70-243 Latest Certification Tests

Author: David Milan

Question: 1

You recently migrated from System Center Configuration Manager 2007 to System Center 2012 Configuration Manager.

Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bit version of Windows 7.

Some client computers have the Microsoft Application Virtualization (App-V) client installed.

You have an Application named App1.

You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1.

You need to deploy the Application to all of the client computers.

The solution must minimize the amount of administrative effort.

What should you do?

A. Create a new Application that has three different deployment types and create a target collection for each of the deployment types.

B. Create a new Application that has three different deployment types and configure globalconditions for each of the deployment types.

C. Create a new package for each version of App1.

D. Create a new Application for each version of App1.

Answer: B

Explanation:

How to Create Deployment Types in Configuration Manager

Supplemental Procedures toCreate a Deployment Type

Step 6: Specify Requirements for the Deployment Type

References: Reference: How to Create Deployment Types in Configuration Manager

http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step2

Question: 2

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.

You have an application named App by using the Application Catalog.

You need to ensure that users in the finance department can install App1 by using the Application Catalog.

What should you do?

A. Create a required user deployment and target the deployment to all of the financedepartment users.

B. Create a required user deployment and target the deployment to all of the client computers in the finance department.

C. Create an available user deployment and target the deployment to all of the finance department users.

D. Create anavailable user deployment and target the deployment to all of the client computers in the finance department.

Answer: C

Explanation:

By selecting "Available" it will be selectable for the users in the Application Catalog.

The "Required" option would force the installation to all users in the finance department.

Question: 3

Your network contains a System Center 2012 Configuration Manager environment.

Two weeks ago, you deployed a Windows Installer package named App1.

You need to remediate a registry value that applies only to the client computers that have App1 installed.

The solution must minimize network traffic.

What should you do?

A. Modify the App1 Windows Installer package to contain the registry setting, and then create a new application for App1.

B. Modify the App1 Windows Installer package to contain the registry setting, and then configure the existing application for App1 to use the new Windows Installer package.

C. Create an application-based configuration item, configure a rulefor an existential type, and then import the registry setting from a client computer that has App1 installed.

D. Create an application-based configuration item, configure the detection method to use the Windows Installer product code of App1, and then import the registry setting from a client computer that has App1 installed.

Answer: D

Explanation:

References: Introduction to Compliance Settings in Configuration Manager

http://technet.microsoft.com/en-us/library/gg682139.aspx

Question: 4

Your network contains a System Center 2012 Configuration Manager environment.

You need to create a collection that contains all of the virtual machines.

Which query should you use?

A. select * from SMS_R_SystemwhereSMS_R_System.ResourceID not in(select ResourceID from SMS_R_SystemwhereSMS_R_System.IsVirtualMachine!= 1)

B. select * from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine!= 1

C. select * from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine = 1

D. select* from SMS_R_Systemwhere SMS_R_System.ResourceID not in(select ResourceID from SMS_R_Systemwhere SMS_R_System.IsVirtualMachine = 1)

Answer: C

Explanation:

Use SMS_R_System.IsVirtualMachine = "True" to include all VMs.

Any number that is converted to boolean evaluates to True, apart from 0.

Question: 5

Your network contains a System Center 2012 Configuration Manager environment.

You create a report that lists compliance information.

You schedule the report to run every day at 20:00.

You need to ensure that on Friday, you can review the results of the report created on the previous Monday.

What should you configure the report to do?

A. Use caching.

B. Use a shared schedule.

C. Render on Friday.

D. Use snapshots.

Answer: D

Explanation:

Creating,Modifying, and Deleting Snapshots in Report History

Report history is a collection of report snapshots. You can maintain report history by adding and deleting snapshots, or by modifying properties that affect report history storage. You can create report history manually or on a schedule.

Question: 6

Your network contains an Active Directory forest.

The forest contains a System Center 2012 R2 Configuration Manager Service Pack (SP1) environment. The environment contains one primary site.

You need to ensure that the members of a group named Group1 are allowed to deploy applications to desktop computers.

The solution must minimize the number of permissions assigned to Group1.

What should you do?

