Exambible can be a corporation that will assist you to move Microsoft assessments. This site offers a large range for research manuals pertaining to various businesses goods. Exambible supply you with the most recent release of your Microsoft 70-243 test this means you know you will always be up-to-date. Additionally supply provided models to buy you will save prior to your choosing this selection. This provider makes an attempt very difficult to surpass its actually term Exambible in order that it could help you. Other sorts of businesses presenting a reverse phone lookup provides you with old answers. Exambible everyday life around its actually term by just merely offering the most current material. Cross Microsoft 70-243 exercise assessments by utilizing all of our Microsoft 70-243 Study Substances in addition to 70-243. You might expert your current Microsoft 70-243 exercise evaluation by using a 100% guarantee. The Exambible Microsoft professionals inside our internet coaching team have come up with the very best articles provided with the highest performing level of quality throughout Microsoft problems in addition to Microsoft 70-243 problems.
Q61. Your network contains a System Center 2012 Configuration Manager environment.
Software Inventory and Hardware Inventory are enabled for all of the client computers.
All of the client computers have an Application named App1 installed.
App1 saves files to the C:\ABC folder.
All of the files saved by App1 have a file name extension of .abc.
You configure Software Inventory to inventory all of the files that have the .abc extension and the .exe extension.
After six months, you discover that some of the client computers failed to inventory .abc files. All of the client computers inventory .exe files.
You need to ensure that the .abc files are inventoried.
What should you do?
A. Modify C:\Program Files\App1\NO_SMS_On_Drive.sms.
B. Delete C:\Program Files\App1\NO_SMS_On_Drive.sms.
C. Modify C:\ABC\Skpswi.dat.
D. Delete C:\ABC\Skpswi.dat.
Answer: D
Explanation:
How to Exclude Folders from Software Inventory in Configuration Manager You can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude it from System Center 2012 Configuration Manager software inventory. You can also place this file in the root of any folder structure you want to exclude from software inventory. This procedure can be used to disable software inventory on a single workstation or server client, such as a large file server. Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive on the client computer.
Reference: How to Exclude Folders from Software Inventory in Configuration Manager
http://technet.microsoft.com/en-us/library/hh691018.aspx
Q62. Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients.
All of the client computers have Windows Firewall enabled.
Windows Firewall is configured to allow File and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center 2012 Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager client to an of the client computers.
Which client installation methods should you identify? (Choose all that Apply.)
A. a logon script installation
B. a manual client installation
C. a software update-based client installation
D. a Client Push Installation
E. an Active Directory Group Policy-based installation
Answer: C,D,E
Explanation:
C. Software update point uses the local SYSTEM account and All client computers are configured as WSUS clients. So the firewall should not affect functionality.
D: Client Push Installation requires File and Printer Sharing and runs with the local SYSTEM account.
E: Group Policy Installation requires File and Printer Sharing and runs with the local SYSTEM account.
Incorrect:
Not A: The Logon script runs with the user's credentials.
Not B: Manual installation also runs with the user's credentials.
Reference: http://technet.microsoft.com/en-us/library/gg682191.aspx
Q63. Your network contains a System Center 2012 Configuration Manager environment.
In Default Client Agent Settings, you enable Hardware Inventory and Software Inventory.
You discover that a group of client computers fails to report software inventory data.
The client computers report hardware inventory data.
You confirm that Configuration Manager can deploy Applications to the group of client
computers.
You need to identify what is causing the reporting issue.
Which log files should you review? (Choose all that Apply.)
A. Filesystemfile.log
B. Dataldr.log
C. Mp_sinv.log
D. Inventoryagent.log
E. Hman.log
Answer: A,C,D
Explanation:
Technical Reference for Log Files in Configuration Manager
A: Configuration Manager Client Logs - Client Operations FileSystemFile.log Client log file Records the activity of the Windows Management Instrumentation (WMI) provider for software inventory and file collection.
B: Configuration Manager Site Server Log Files - Site Server and Site System Server Logs dataldr.log Site server log file Records information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database.
