(FREE DOWNLOAD) 70-243 Braindump2go Dumps PDF Free Updation Available Now! (21-30)
Braindump2go New Published Exam Microsoft
70-243 pdf dumps sample questions free download! Braindump2go promises you a
100% PASS Or Full Moeny Back! All Questions and answers are from Microsoft
Official Exam Centre-100% same with 70-243 Real Exam!
Vendor: Microsoft
Exam Code: 70-243
Exam Name: Administering and Deploying System Center 2012 Configuration
Manager
QUESTION 21
Note: This question is part of a series of questions that use
the same set of answer choices. n answer choice may be correct for more than one
question in the series.
Your network contains a System Center 2012
Configuration Manager environment.
The network contains 10 database servers
that run Microsoft SQL Server 2008.
You have a configuration baseline that
is used to monitor the database servers.
You add new configuration items to
the configuration baseline.
Two days later, you discover that only eight of
the database servers report any information about the new configuration items.
You need to identify whether the new configuration items downloaded to the
database servers. Which log file should you review?
A. Hman.log
B. Sitestat.log
C. Dcmagent.log
D. Wsyncmgr.log
E. Ccm.log
F. Contenttransfermanager.log
G. Sdmagent.log
H. Rcmctri.log
I. Ciagent.log
J. Smsexec.log
K. Locationservices.log
Answer: I
Explanation:
Ciagent.log Not related to US foreign
security policy but provides information about processing
configuration
items, including software updates.
Incorrect:
Not B: Sitestat.log:
Records the monitoring process of all site systems.
QUESTION 22
Note: This question is part of a series of questions that use
the same set of answer choices.
An answer choice may be correct for more
than one question in the series.
You create a deployment to install
Microsoft Office 2010.
The deployment targets 5,000 client computers on the
network.
Two weeks after you create the deployment, you discover that Office
2010 fails to install on a client computer named Computer 1.
You need to
identify whether Computer1 started downloading the Application of Office 2010.
Which log file should you review?
A. Locationservices.log
B. Ccm.log
C. Sdmagent.log
D. Sitestat.log
E. Rcmctrl.log
F. Dcmagent.log
G. Contenttransfermanager.log
H. Smsexec.log
I. Wsyncmgr.log
J. Ciagent.log
K. Hman.tog
Answer: G
Explanation:
How to find if download start, TS using log
file: ContentTransferManager.log SDMAgent.log – desired configuration management
and contains the tracking process of remediation and compliance. dcmagent.log –
Provides high-level information about the evaluation of assigned configuration
baselines CIAgent.log – Tracks the process of remediation and compliance
Updateshandler.log – provides more informative details on installing the
software updates wsyncmgr.log -Provides information about the software updates synchronization process
Smsexec.log – Records processing of all site server
component threads. ContentTransferManager.log
– Schedules the Background
Intelligent Transfer Service (BITS) or the Server
QUESTION 23
Note: This question is part of a series of questions that use
the same set of answer choices.
An answer choice may be correct for more
than one question in the series.
Your network contains a System Center 2012
Configuration Management environment.
The environment contains a Central
Administration site and two primary child sites named Child1 and Child2.
You
create a new Application on the Central Administration site.
You view the
new Application on Child 1, but the new Application fails to appear on Child2.
You need to identify whether the Application transferred to Child2.
Which log file should you review?
A. Locabonservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: F
Explanation:
Rcmctrl.log
Replication related
information.
Incorrect:
Not A: Locatonservices.log Finds management
points and distribution points.
Not B: Smsexec.log Records processing of all
site server component threads.
Not C: Ccm.log
Client Configuration
Manager tasks.
Not D: Sdmagent.log
Shared with the Configuration Manager
feature desired configuration management and
contains the tracking process
of remediation and compliance.
Not E: Dcmagent.log
Provides high-level
information about the evaluation of assigned configuration baselines
and
desired configuration management processes.
Not G: Wsyncmgr.log
Provides
information about the software updates synchronization process.
