Http://www.certschief.com
This presentation is the property of its rightful owner.
Sponsored Links
1 / 13

70-243 Certified Professional Dumps PowerPoint PPT Presentation


CertsChief Best IT Certification practice test material provider with thousands of professional it certification Exams, like as CompTIA, Microsoft, Vmware, IBM and more. CertsChief Pass Your Exam with 100% Guarantee with CertsChief Preparation Material. Please visit at: http://www.certschief.com

Download Presentation

70-243 Certified Professional Dumps

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Microsoft

70-243

Administering and Deploying System Center 2012

Configuration Manager

Demo Product - For More Information - Visit:

http://www.certschief.com/exam/70-243/

Edition = DEMO

ProductFull Version Features:

 90 Days Free Updates

 30 Days Money Back Guarantee

 Instant Download Once Purchased

 24/7 Online Chat Support

Page | 1

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Question: 1

You recently migrated from System Center Configuration Manager 2007 to System Center 2012 Configuration

Manager.

Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bit version of

Windows 7.

Some client computers have the Microsoft Application Virtualization (App-V) client installed.

You have an Application named App1.

You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1.

You need to deploy the Application to all of the client computers.

The solution must minimize the amount of administrative effort.

What should you do?

A. Create a new Application that has three different deployment types and create a target collection for each of the

deployment types.

B. Create a new Application that has three different deployment types and configure global conditions for each of

the deployment types.

C. Create a new package for each version of App1.

D. Create a new Application for each version of App1.

Answer: B

Explanation:

http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step2

How to Create Deployment Types in Configuration Manager

Supplemental Procedures to Create a Deployment Type

Step 6: Specify Requirements for the Deployment Type

1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the Create

Requirement dialog box, and add a new requirement.

2. From the Category drop-down list, select whether this requirement is for a device or a user, or select Custom to

use a previously created global condition. When you select Custom, you can also click Create to create a new global

condition. For more information about global conditions, see How to Create Global Conditions in Configuration

Manager.

3. From the Condition drop-down list, select the condition that you want to use to assess whether the user or device

meets the installation requirements. The contents of this list will vary depending on the selected category.

4. From the Operator drop-down list, choose the operator that will be used to compare the selected condition to the

specified value to assess whether the user or device meets in the installation requirement.

The available operators will vary depending on the selected condition.

5. In the Value field, specify the values that will be used with the selected condition and operator whether the user

or device meets in the installation requirement. The available values will vary depending on the selected condition

and the selected operator.

6. Click OK to save the requirement rule and exit the Create Requirement dialog box.

7. On the Requirements page of the Create Deployment Type Wizard, click Next.

Page | 2

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Page | 3

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Question: 2

You network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.

You have an application named App1.

You need to ensure that users in the finance department can install App1 by using the Application Catalog.

What should you do?

A. Create a required user deployment and target the deployment to all of the finance department users.

B. Create a required user deployment and target the deployment to all of the client computers in the finance

department.

C. Create an available user deployment and target the deployment to all of the finance department users.

D. Create an available user deployment and target the deployment to all of the client computers in the finance

department.

Answer: C

Explanation:

By selecting "Available" it will be selectable for the users in the Application Catalog.

The "Required" option would force the installation to all users in the finance department.

Further information:

http://technet.microsoft.com/en-us/library/gg682082.aspx

How to Deploy Applications in Configuration Manager

Page | 4

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

To deploy an application

...

8. On the Deployment Settings page of the Deploy Software Wizard, specify the following information:

* Action – From the drop-down list, choose whether this deployment is intended to Install or Uninstall the

application.

* Purpose – From the drop-down list, choose one of the following options:

* Available - If the application is deployed to a user, the user sees the published application in the Application

Catalog and can request it on demand. If the application is deployed to a device, the user will see it in the Software

Center and can install it on demand.

* Required - The application is deployed automatically according to the configured schedule. However, a user can

track the application deployment status if it is not hidden, and can install the application before the deadline by

using the Software Center.