D: Configuration Manager Client Logs - Client Operations Inventoryagent.log Client log file Records activities of hardware inventory, software inventory, and heartbeat discovery actions on the client.
Reference: Technical Reference for Log Files in Configuration Manager
http://technet.microsoft.com/en-us/library/hh427342.aspx
Q64. Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table:
Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.
You plan to deploy servers to the perimeter network by using Configuration Manager.
The operating system for each server will be installed over the network.
The installations will begin automatically, as soon as each server starts for the first time.
You need to recommend a solution to minimize the amount of network traffic between the perimeter network and the internal network during the installation of the operating systems.
What should you do?
A. Install a software update point on Server3.
B. Configure IIS to support only HTTP on Server3.
C. Install a PXE-enabled protected distribution point on Server5.
D. Install a management point on Server5.
E. Install Windows Server Update Services (WSUS) on Server3.
F. Install Network Load Balancing (NLB) on Server6.
G. Install the Windows Cluster service on Server6.
H. Install a PXE-enabled protected distribution point on Server4.
I. Install a management point on Server2.
J. Install a protected distribution point on Server1.
K. Install the Windows Cluster service on Server3.
L. Install Network Load Balancing (NLB) on Server3.
M. Configure the Exchange connector on Server3.
N. Configure IIS to support only HTTPS on Server5.
O. Install an enrollment proxy point on Server6.
Answer: C
Explanation:
Methods Used to Deploy Operating Systems There are several methods that you can use to deploy operating systems to Configuration Manager client computers:
* PXE initiated deployments: PXE-initiated deployments let client computers request a deployment over the network. In this method of deployment, the operating system image and a Windows PE boot image are sent to a distribution point that is configured to accept PXE boot requests.
Note:
A protected distribution point will limit deployment to a predefined boundary. (the perimeter network) With PXE enabled the servers will be installed when they boot.
Reference: Introduction to Operating System Deployment in Configuration Manager
http://technet.microsoft.com/en-us/library/gg682108.aspx
Q65. Your network contains a System Center 2012 Configuration Management environment. The environment contains a Central Administration site and two primary child sites named Child1 and Child2.
You create a new Application on the Central Administration site.
You view the new Application on Child1, but the new Application fails to appear on Child2.
You need to identify whether the Application transferred to Child2.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: F
Explanation:
Technical Reference for Log Files in Configuration Manager Rcmctrl.log Site server log file Records the activities of database replication between sites in the hierarchy.
Reference: Technical Reference for Log Files in Configuration Manager
http://technet.microsoft.com/en-us/library/hh427342.aspx
Q66. Your network contains a System Center 2012 Configuration Manager environment.
You deploy the Configuration Manager client to all client computers.
You enable Hardware Inventory and Software Inventory for all of the client computers.
You discover that one of the client computers fails to report inventory data.
You confirm that the inventory files are copied correctly to the site server.
You discover, however, that the site server does not contain any data from the client
computer.
You need to identify what is causing the reporting issue.
Which log file should you review?
A. Dataldr.log
B. Mp_hinv.log
C. Inventoryagent.log
D. Contenttransfermanager.log
Answer: A
Explanation:
dataldr.log Site Server log file Records information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database.
Incorrect: MP_Hinv.log Site system server log file Records details about the conversion of XML hardware inventory records from clients and the copy of those files to the site server. InventoryAgent.log Client log file Records activities of hardware inventory, software inventory, and heartbeat discovery actions on the client. Contenttransfermanager.log Client log file Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to access packages.
Note: http://technet.microsoft.com/en-us/library/bb932206.aspx
Troubleshooting Configuration Manager Performance Slow Hardware Inventory Processing - Solution If you suspect that hardware inventory report processing is slow for a Configuration Manager 2007 site, the following actions should be taken: Inspect the client inventoryagent.log log file to determine whether the client is sending delta hardware inventory reports or full reports. After initial client deployment, a very high percentage of hardware inventory reports should be deltas, which contain much less data than full inventory reports. If you are seeing a significant number of full inventory reports, this could be caused by inconsistent inventory report processing by the site server. For example, a delta hardware inventory report could be processed before a full inventory report for the same system has been processed. In this situation, a hardware inventory resynchronization request will be sent to the client and an additional full inventory report will be generated. To determine whether this is happening, review the dataldr.log log file on the site server.