Not H:
Ciagent.log
Not related to US foreign security policy but provides
information about processing
configuration items, including software
updates.
Not I: Hman.log
Records site configuration changes, and
publishes site information in Active Directory
Domain Services.
Not J:
ContentTransferManager.log
Schedules the Background Intelligent Transfer
Service (BITS) or the Server Message Block
(SMB) to download or to access
SMS packages.
Not K: Sitestat.log
Records the monitoring process of all
site systems.
QUESTION 24
Your network contains an Active Directory forest. The forest
contains a System Center 2012 Configuration Manager environment. The environment
contains one primary site.
You need to unsure that the members of a group
named Group1 are allowed to deploy applications to desktop computers.
The
solution must minimize the number of permissions assigned to Group1.
What
should you do?
A. Assign the Application Administrator security role to Group1.
Create a new collection that contains all of the desktop computers.
Add
Group1 to the local Administrators group on each desktop computer.
B. Add the Application Deployment Manager security role to Group1.
Create a new collection that contains all of the desktop computers.
Add
Group1 to the local Administrators group on each desktop computer.
C. Assign the Application Deployment Manager security role to Group1.
Create a new collection that contains all of the desktop computers.
Scope Group1 to the new collection.
D. Assign the Application Administrator security role to Group1.
Create a new collection that contains all of the desktop computers.
Scope Group1 to the new collection.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh524341.aspx
Glossary for Microsoft System Center 2012 Configuration Manager Application
Administrator
A security role that grants permissions to administrative
users so that they can perform both the
Application Deployment Manager role
and the Application Author role.
Application Deployment Manager
A
security role that grants permissions to administrative users so that they can
deploy and
monitor applications.
http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-systemcenter-
2012-configuration-manager.aspx
Role-Based Administration in System
Center 2012 Configuration Manager
In Configuration Manager 2012, Security
Roles are used to collectively group objects and permissions (operations) for
assignment to an Administrator. Instead of an individual permission set on a
single instance of object, the Security Role provides a single Role assignment
to an administrator; reducing the overall complexity with permission management.
An “object” in the Security Role is something that you want to manage access to
and “permission” is the operational functions, such as Read, Modify and
Delete.
QUESTION 25
Your network contains a single Active Directory domain.
You plan to deploy System Center 2012 Configuration Manager.
The
hierarchy will have a Central Administration site and five primary sites.
You need to ensure that you can target user groups for software
distribution.
The solution must minimize network traffic.
Which
Configuration Manager discovery method should you use?
A. Active Directory User Discovery on the primary sites
B. Active
Directory User Discovery on the primary sites and Active Directory Group
Discovery on
every site
C. Active Directory User Discovery on the Central Administration site and
Active Directory Group
Discovery on the primary sites
D. Active Directory User Discovery and Active Directory Group Discovery on
the Central Administration
site
Answer: B
Explanation:
AD User discovery for Primary Site and
Group discover for Each Primary Site:
When discovery of a resource is successful, discovery puts information about
the resource in a file that is referred to as a discovery data record (DDR).
DDRs are in turn processed by site servers and entered into the Configuration
Manager database where they are then replicated by database- replication with
all sites. The replication makes discovery data available at each site in the
hierarchy, regardless of where it was discovered or processed.
Caution
When you clear the option to publish a site to an Active
Directory forest, all previously published information for that site, including
available site system roles, is removed from the Active Directory of that
forest.
When you run Active Directory System Discovery and Active Directory
User Discovery, the additional Active Directory attributes for each object type
are available, and as a result, Active Directory Group Discovery runs more
efficiently.
Active Directory System Group Discovery works only for systems
that are already discovered and assigned to the local primary site and any
direct child secondary sites
Use Configuration Manager Active Directory
Forest Discovery to discover IP subnets and Active Directory sites and to add
them to Configuration Manager as boundaries.
Consider the scope of the
discovery configuration and limit discovery to only those Active Directory
locations and groups that you have to discover.