Question: 3

Your network contains a System Center 2012 Configuration Manager environment.

Two weeks ago, you deployed a Windows Installer package named App1.

You need to remediate a registry value that applies only to the client computers that have App1 installed.

The solution must minimize network traffic.

What should you do?

A. Modify the App1 Windows Installer package to contain the registry setting, and then create a new application for

App1.

B. Modify the App1 Windows Installer package to contain the registry setting, and then configure the existing

application for App1 to use the new Windows Installer package.

C. Create an application-based configuration item, configure a rule for an existential type, and then import the

registry setting from a client computer that has App1 installed.

D. Create an application-based configuration item, configure the detection method to use the Windows Installer

product code of App1, and then import the registry setting from a client computer that has App1 installed.

Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/gg682139.aspx

Introduction to Compliance Settings in Configuration Manager

Compliance settings in System Center 2012 Configuration Manager provides a unified interface and user experience

that lets you manage the configuration and compliance of servers, laptops, desktop computers, and mobile devices

in your organization. Compliance settings contains tools to help you assess the compliance of users and client

devices for many configurations, such as whether the correct Windows operating system versions are installed and

configured appropriately, whether all required applications are installed and configured correctly, whether optional

applications are configured appropriately, and whether prohibited applications are installed. Additionally, you can

check for compliance with software updates, security settings, and mobile devices. Configuration item settings of the

type Windows Management Instrumentation (WMI), registry, script, and all mobile device settings in Configuration

Manager let you automatically remediate noncompliant settings when they are found.

Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to

evaluate and settings and rules that describe the level of compliance you must have. You can import this

configuration data from the web in Microsoft System Center Configuration Manager Configuration Packs as best

practices that are defined by Microsoft and other vendors, in Configuration Manager, and that you then import into

Configuration Manager. Or, an administrative user can create new configuration items and configuration baselines.

http://technet.microsoft.com/en-us/library/gg712331.aspx

How to Create Windows Configuration Items for Compliance Settings in Configuration Manager

Create configuration items in System Center 2012 Configuration Manager to define configurations that you want to

manage and assess for compliance on devices.

There are different types of configuration items:

Application configuration item

Page | 5

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Used to determine compliance for an application. This can include whether the application is installed and details

about its configuration.

Operating system configuration item

Used to determine compliance for settings that relate to the operating system and its configuration.

Software updates configuration item Automatically created when you download software updates with

Configuration Manager. You do not create or see these configuration items in the Compliance Settings node, but you

can select them when you define configuration baselines.

General configuration item

Used to determine compliance for mobile devices.

Steps to Create a New Configuration Item for Client Computers

Use the following required steps to create a configuration item by using the Create Configuration Item Wizard:

Step 1: Start the Create Configuration Item Wizard.

Step 2: Provide general information about the configuration item.

Step 3: Provide detection method information for the configuration item.

Step 4: Configure settings for the configuration item.

Step 5: Configure compliance rules for the configuration item.

Step 6: Specify supported platforms for the configuration item.

Step 7: Complete the wizard.

http://technet.microsoft.com/en-us/library/gg712331.aspx#BKMK_Step3

Step 3: Provide Detection Method Information for the Configuration Item

Use this procedure to provide detection method information for the configuration item.

Note: Applies only if you selected

This configuration item contains application settings on the General page of the wizard.

A detection method in Configuration Manager contains rules that are used to detect whether an application is

installed on a computer. This detection occurs before the configuration item is assessed for compliance. To detect

whether an application is installed, you can detect the presence of a Windows Installer file for the application, use a

custom script, or select Always assume application is installed to assess the configuration item for compliance

regardless of whether the application is installed.

Question: 4

Your network contains a System Center 2012 Configuration Manager environment.

You need to create a collection that contains all of the virtual machines.

Which query should you use?

