this account is a member of the security group Distributed COM Users in the domain where the source site resides.
When gathering data, the following network protocols and ports are used:
NetBIOS/SMB – 445 (TCP)
RPC (WMI) – 135 (TCP)
SQL Server – 1433 (TCP)
QUESTION 28
Your network contains a System Center 2012 Configuration Manager environment.
The hierarchy contains a Central Administration site named Site1 and a primary site named Site2.
You discover that none of the collections created on Site1 are displayed on Site2.
You need to identify whether there is replication issue between the sites.
What should you review?
A. the Colleval.log file.
B. the Despool.log file
C. the Rcmctrl.log file
D. the Sender.log file
Answer: C
Explanation:
despool.log
Records incoming site-to-site communication transfers. rcmctrl.log Records the activities of database replication between sites in the hierarchy. sender.log Records the files that transfer by file-based replication between sites.
QUESTION 29
Your network contains a System Center 2012 Configuration Manager environment.
The environment contains a single primary site.
The primary site has a distribution point and a management point.
You need to recommend a commutation solution that meets the following requirements:
– Communication between the client computes in the research department and the management point must use HTTPS.
– Communication between all of the other client computes and the management point must be able to use HTTP.
– Minimize the number of site system.
What should you do?
A. Configure the existing management point to use HTTPS.
Configure the research department computers always to um HTTPS.
B. Create a now primary child site and configure the site to use native mode.
Assign all of the research department computers to the new site.
C. Install a new management point and configure the management point always to use HTTPS.
Configure the research department computers always to use HTTPS.
D. Install a new management point and configure Windows Firewall to block abound TCP port 80.
Configure the research department computes always to use HTTPS.
Answer: C
Explanation:
To communicate with a site system role, the client must first locate a site system support the protocol (HTTPS or HTTP) that the client can use. By default, clients use the most secure method available to them. using HTTPS before it communicates with a site system role that uses HTTP. When you deploy a site system role include management points, an Application Catalog website point, a state migration point, or distribution points, you must specify whether clients connect to the site system by using HTTP or HTTPS. If you use HTTP, you must also consider signing and encryption choices. In a single site, you can have one management point that accepts HTTPS client communication and another management point that accepts HTTP client communication. You can use one site to manage clients across different network locations that use different communication protocols and security settings.
Site properties, Client Computer Communication, default : HTTPS or HTTP
Other client computers can be configured for Internet and intranet client management. They can automatically switch between Internet-based client management and intranet client management when they detect a change of network. If these clients can find and connect to a management point that is configured for client connections on the intranet, they attempt to connect to an Internet- based management point.
http://technet.microsoft.com/en-us/library/gg712701#Planning_Intra_site_Com
QUESTION 30
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Manager environment.
Your company deploys 1,000 client computers.
You discover that information about printers fails to appear in any inventory queries or reports. Information about other hardware devices appears in the inventory queries and reports.
You need to ensure that Configuration Manager data includes information about the printers. What should you do?
A. Add a WMI class to the Hardware inventory Classes list.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Add a file name to the Software Inventory configuration.
D. Add a file name to the Hardware inventory configuration.
E. Add a file name to Software Metering.
F. Select Collect NOIDMIF files in Hardware Inventory.
G. Add a WMI class to the Sms_def.mof file.
H. Modify the Enable software inventory on clients setting.
I. Modify the Enable hardware inventory on clients setting.
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/gg712290.aspx
How to Extend Hardware Inventory in Configuration Manager
System Center 2012 Configuration Manager hardware inventory reads information about devices by using Windows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-based Enterprise Management (WBEM), which is an industry standard for accessing management information in an enterprise environment.
In previous versions of Configuration Manager, you could extend hardware inventory by modifying the file sms_def.mof on the site server.
In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did in Configuration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes to collect by hardware inventory by using client settings. Configuration Manager provides the following methods to extend hardware inventory:
Enable or disable existing inventory classes – You can enable or disable the default inventory classes used by Configuration Manager or you can create custom client settings that allow you to collect different hardware inventory classes from specified collections of clients.
Add a new inventory class – You can add a new inventory class from the WMI namespace of another device.
Import and export hardware inventory classes – You can import and export Managed Object Format (MOF) files that contain inventory classes from the Configuration Manager console.
Create NOIDMIF Files – Use NOIDMIF files to collect information about client devices that cannot be inventoried by Configuration Manager.
Create IDMIF Files – Use IDMIF files to collect information about assets in your organization that are not associated with a Configuration Manager client, for example, projectors, photocopiers and network printers.
Further information:
Braindump2go New Released 70-243 Dump PDF Free Download, 103 Questions in all, Passing Your Exam 100% Easily!