A. Assign the Application Administrator security roleto Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.

B. Add the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.

C. Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.

D. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.

Answer: C

Explanation:

Application Deployment Manager is a securityrole that grants permissions to administrative users so that they can deploy and monitor applications.

Question: 7

Your network contains a single Active Directory domain.

The domain contains a System Center Configuration Manager 2007 R3 site and a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) site.

You need to ensure that you can migrate objects from Configuration Manager 2007 R3 to System Center 2012 R2 Configuration Manager SP1.

What should you do?

A. Assign the computer account of the Central Administration site server permission to the Configuration Manager 2007 R3 site. Assign the computer account of the Central Administration site server permission to the Microsoft SQL Server database instance.

B. Connect the System Center2012 R2 Configuration Manager SP1 primary site as a child primary site of the System Center Configuration Manager 2007 R3 primary site.

C. Extend the Active Directory schema and assign the Central Administration site server permissions to the System\System Management container.

D. Connect the System Center Configuration Manager 2007 R3 primary site as a child primary site of the System Center 2012 R2 Configuration Manager SP1 primary site.

Answer: A

Explanation:

To migrate from a supported source hierarchy, you must have access to each applicable Configuration Manager source site, and permissions within the System Center 2012 Configuration Manager destination site to configure and run migration operations.

Question: 8

Your network contains a System Center 2012 Configuration Management environment.

The network contains 10 database servers that run Microsoft SQL Server 2008.

You have a configuration baseline that is used to monitor database servers.

You confirm that all of the database servers downloaded the configuration baseline.

You discover that a database server named Server1 fails to report any data for the configuration baseline.

You need to identify whether Server 1 evaluates the configuration items that are part of the configuration baseline.

Which log file should you review?

A. Locationservices.log

B. Smsexec.log

C. Ccm.log

D. Sdmagent.log

E. Dcmagent.log

F. Rcmctrl.log

G. Wsyncmgr.log

H. Ciagent.log

I. Hman.log

J. Contenttransfermanager.log

K. Sitestat.log

Answer: E

Explanation:

DCMAgent.log is a client log file that records high-level information about the evaluation, conflict reporting, and remediation of configuration items and applications.

Question: 9

You enable Client Push.

You run Active Directory System Discovery.

You discover that some of the discovered computers do not have the System Center 2012 R2

Configuration Manager Service Pack 1 (SP1) client installed.

You need to identify why Client Push fails on some of the client computers.

Which log file should you review?

A. Locationservices.log

B. Smsexec.log

C. Ccm.log

D. Sdmagent.log

E. Dcmagent.log

F. Rcmctrl.log

G. Wsyncmgr.log

H. Ciagent.log

I. Hman.log

J. Contenttransfermanager.log

K. Sitestat.log

Answer: C

Explanation:

Ccm.log is a site server log file that records client push installation activities.

Question: 10

Your network contains a System Center 2012 Configuration Manager environment.

You add a software update point to the environment.

You receive a message indicating that SMS WSUS Synchronization failed.

You need to retrieve additional information about the message.

Which log file should you review?

A. Locationservices.log

B. Smsexec.log

C. Ccm.log

D. Sdmagent.log

E. Dcmagent.log

F. Rcmctrl.log

G. Wsyncmgr.log

H. Ciagent.log

I. Hman.log

J. Contenttransfermanager.log

K. Sitestat.log

Answer: G

Explanation:

Wsyncmgr.log is a site server log file that records details about the software updates synchronization process.

Question: 11

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.

The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.

You discover that none of the packages created on Site1 are displayed in Site2.

You need to identify whether there is a replication issue between the sites.

What should you review?

A. the Inventoryagent.log file

B. the Colleval.log file

C. the Microsoft SQL Server replication diagnostic files

D. the Despool.log file (or Replmgr.log IN EXAM!)

Answer: D

Explanation:

Despool.log is a site server log file that records incoming site-to-site communication transfers.

Note:

Usually, you look at the Rcmctrl.log file. But since that isn't one of the possible answers, you are left with the Despool.log file.

Question: 12

Your company uses System Center 2012 Configuration Manager to deploy applications.

The company purchases a new application named App1. App1 can be installed only on client computers that run Windows 7.