A. select * from SMS_R_System

where SMS_R_System.ResourceID not in

(select ResourceID from SMS_R_System

where SMS_R_System.IsVirtualMachine != 1)

B. select * from SMS_R_System

where SMS_R_System.IsVirtualMachine != 1

C. select * from SMS_R_System

where SMS_R_System.IsVirtualMachine = 1

D. select * from SMS_R_System

where SMS_R_System.ResourceID not in

(select ResourceID from SMS_R_System

where SMS_R_System.IsVirtualMachine = 1)

Answer: C

Question: 5

Your network contains a System Center 2012 Configuration Manager environment.

You create a report that lists compliance information.

You schedule the report to run every day at 20:00.

Page | 6

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

You need to ensure that on Friday, you can review the results of the report created on the previous Monday.

What should you configure the report to do?

A. Use caching.

B. Use a shared schedule.

C. Render on Friday.

D. Use snapshots.

Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/ms156325.aspx

Creating, Modifying, and Deleting Snapshots in Report History

Report history is a collection of report snapshots. You can maintain report history by adding and deleting snapshots,

or by modifying properties that affect report history storage. You can create report history manually or on a

schedule.

Further information:

http://technet.microsoft.com/en-us/library/ms157447.aspx

Cache a Report (Report Manager)

One way to improve performance is to configure caching properties for a report. When a report is cached, a copy of

the rendered report is saved for a short period of time. The first user who requests the report must wait for all

processing to complete before viewing the report. Subsequent users who request the report within the caching

period can view it right away because processing has already occurred.

Question: 6

Your network contains an Active Directory forest.

The forest contains a System Center 2012 Configuration Manager environment.

The environment contains one primary site.

You need to ensure that the members of a group named Group1 are allowed to deploy applications to desktop

computers.

The solution must minimize the number of permissions assigned to Group1.

What should you do?

A. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the

desktop computers. Add Group1 to the local Administrators group on each desktop computer.

B. Add the Applicaton Deployment Manager security role to Group1. Create a new collection that contains all of the

desktop computers. Add Group1 to the local Administrators group on each desktop computer.

C. Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of

the desktop computers. Scope Group1 to the new collection.

D. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the

desktop computers. Scope Group1 to the new collection.

Answer: C

Explanation:

http://technet.microsoft.com/en-us/library/hh524341.aspx

Glossary for Microsoft System Center 2012 Configuration Manager

Application Administrator

A security role that grants permissions to administrative users so that they can perform both the

Application Deployment Manager role and the Application Author role.

Application Deployment Manager

A security role that grants permissions to administrative users so that they can deploy and monitor applications.

http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-2012-

configuration-manager.aspx

Page | 7

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Role-Based Administration in System Center 2012 Configuration Manager

In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions (operations)

for assignment to an Administrator. Instead of an individual permission set on a single instance of object, the

Security Role provides a single Role assignment to an administrator; reducing the overall complexity with permission

management. An “object” in the Security Role is something that you want to manage access to and “permission” is

the operational functions, such as Read, Modify and Delete.

Question: 7

Your network contains a single Active Directory domain.

The domain contains a System Center Configuration Manager 2007 site and a System Center 2012 Configuration

Manager site.

You need to ensure that you can migrate objects from Configuration Manager 2007 to Configuration Manager 2012.

What should you do?

A. Assign the computer account of the Central Administration site server permission to the Configuration Manager

2007 site.

Assign the computer account of the Central Administration site server permission to the Microsoft SQL Server

database instance.

B. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration Manager 2012

primary site.

C. Extend the Active Directory schema and assign the Central Administration site server permissions to the

System\System Management container.

D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration Manager 2007

primary site.

Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/gg712991.aspx

Determine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration Manager

In Microsoft System Center 2012 Configuration Manager, the built-in migration functionality replaces in-place

upgrades of existing Configuration Manager infrastructure by providing a process that transfers data from active

Configuration Manager 2007 sites. The functionality provided by migration helps you maintain investments that you

have made in configurations and deployments while you can take full advantage of core changes in the product

introduced in System Center 2012 Configuration Manager. These changes include a simplified Configuration

Manager hierarchy that uses fewer sites and resources, and the improved processing by use of native 64-bit code

that runs on 64-bit hardware.

Migration can transfer most data from Configuration Manager 2007.

http://technet.microsoft.com/en-us/library/gg681981.aspx

Planning for Migration to System Center 2012 Configuration Manager

You must first install a System Center 2012 Configuration Manager hierarchy to be the destination hierarchy before

you can migrate data from a supported source hierarchy.

After you install the destination hierarchy, configure the management features and functions that you want to use in

your destination hierarchy before you start to migrate data.

http://technet.microsoft.com/en-us/library/gg712313.aspx

Prerequisites for Migration in System Center 2012 Configuration Manager

To migrate from a supported source hierarchy, you must have access to each applicable Configuration Manager

source site, and permissions within the System Center 2012 Configuration Manager destination site

to configure and run migration operations.

Required Configurations for Migration

..

Data Gathering

To enable the destination site to gather data, you must configure the following two source site access accounts for

use with each source site:

Page | 8

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

* Source Site Account: This account is used to access the SMS Provider of the source site.

* For a Configuration Manager 2007 SP2 source site, this account requires Read permission to all source site objects.

* For a System Center 2012 Configuration Manager source site, this account requires Read permission to all source

site objects. You grant this permission to the account by using role-based administration.

* Source Site Database Account: This account is used to access the SQL Server database of the source site and

requires Read and Execute permissions to the source site database.

You can configure these accounts when you configure a new source hierarchy, data gathering for an additional

source site, or when you reconfigure the credentials for a source site. These accounts can use a domain user

account, or you can specify the computer account of the top-level site of the destination hierarchy.

Security Note: If you use the Configuration Manager computer account for either access account, ensure that this

account is a member of the security group Distributed COM Users in the domain where the source site resides.

When gathering data, the following network protocols and ports are used:

NetBIOS/SMB – 445 (TCP)

RPC (WMI) - 135 (TCP)

SQL Server - 1433 (TCP)

Question: 8

Your network contains a System Center 2012 Configuration Management environment.

The network contains 10 database servers that run Microsoft SQL Server 2008.

You have a configuration baseline that is used to monitor database servers.

You confirm that all of the database servers downloaded the configuration baseline.

You discover that a database server named Server1 fails to report any data for the configuration baseline.

You need to identify whether Server 1 evaluates the configuration items that are part of the configuration baseline.

Which log file should you review?

A. Locationservices.log

B. Smsexec.log

C. Ccm.log

D. Sdmagent.log

E. Dcmagent.log

F. Rcmctrl.log

G. Wsyncmgr.log

H. Ciagent.log

I. Hman.log

J. Contenttransfermanager.log

K. Sitestat.log

Answer: E

Explanation:

http://technet.microsoft.com/en-us/library/hh427342.aspx

Technical Reference for Log Files in Configuration Manager

DCMAgent.log

Client log file

Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and

applications.

Further information:

Locationservices.log

Client log file Records the client activity for locating management points, software update points, and distribution

points.

Smsexec.log

Site server or site system server log file

Records the processing of all site server component threads.

Ccm.log

Page | 9

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Site server log file

Records client push installation activities.

Sdmagent.log

Client log file

Records details about tracking of remediation and compliance. However, the software updates log file,

Updateshandler.log, provides more informative details about installing the software updates required for

compliance.

Rcmctrl.log

Site server log file

Records the activities of database replication between sites in the hierarchy.

wsyncmgr.log

Site server log file

Records details about the software updates synchronization process.

Ciagent.log

Client log file

Records details about the process of remediation and compliance for compliance settings, software updates, and

application management.

hman.log

Site server log file

Records information about site configuration changes, and the publishing of site information in Active

Directory Domain Services.