Only Network Discovery
available on Secondary site. Others not available for secondary site.
http://technet.microsoft.com/en-us/library/6a0e2b40-672f-45e1-a12d-
6d403ab39780#BKMK_DiscMethods
Personal comment:
From my point of view,
the correct answer would be Active Directory User Discovery and Active Directory
Group Discovery on the primary sites
The remaining possible correct answers
might be:
Active Directory User Discovery on the primary sites and Active
Directory Group Discovery on every site
or
Active Directory User
Discovery and Active Directory Group Discovery on the Central Administration
site
Update:
It seems that more recent exams contain the answer “Active
Directory User Discovery and Active Directory Group Discovery on the primary
sites”
So if you are lucky and have it, choose this one.
QUESTION 26
Your network contains a System Center 2012 Configuration
Manager environment. The Configuration Manager databases are located on a remote
server that runs Microsoft SQL Server.
You need to ensure that you can
restore the Central Administration site.
What should you do?
A. From the Configuration Manager console, enable the Backup Site Server
maintenance task and set
a schedule.
B. From Microsoft SQL Server Management Studio, create a maintenance plan
for the site databases.
C. From Task Scheduler, create a scheduled task that runs
smssqlbkup.exe.
D. From Windows Server Backup, schedule a full system backup.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/gg712697.aspx
Backup and Recovery in Configuration Manager
Enterprise solutions such
as System Center 2012 Configuration Manager must prepare for both backup and
recovery operations to avoid loss of critical data. For Configuration Manager
sites, this preparation ensures that sites and hierarchies are recovered with
the least data loss and in the quickest possible time.
Back up a
Configuration Manager Site
System Center 2012 Configuration Manager provides
a backup maintenance task that runs on a schedule and backs up the site
database, specific registry keys, and specific folders and files.
Backup
Maintenance Task
You can automate backup for Configuration Manager sites by
scheduling the predefined Backup Site Server maintenance task.
You can back
up a central administration site and primary site, but there is no backup
support for secondary sites or site system servers.
To enable the site
backup maintenance task
1. In the Configuration Manager console, click
Administration.
2. In the Administration workspace, expand Site
Configuration, and then click Sites.
3. Select the site in which you want to
enable the site backup maintenance task.
4. On the Home tab, in the Settings
group, click Site Maintenance Tasks.
5. lick Backup Site Server and then
click Edit.
6. Select Enable this task, and then click Set Paths to specify
the backup destination.
7. Configure an appropriate schedule for the site
backup task. As a best practice, consider a backup schedule that is outside
active working hours. If you have a hierarchy, consider a schedule that runs at
least two times a week to ensure maximum data retention in the event of site
failure.
8. Select whether to create an alert if the site backup task fails,
click OK, and then click OK. When selected, Configuration Manager creates a
critical alert for the backup failure that you can review in the Alerts node in
the Monitoring workspace.
QUESTION 27
Your network contains a single Active Directory forest named
contoso.com. Contoso.com contains three System Center 2012 Configuration Manager
sites and one System Center Configuration Manager 2007 site.
You need to
ensure that you can transfer objects from Configuration Manager 2007 to
Configuration Manager 2012.
What should you do?
A. Assign the computer account of the Central Administration site server
permission to the Configuration
Manager 2007 site.
Assign the computer
account of the Central Administration site server permissions to the Microsoft
SQL Server database instance.
B. Extend the Active Directory schema and assign the Central
Administration site server permissions to
the System\System Management
container.
C. Connect the Configuration Manager 2007 primary site as a child primary
site of the Configuration
Manager 2012 primary site.