You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of memory and 300 Gb of free disk space.

What should you create?

A. a Query object

B. custom client user settings

C. a configuration baseline

D. a query-based collection

Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/gg682177.aspx

Introduction to Collections in Configuration Manager

Collections in System Center 2012 Configuration Manager represent logical groupings of resources, such as users and devices. You can use collections tohelp you perform many tasks, such as managing applications, deploying compliance settings, or installing software updates. You can also use collections to manage groups of client settings.

Query Rule

Query rules dynamically update the membership of a collection based on a query that Configuration Manager runs on a schedule. For example, you can create a collection of users who are a member of the Human Resources organizational unit in Active Directory Domain Services. Unlike direct rule collections, thiscollection membership automatically updates when you add or remove new users to the Human Resources organizational unit.

http://technet.microsoft.com/en-us/library/gg682073.aspx

Prerequisites for Compliance Settings in Configuration Manager

To run queriesrelated to compliance settings: Read permission for the Query object.

http://technet.microsoft.com/en-us/library/gg712688.aspx

Planning for Client Settings in Configuration Manager

Use client settings in System Center 2012 Configuration Manager to configure userand device settings for the hierarchy. Client settings include configuration options such as the hardware inventory and schedule, and the polling schedule for client policy.

All Configuration Manager clients in the hierarchy use the Default ClientSettings that are automatically created when you install Configuration Manager. However, you can modify the default client settings and you can create custom client settings to override the default client settings for specific users or devices.

http://technet.microsoft.com/en-us/library/gg682139.aspx

Introduction to Compliance Settings in Configuration Manager

Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rulesthat describe the level of compliance you must have.

Question: 13

Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients.

All of the client computers have Windows Firewall enabled. Windows Firewall is configured to allow File and Printer Sharing.

Users are not configured as local Administrators on their client computers.

You deploy System Center 2012 Configuration Manager.

You need to identify which methods you can use to deploy the Configuration Manager client to an of the client computers.

Which client installation methods should you identify? (Choose all that Apply.)

A. a logon script installation

B. a manual client installation

C. a software update-based client installation

D. a Client Push Installation

E. an Active Directory Group Policy-based installation

Answer: C,D,E

Explanation:

C. Software update point uses the local SYSTEM account and All client computers are configured as WSUS clients. So the firewall should notaffect functionality.

D: Client Push Installation requires File and Printer Sharing and runs with the local SYSTEM account.

E: Group Policy Installation requires File and Printer Sharing and runs with the local SYSTEM account.

Question: 14

Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.

The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server 2012. Server2 contains the Configuration Manager database.

Server2 fails.

You install SQL Server 2012 on a new server. You name the server Server3.

You need to restore the Configuration Manager database to the new server.

What should you do?

A. From Server1, run the Configuration Manager 2012Setup Wizard.

B. From Server2, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.

C. From Server2, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database andlog files.

D. From Server1, run the Site Repair Wizard.

Answer: A

Explanation:

Answer is From Server1, run the Configuration Manager 2012 Setup Wizard.

Recover a Configuration Manager Site

A Configuration Manager site recovery is required whenever a Configuration Manager site fails or data loss occurs in the site database. Repairing and resynchronizing data are the core tasks of a site recovery and are required to prevent interruption of operations. Site recovery is started by running the Configuration Manager Setup Wizard from installation media or by configuring the unattended installation script and then using the Setup command /script option. Your recovery options vary depending on whether you have a backup of the Configuration Manager site database.

Site Database Recovery Options

When you run Setup, you have the following recovery options for the site database:

  • Recover the site database using a backup set: Use this option when you have a backup of the Configuration

Manager site database that was created as part of the Backup Site Server maintenance task run on the site before the site database failure. When you have a hierarchy, the changes that were made to the site database after the last site database backup are retrieved from the central administration site for a primary site, or from a reference primary site for a central administration site. When you recover the site database for a stand-alone primary site, you lose site changes after the last backup.

When you recover the site database for a site in a hierarchy, the recovery behavior is different for a central administration site and primary site, and when the last backup is inside or outside of the SQL Server change tracking retention period.