Inspect the size of the hardware inventory files in the site server's inbox directory to determine whether the software inventory files have grown significantly from previous inventory reports. If hardware inventory report file sizes have grown beyond an initial hardware inventory report file size baseline, you should determine the cause and whether the larger inventory report files are expected to be larger. One possibility is that the site’s SMS_def.mof file has been modified to collect more inventory information from clients. Determine whether there is a consistent SMS_def.mof hardware inventory reporting file in use throughout the hierarchy. If not, the hardware inventory processor might be running very slowly because of changes in the database schema caused by the different SMS_def.mof files throughout the hierarchy. The dataloader.log log file will record instances of database schema changes and should be reviewed when investigating this issue.
Reference: http://technet.microsoft.com/en-us/library/hh427342.aspx Technical Reference for Log Files in Configuration Manager
Q67. You enable Client Push.
You run Active Directory System Discovery.
You discover that some of the discovered computers do not have the System Center 2012
Configuration Manager client installed.
You need to identify why Client Push fails of the client computers.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: C
Explanation:
Ccm.log Site server log file
Records client push installation activities. Reference: Technical Reference for Log Files in Configuration Manager http://technet.microsoft.com/en-us/library/hh427342.aspx
Q68. You manage s System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You need to ensure that Configuration Manager clients can use the Application Catalog.
Which client settings should you configure?
A. Software Metering
B. Computer Agent
C. Software Deployment
D. Software Inventory
Answer: B
Explanation: Computer Agent has the Default Application Catalog website point setting. Configuration Manager uses this setting to connect users to the Application Catalog from Software Center. You can specify a server that hosts the Application Catalog website point by its NetBIOS name or FQDN, specify automatic detection, or specify a URL for customized deployments.
Reference: About Client Settings in Configuration Manager
https://technet.microsoft.com/en-us/library/gg682067.aspx#BKMK_ComputerAgentDeviceSettings
Q69. Your network contains a System Center 2012 Configuration Manager environment.
You add a software update point to the environment.
You receive a message indicating that SMS WSUS Synchronization failed.
You need to retrieve additional information about the message.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: G
Explanation:
wsyncmgr.log Site server log file Records details about the software updates synchronization process.
Reference: http://technet.microsoft.com/en-us/library/hh427342.aspx
Technical Reference for Log Files in Configuration Manager
Q70. Your network contains an Active Directory forest named litwareinc.com.
The forest has a single domain.
The forest contains a System Center 2012 Configuration Manager environment.
The environment contains a single primary site.
You create a group named InstallTechs.
You need to ensure that the members of InstallTechs can deploy Applications to desktop computers by using Configuration Manager.
The solution must minimize the number of permissions assigned to InstallTechs.
What should you do?
A. Assign the Application Administrator security role to InstallTechs. Create a new collection that contains all of the desktop computers. Scope InstallTechs to the new collection.
B. Assign the Application Deployment Manager security role to InstallTechs. Create a new collection that contains all of the desktop computers. Scope InstallTechs to the new collection.
C. Add the Application Deployment Manager security role to InstallTechs. Create a new collection that contains computers. Add InstallTechs to the local Administrators group on each desktop computer.
D. Assign the Application Administrator security role to InstallTechs. Create a new collection that contains all of the desktop computers. Add InstallTechs to the local Administrators group on each desktop computer.
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/hh524341.aspx
Glossary for Microsoft System Center 2012 Configuration Manager Application Administrator A security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role. Application Deployment Manager A security role that grants permissions to administrative users so that they can deploy and monitor applications. http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-2012-configuration-manager.aspx
Role-Based Administration in System Center 2012 Configuration Manager In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions (operations) for assignment to an Administrator. Instead of an individual permission set on a single instance of object, the Security Role provides a single Role assignment to an administrator; reducing the overall complexity with permission management. An “object” in the Security Role is something that you want to manage access to and “permission” is the operational functions, such as Read, Modify and Delete.