getcertified4sure.com

A Complete Guide to 70 243 exam




We provide real 70 243 exam exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70 243 dumps Exam quickly & easily. The 70 243 exam PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft exam 70 243 dumps pdf and vce product and material, you can easily pass the 70 243 dumps exam.

Q41. Your network contains a System Center 2012 Configuration Manager environment. 

You need to create a report that lists all of the client computers that have an application named App1 installed. 

Which query should you use to create the report? 

A. SELECT SYS.Netbios_Name0, ARP.DisplayName0 FROM v_R_Sytem AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 NOT LIKE 'App1' 

B. SELECT SYS.Netbios_Name0 from v_R_System SYS WHERE SYS.ResourceID NOT IN (SELECT SYS.ResouceID FROM v_R_System AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1') 

C. SELECT SYS.Netbios_Name0, ARP.DisplayName0 FROM v_R_Sytem AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 NOT IN ('App1') 

D. SELECT SYS.Netbios_Name0 from v_R_System SYS WHERE SYS.ResourceID IN (SELECT SYS.ResouceID FROM v_R_System AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1') 

Answer:

Explanation: 

SELECT computer name FROM table v_R_System (SQL Syntax) 

WHERE resource ResourceID IN 

Add Remove Programs WHERE DisplayName0 = 'App1' 

SQL INNER JOIN Keyword 

The INNER JOIN keyword returns rows when there is at least one match in both tables. 

Reference: http://www.w3schools.com/sql/sql_join_inner.asp 


Q42. Your network contains a System Center 2012 Configuration Manager environment. 

Software Inventory and Hardware Inventory are enabled for all of the client computers. 

All of the client computers have an Application named App1 installed. 

App1 saves files to the C:\ABC folder. 

All of the files saved by App1 have a file name extension of .abc. 

You configure Software Inventory to inventory all of the files that have the .abc extension and the .exe extension. 

After six months, you discover that some of the client computers failed to inventory .abc files. All of the client computers inventory .exe files. 

You need to ensure that the .abc files are inventoried. 

What should you do? 

A. Modify C:\Program Files\App1\NO_SMS_On_Drive.sms. 

B. Delete C:\Program Files\App1\NO_SMS_On_Drive.sms. 

C. Modify C:\ABC\Skpswi.dat. 

D. Delete C:\ABC\Skpswi.dat. 

Answer:

Explanation: 

How to Exclude Folders from Software Inventory in Configuration Manager You can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude it from System Center 2012 Configuration Manager software inventory. You can also place this file in the root of any folder structure you want to exclude from software inventory. This procedure can be used to disable software inventory on a single workstation or server client, such as a large file server. Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive on the client computer. 

Reference: How to Exclude Folders from Software Inventory in Configuration Manager 

http://technet.microsoft.com/en-us/library/hh691018.aspx 


Q43. Your company uses System Center 2012 Configuration Manager with Microsoft Forefront Endpoint Protection integration. 

You deploy Forefront Endpoint Protection to all client computers. 

The company uses a management Application named App1. 

You discover that Forefront Endpoint Protection blocks App1. 

You need to ensure that App1 can run. 

How should you configure the Default Client Malware Policy? (Each correct answer 

presents a complete solution. Choose two.) 

A. Create a software restriction policy. 

B. Add a process exclusion. 

C. Add a file location exclusion. 

D. Modify the schedule scan settings. 

E. Click the Use behavior monitoring check box. 

Answer: B,C 

Reference: How to Create and Deploy Antimalware Policies for Endpoint Protection in Configuration Manager 

http://technet.microsoft.com/en-us/library/hh508785.aspx 


Q44. Your network contains a System Center 2012 Configuration Manager environment. 

You need to use the Configuration Manager console to identify service level agreement (SLA) issues among non-compliant clients. 

What should you do? 

A. Configure a Microsoft SQL Server Reporting Services (SSRS) report. 

B. Create an alert subscription. 

C. Configure an in-console alert. 

D. Create a ConfigMgr query. 

Answer:

Reference: Client Health Check in ConfigMgr 2012–In Action–Part 2 

http://myitforum.com/myitforumwp/2012/06/26/client-health-check-in-configmgr-2012in-actionpart-2/ 


Q45. Your network contains an Active Directory forest named litwareinc.com. 

The forest has a single domain. 

The forest contains a System Center 2012 Configuration Manager environment. 

The environment contains a single primary site. 

You create a group named InstallTechs. 

You need to ensure that the members of InstallTechs can deploy Applications to desktop computers by using Configuration Manager. 