D. Connect the Configuration Manager 2012 primary site as a child primary
site of the Configuration
Manager 2007 primary site.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/gg712991.aspx
Determine Whether to Migrate Configuration Manager 2007 to System Center
2012 Configuration Manager
In Microsoft System Center 2012 Configuration
Manager, the built-in migration functionality replaces in-place upgrades of
existing Configuration Manager infrastructure by providing a process that
transfers data from active Configuration Manager 2007 sites. The functionality
provided by migration helps you maintain investments that you have made in
configurations and deployments while you can take full advantage of core changes
in the product introduced in System Center 2012 Configuration Manager. These
changes include a simplified Configuration Manager hierarchy that uses fewer
sites and resources, and the improved processing by use of native 64-bit code
that runs on 64-bit hardware.
Migration can transfer most data from
Configuration Manager 2007.
http://technet.microsoft.com/en-us/library/gg681981.aspx
Planning for Migration to System Center 2012 Configuration Manager
You
must first install a System Center 2012 Configuration Manager hierarchy to be
the destination hierarchy before you can migrate data from a supported source
hierarchy.
After you install the destination hierarchy, configure the
management features and functions that you want to use in your destination
hierarchy before you start to migrate data.
http://technet.microsoft.com/en-us/library/gg712313.aspx
Prerequisites for Migration in System Center 2012 Configuration Manager
To migrate from a supported source hierarchy, you must have access to each
applicable
Configuration Manager source site, and permissions within the
System Center 2012
Configuration Manager destination site to configure and
run migration operations.
Required Configurations for Migration
Data
Gathering
To enable the destination site to gather data, you must configure
the following two source
site access accounts for use with each source site:
* Source Site Account: This account is used to access the SMS Provider of
the source site.
* For a Configuration Manager 2007 SP2 source site, this
account requires Read
permission to all source site objects.
* For a
System Center 2012 Configuration Manager source site, this account requires Read
permission to all source site objects, You grant this permission to the account
by using role-based administration.
* Source Site Database Account: This
account is used to access the SQL Server database of the source site and
requires Read and Execute permissions to the source site database.
You can
configure these accounts when you configure a new source hierarchy, data
gathering for an additional source site, or when you reconfigure the credentials
for a source site. These accounts can use a domain user account, or you can
specify the computer account of the top-level site of the destination hierarchy.
Security Note: If you use the Configuration Manager computer account for
either access account, ensure that this account is a member of the security
group Distributed COM Users in the domain where the source site resides.
When gathering data, the following network protocols and ports are used:
NetBIOS/SMB – 445 (TCP)
RPC (WMI) – 135 (TCP)
SQL Server – 1433
(TCP)
QUESTION 28
Your network contains a System Center 2012 Configuration
Manager environment.
The hierarchy contains a Central Administration site
named Site1 and a primary site named Site2.
You discover that none of the
collections created on Site1 are displayed on Site2.
You need to identify
whether there is replication issue between the sites.
What should you
review?
A. the Colleval.log file.
B. the Despool.log file
C. the
Rcmctrl.log file
D. the Sender.log file
Answer: C
Explanation:
despool.log
Records incoming site-to-site
communication transfers. rcmctrl.log Records the activities of database
replication between sites in the hierarchy. sender.log Records the files that
transfer by file-based replication between sites.
QUESTION 29
Your network contains a System Center 2012 Configuration
Manager environment.
The environment contains a single primary site.
The
primary site has a distribution point and a management point.
You need to
recommend a commutation solution that meets the following requirements:
–
Communication between the client computes in the research department and the
management point must use HTTPS.
– Communication between all of the other
client computes and the management point must be able to use HTTP.
–
Minimize the number of site system.
What should you do?
A. Configure the existing management point to use HTTPS.
Configure the
research department computers always to um HTTPS.
B. Create a now primary child site and configure the site to use native
mode.
Assign all of the research department computers to the new site.
C. Install a new management point and configure the management point
always to use HTTPS.
Configure the research department computers always to
use HTTPS.
D. Install a new management point and configure Windows Firewall to block
abound TCP port 80.
Configure the research department computes always to use
HTTPS.