ContentTransferManager.log

Client log file

Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to

access packages.

Sitestat.log Site server log file Records the availability and disk space monitoring process of all site systems.

Question: 9

You enable Client Push.

You run Active Directory System Discovery.

You discover that some of the discovered computers do not have the System Center 2012

Configuration Manager client installed.

You need to identify why Client Push fails of the client computers.

Which log file should you review?

A. Locationservices.log

B. Smsexec.log

C. Ccm.log

D. Sdmagent.log

E. Dcmagent.log

F. Rcmctrl.log

G. Wsyncmgr.log

H. Ciagent.log

I. Hman.log

J. Contenttransfermanager.log

K. Sitestat.log

Answer: C

Explanation:

http://technet.microsoft.com/en-us/library/hh427342.aspx

Technical Reference for Log Files in Configuration Manager

Ccm.log

Site server log file

Page | 10

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Records client push installation activities.

Further information:

Locationservices.log

Client log file

Records the client activity for locating management points, software update points, and distribution points.

Smsexec.log

Site server or site system server log file Records the processing of all site server component threads.

Sdmagent.log

Client log file Records details about tracking of remediation and compliance. However, the software updates log file,

Updateshandler.log, provides more informative details about installing the software updates required for

compliance.

DCMAgent.log

Client log file

Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and

applications.

Rcmctrl.log

Site server log file

Records the activities of database replication between sites in the hierarchy.

wsyncmgr.log

Site server log file Records details about the software updates synchronization process.

Ciagent.log

Client log file Records details about the process of remediation and compliance for compliance settings, software

updates, and application management.

hman.log

Site server log file

Records information about site configuration changes, and the publishing of site information in Active Directory

Domain Services.

ContentTransferManager.log

Client log file

Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to

access packages.

Sitestat.log

Site server log file Records the availability and disk space monitoring process of all site systems.

Question: 10

Your network contains a System Center 2012 Configuration Manager environment.

You add a software update point to the environment.

You receive a message indicating that SMS WSUS Synchronization failed.

You need to retrieve additional information about the message.

Which log file should you review?

A. Locationservices.log

B. Smsexec.log

C. Ccm.log

D. Sdmagent.log

E. Dcmagent.log

F. Rcmctrl.log

G. Wsyncmgr.log

H. Ciagent.log

I. Hman.log

J. Contenttransfermanager.log

K. Sitestat.log

Answer: G

Page | 11

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Explanation:

http://technet.microsoft.com/en-us/library/hh427342.aspx

Technical Reference for Log Files in Configuration Manager

wsyncmgr.log

Site server log file

Records details about the software updates synchronization process.

Further information:

Locationservices.log

Client log file

Records the client activity for locating management points, software update points, and distribution points.

Smsexec.log

Site server or site system server log fiel

Records the processing of all site server component threads.

Ccm.log

Site server log file

Records client push installation activities.

Sdmagent.log

Client log file

Records details about tracking of remediation and compliance. However, the software updates log file,

Updateshandler.log, provides more informative details about installing the software updates required for

compliance.

DCMAgent.log

Client log file

Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and

applications.

Rcmctrl.log Site server log file Records the activities of database replication between sites in the hierarchy.

Ciagent.log

Client log file

Records details about the process of remediation and compliance for compliance settings, software updates, and

application management.

hman.log

Site server log file Records information about site configuration changes, and the publishing of site information in

Active Directory Domain Services.

ContentTransferManager.log

Client log file Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to

download or to access packages.

Sitestat.log Site server log file Records the availability and disk space monitoring process of all site systems.

Page | 12

http://www.certschief.com/exam/70-243/


70 243 certified professional dumps

http://www.certschief.comCertification Preparation Material

Demo Product - For More Information - Visit:

http://www.certschief.com/exam/70-243/

20% Discount Coupon Code:

20off2016

Page | 13

http://www.certschief.com/exam/70-243/


  • Login