The solution must minimize the number of permissions assigned to InstallTechs. 

What should you do? 

A. Assign the Application Administrator security role to InstallTechs. Create a new collection that contains all of the desktop computers. Scope InstallTechs to the new collection. 

B. Assign the Application Deployment Manager security role to InstallTechs. Create a new collection that contains all of the desktop computers. Scope InstallTechs to the new collection. 

C. Add the Application Deployment Manager security role to InstallTechs. Create a new collection that contains computers. Add InstallTechs to the local Administrators group on each desktop computer. 

D. Assign the Application Administrator security role to InstallTechs. Create a new collection that contains all of the desktop computers. Add InstallTechs to the local Administrators group on each desktop computer. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh524341.aspx 

Glossary for Microsoft System Center 2012 Configuration Manager Application Administrator A security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role. Application Deployment Manager A security role that grants permissions to administrative users so that they can deploy and monitor applications. http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-2012-configuration-manager.aspx 

Role-Based Administration in System Center 2012 Configuration Manager In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions (operations) for assignment to an Administrator. Instead of an individual permission set on a single instance of object, the Security Role provides a single Role assignment to an administrator; reducing the overall complexity with permission management. An “object” in the Security Role is something that you want to manage access to and “permission” is the operational functions, such as Read, Modify and Delete. 


Q46. Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients. 

All of the client computers have Windows Firewall enabled. 

Windows Firewall is configured to allow File and Printer Sharing. 

Users are not configured as local Administrators on their client computers. 

You deploy System Center 2012 Configuration Manager. 

You need to identify which methods you can use to deploy the Configuration Manager client to an of the client computers. 

Which client installation methods should you identify? (Choose all that Apply.) 

A. a logon script installation 

B. a manual client installation 

C. a software update-based client installation 

D. a Client Push Installation 

E. an Active Directory Group Policy-based installation 

Answer: C,D,E 

Explanation: 

C. Software update point uses the local SYSTEM account and All client computers are configured as WSUS clients. So the firewall should not affect functionality. 

D: Client Push Installation requires File and Printer Sharing and runs with the local SYSTEM account. 

E: Group Policy Installation requires File and Printer Sharing and runs with the local SYSTEM account. 

Incorrect: 

Not A: The Logon script runs with the user's credentials. 

Not B: Manual installation also runs with the user's credentials. 

Reference: http://technet.microsoft.com/en-us/library/gg682191.aspx 


Q47. Your company uses System Center 2012 Configuration Manager to distribute operating system images. 

You receive 300 new desktop computers. All of the client computers have the same hardware configuration. 

When you attempt to deploy a Windows 7 image to one of the client computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase. 

You need to ensure that you can deploy Windows 7 to the new computers by using an image. 

What should you do? 

A. Update the existing boot image to include the storage drivers. 

B. Clear the contents of the Drivers container and update the task sequence. 

C. Import the storage drivers to the Drivers container and update the task sequence. 

D. Create a new driver package and update the task sequence. 

Answer:

Explanation: 

Planning a Device Driver Strategy in Configuration Manager You can add Windows device drivers that have been imported into the driver catalog to boot images. Use the following guidelines when you add device drivers to a boot image: 

* Add only mass storage and network adapter device drivers to boot images because other types of drivers are not generally required. Drivers that are not required increase the size of the boot image unnecessarily. 

* Add only device drivers for Windows 7 to a boot image because the required version of Windows PE is based on Windows 7. 

* Ensure that you use the correct device driver for the architecture of the boot image. Do not add an x86 device driver to an x64 boot image. 

Reference: Planning a Device Driver Strategy in Configuration Manager 

http://technet.microsoft.com/en-us/library/gg712674.aspx 


Q48. Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.) 

(The exhibit shows that: Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.) 

The network contains six servers. The servers are configured as shown in the following table. 

You need to ensure that mobile device information is available in the hardware inventory. 

What should you do first? 

A. Install a management point on Server5. 

B. Configure IIS to support only HTTPS on Server5. 

C. Install a management point on Server2. 

D. Install Network Load Balancing (NLB) on Server3. 

E. Install an enrollment proxy point on Server6. 

F. Configure IIS to support only HTTP on Server3. 

G. Install a software update point on Server3. 

H. Install Network Load Balancing (NLB) on Server6. 

I. Install a PXE-enabled protected distribution point on Server5. 

J. Install the Windows Cluster service on Server3. 

K. Install a PXE-enabled protected distribution point on Server4. 

L. Install the Windows Cluster service on Server6. 

M. Install Windows Server Update Services (WSUS) on Server3. 

N. Install a protected distribution point on Server1. 

Answer:

Explanation: 

This is almost a discussion about which came first: the chicken or the egg. 