Answer: C
Explanation:
To communicate with a site system role,
the client must first locate a site system support the protocol (HTTPS or HTTP)
that the client can use. By default, clients use the most secure method
available to them. using HTTPS before it communicates with a site system role
that uses HTTP. When you deploy a site system role include management points, an
Application Catalog website point, a state migration point, or distribution
points, you must specify whether clients connect to the site system by using
HTTP or HTTPS. If you use HTTP, you must also consider signing and encryption
choices. In a single site, you can have one management point that accepts HTTPS
client communication and another management point that accepts HTTP client
communication. You can use one site to manage clients across different network
locations that use different communication protocols and security settings.
Site properties, Client Computer Communication, default : HTTPS or HTTP
Other client computers can be configured for Internet and intranet client
management. They can automatically switch between Internet-based client
management and intranet client management when they detect a change of network.
If these clients can find and connect to a management point that is configured
for client connections on the intranet, they attempt to connect to an Internet-
based management point.
http://technet.microsoft.com/en-us/library/gg712701#Planning_Intra_site_Com
QUESTION 30
Note: This question is part of a series of questions that use
the same set of answer choices.
An answer choice may be correct for more
than one question in the series.
Your network contains a System Center 2012
Configuration Manager environment.
Your company deploys 1,000 client
computers.
You discover that information about printers fails to appear in
any inventory queries or reports. Information about other hardware devices
appears in the inventory queries and reports.
You need to ensure that
Configuration Manager data includes information about the printers. What should
you do?
A. Add a WMI class to the Hardware inventory Classes list.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Add
a file name to the Software Inventory configuration.
D. Add a file name
to the Hardware inventory configuration.
E. Add a file name to Software
Metering.
F. Select Collect NOIDMIF files in Hardware Inventory.
G. Add a WMI class to the Sms_def.mof file.
H. Modify the Enable
software inventory on clients setting.
I. Modify the Enable hardware
inventory on clients setting.
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/gg712290.aspx
How to Extend Hardware Inventory in Configuration Manager
System Center
2012 Configuration Manager hardware inventory reads information about devices by
using Windows Management Instrumentation (WMI). WMI is the Microsoft
implementation of web-based Enterprise Management (WBEM), which is an industry
standard for accessing management information in an enterprise environment.
In previous versions of Configuration Manager, you could extend hardware
inventory by modifying the file sms_def.mof on the site server.
In System
Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as
you did in Configuration Manager 2007. Instead, you can enable and disable WMI
classes, and add new classes to collect by hardware inventory by using client
settings. Configuration Manager provides the following methods to extend
hardware inventory:
Enable or disable existing inventory classes – You can
enable or disable the default inventory classes used by Configuration Manager or
you can create custom client settings that allow you to collect different
hardware inventory classes from specified collections of clients.
Add a new
inventory class – You can add a new inventory class from the WMI namespace of
another device.
Import and export hardware inventory classes – You can
import and export Managed Object Format (MOF) files that contain inventory
classes from the Configuration Manager console.
Create NOIDMIF Files – Use
NOIDMIF files to collect information about client devices that cannot be
inventoried by Configuration Manager.
Create IDMIF Files – Use IDMIF files
to collect information about assets in your organization that are not associated
with a Configuration Manager client, for example, projectors, photocopiers and
network printers.
Further information:
Thanks For Trying Braindump2go Latest Microsoft 70-243 Dumps Questions!
Braindump2go Exam Dumps ADVANTAGES:
☆ 100% Pass Guaranteed Or Full Money Back!
☆ Instant Download Access After Payment!
☆ One Year
Free Updation!
☆ Well Formated:
PDF,VCE,Exam Software!
☆ Multi-Platform capabilities –
Windows, Laptop, Mac, Android, iPhone, iPod, iPad.
☆ Professional,
Quick,Patient IT Expert Team 24/7/365 Onlinen Help You!
☆
We served more than 35,000 customers all around the world in
last 5 years with 98.99% PASS RATE!
☆ Guaranteed Secure
Shopping! Your Transcations are protected by Braindump2go all the time!
☆
Pass any exams at the FIRST try!