At first glance, I would have said that the correct answer is "Configure the Exchange 

connector on Server3". 

However, that answer is not available in this question, leaving only the "Enrollment Proxy 

Point" as a possible answer. 

Note: How to Install Clients on Mobile Devices and Enroll Them by Using Configuration Manager When you enroll mobile devices by using System Center 2012 Configuration Manager, this action installs the System Center 2012 Configuration Manager client to provide management capabilities that include hardware inventory, software deployment for required applications, settings, and remote wipe. To enroll these mobile devices, you must use Microsoft Certificate Services with an enterprise certification authority (CA) and the Configuration Manager enrollment point and enrollment proxy point site system roles. 

Reference: How to Install Clients on Mobile Devices and Enroll Them by Using Configuration Manager 

http://technet.microsoft.com/en-us/library/gg712327.aspx 


Q49. Your network contains a System Center 2012 Configuration Manage environment. 

The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server 2008 R2. 

Server2 contains the Configuration Manager database. 

Server2 fails. 

You install SQL Server 2008 R2 on a new server. 

You name the server Server3. 

You need to restore the Configuration Manager database to Server3. 

What should you do? 

A. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Configuration Manager 2012 Setup Wizard. 

B. From Server3, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database and log files. 

C. From Server3, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files. 

D. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Site Repair Wizard. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/gg712697.aspx 

Backup and Recovery in Configuration Manager 

Recover a Configuration Manager Site 

A Configuration Manager site recovery is required whenever a Configuration Manager site 

fails or data loss occurs in the site database. Repairing and resynchronizing data are the 

core tasks of a site recovery and are required to prevent interruption of operations. Site 

recovery is started by running the Configuration Manager 

Setup Wizard from installation media or by configuring the unattended installation script 

and then using the Setup command /script option. Your recovery options vary depending 

on whether you have a backup of the Configuration Manager site database. 

Site Database Recovery Options 

When you run Setup, you have the following recovery options for the site database: 

* Recover the site database using a backup set: Use this option when you have a backup of the Configuration Manager site database that was created as part of the Backup Site Server maintenance task run on the site before the site database failure. When you have a hierarchy, the changes that were made to the site database after the last site database backup are retrieved from the central administration site for a primary site, or from a reference primary site for a central administration site. When you recover the site database for a stand-alone primary site, you lose site changes after the last backup. When you recover the site database for a site in a hierarchy, the recovery behavior is different for a central administration site and primary site, and when the last backup is inside or outside of the SQL Server change tracking retention period. 

Further information: 

SCCM 2007 needed you to run Site Repair Wizard. 


Q50. You deploy Windows 7 by using Operating System Deployment (OSD). 

The development task sequence contains steps to install software updates and Applications. 

The amount of time required to deploy the Windows 7 image has increased significantly during the last six months. 

You need to recommend a solution to reduce the amount of time it takes to deploy the image. 

What should you recommend? 

A. Synchronize software updates before deploying the image. 

B. Use offline servicing for the image. 

C. Create a new automatic deployment rule. 

D. Add an additional Install Software Updates step to the deployment task sequence. 

Answer:

Explanation: 

http://blogs.technet.com/b/inside_osd/archive/2011/04/18/configuration-manager-2012-offline-servicing-foroperating-system-images.aspx 

Configuration Manager 2012: Offline Servicing for Operating System Images In Configuration Manager 2012 there is a new feature for applying updates to operating system images while they are in the Configuration Manager library. This means any operating system image you see in the Operating Systems > Operating Systems Images node from the Software Library wunderbar can be updated with Component Based Servicing (CBS) updates. By updating an image in the Software Library instead of performing a new build and capture of the operating system image you will gain a few distinct advantages. You will be able to reduce the risk of vulnerabilities during operating system deployments and reduce the overall operating system deployment to the end user. You will also reduce the administrative effort to maintain your operating system images. 

The feature is applicable for Component Based Servicing (CBS) updates and for the following operating systems: Microsoft Windows Vista SP2 and later Microsoft Windows Server 2008 SP2 and later Microsoft Windows 7 RTM Microsoft Windows 2008 R2 Further information: http://www.windows-noob.com/forums/index.php?/topic/4683-using-sccm-2012-rc-in-a-lab-part-12-updatingan-operating-system-image-using-offline-servicing/using SCCM 2012 RC in a LAB - Part 12. Updating an Operating System image using Offline Servicing.