QUESTION 21
Note: This question is part of a series of questions that use the same set of answer choices. n answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Manager environment. The network contains 10 database servers that run Microsoft SQL Server 2008. You have a configuration baseline that is used to monitor the database servers. You add new configuration items to the configuration baseline. Two days later, you discover that only eight of the database servers report any information about the new configuration items. You need to identify whether the new configuration items downloaded to the database servers. Which log file should you review?
A. Hman.log
B. Sitestat.log
C. Dcmagent.log
D. Wsyncmgr.log
E. Ccm.log
F. Contenttransfermanager.log
G. Sdmagent.log
H. Rcmctri.log
I. Ciagent.log
J. Smsexec.log
K. Locationservices.log
Answer: B
Explanation:
Sitestat.log: Records the monitoring process of all site systems. http://technet.microsoft.com/en-us/library/hh427342.aspx
QUESTION 22
Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You create a deployment to install Microsoft Office 2010. The deployment targets 5,000 client computers on the network. Two weeks after you create the deployment, you discover that Office 2010 fails to install on a client computer named Computer 1. You need to identify whether Computer1 started downloading the Application of Office 2010. Which log file should you review?
A. Locationservices.log
B. Ccm.log
C. Sdmagent.log
D. Sitestat.log
E. Rcmctrl.log
F. Dcmagent.log
G. Contenttransfermanager.log
H. Smsexec.log
I. Wsyncmgr.log
J. Ciagent.log
K. Hman.tog
Answer: G
Explanation:
How to find if download start, TS using log file: ContentTransferManager.log SDMAgent.log – desired configuration management and contains the tracking process of remediation and compliance. dcmagent.log – Provides high-level information about the evaluation of assigned configuration baselines CIAgent.log – Tracks the process of remediation and compliance Updateshandler.log – provides more informative details on installing the software updates wsyncmgr.log -Provides information about the software updates synchronization process
Smsexec.log – Records processing of all site server component threads. ContentTransferManager.log
– Schedules the Background Intelligent Transfer Service (BITS) or the Server
QUESTION 23
Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Management environment. The environment contains a Central Administration site and two primary child sites named Child1 and Child2. You create a new Application on the Central Administration site. You view the new Application on Child 1, but the new Application fails to appear on Child2. You need to identify whether the Application transferred to Child2. Which log file should you review?
A. Locabonservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: B
QUESTION 24
Your network contains an Active Directory forest. The forest contains a System Center 2012 Configuration Manager environment. The environment contains one primary site. You need to unsure that the members of a group named Group1 are allowed to deploy applications to desktop computers. The solution must minimize the number of permissions assigned to Group1. What should you do?
A. Assign the Application Administrator security role to Group1.
Create a new collection that contains all of the desktop computers.
Add Group1 to the local Administrators group on each desktop computer.
B. Add the Application Deployment Manager security role to Group1.
Create a new collection that contains all of the desktop computers.
Add Group1 to the local Administrators group on each desktop computer.
C. Assign the Application Deployment Manager security role to Group1.
Create a new collection that contains all of the desktop computers.
Scope Group1 to the new collection.
D. Assign the Application Administrator security role to Group1.
Create a new collection that contains all of the desktop computers.
Scope Group1 to the new collection.
Answer: C
QUESTION 25
Your network contains a single Active Directory domain. You plan to deploy System Center 2012 Configuration Manager. The hierarchy will have a Central Administration site and five primary sites. You need to ensure that you can target user groups for software distribution. The solution must minimize network traffic. Which Configuration Manager discovery method should you use?
A. Active Directory User Discovery on the primary sites
B. Active Directory User Discovery on the primary sites and Active Directory Group Discovery on every site
C. Active Directory User Discovery on the Central Administration site and Active Directory Group Discovery
on the primary sites
D. Active Directory User Discovery and Active Directory Group Discovery on the Central Administration site
Answer: B
Explanation:
AD User discovery for Primary Site and Group discover for Each Primary Site:
When discovery of a resource is successful, discovery puts information about the resource in a file that is referred to as a discovery data record (DDR). DDRs are in turn processed by site servers and entered into the Configuration Manager database where they are then replicated by database- replication with all sites. The replication makes discovery data available at each site in the hierarchy, regardless of where it was discovered or processed.
Caution
When you clear the option to publish a site to an Active Directory forest, all previously published information for that site, including available site system roles, is removed from the Active Directory of that forest.
When you run Active Directory System Discovery and Active Directory User Discovery, the additional Active Directory attributes for each object type are available, and as a result, Active Directory Group Discovery runs more efficiently.
Active Directory System Group Discovery works only for systems that are already discovered and assigned to the local primary site and any direct child secondary sites
Use Configuration Manager Active Directory Forest Discovery to discover IP subnets and Active Directory sites and to add them to Configuration Manager as boundaries.
Consider the scope of the discovery configuration and limit discovery to only those Active Directory locations and groups that you have to discover.
Only Network Discovery available on Secondary site. Others not available for secondary site. ?http://technet.microsoft.com/en-us/library/6a0e2b40-672f-45e1-a12d- 6d403ab39780#BKMK_DiscMethods
QUESTION 26
Your network contains a System Center 2012 Configuration Manager environment. The Configuration Manager databases are located on a remote server that runs Microsoft SQL Server. You need to ensure that you can restore the Central Administration site. What should you do?
A. From the Configuration Manager console, enable the Backup Site Server maintenance task and set a schedule.
B. From Microsoft SQL Server Management Studio, create a maintenance plan for the site databases.
C. From Task Scheduler, create a scheduled task that runs smssqlbkup.exe.
D. From Windows Server Backup, schedule a full system backup.
Answer: A
QUESTION 27
Your network contains a single Active Directory forest named contoso.com. Contoso.com contains three System Center 2012 Configuration Manager sites and one System Center Configuration Manager 2007 site. You need to ensure that you can transfer objects from Configuration Manager 2007 to Configuration Manager 2012. What should you do?
A. Assign the computer account of the Central Administration site server permission to the Configuration
Manager 2007 site. Assign the computer account of the Central Administration site server permissions
to the Microsoft SQL Server database instance.
B. Extend the Active Directory schema and assign the Central Administration site server permissions to
the System\System Management container.
C. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration
Manager 2012 primary site.
D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration
Manager 2007 primary site.
Answer: A
Explanation:
QUESTION 28
Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration site named Site1 and a primary site named Site2. You discover that none of the collections created on Site1 are displayed on Site2. You need to identify whether there is replication issue between the sites. What should you review?
A. the Colleval.log file.
B. the Despool.log file
C. the Rcmctrl.log file
D. the Sender.log file
Answer: C
Explanation:
despool.log
Records incoming site-to-site communication transfers. rcmctrl.log Records the activities of database replication between sites in the hierarchy. sender.log Records the files that transfer by file-based replication between sites.
QUESTION 29
Your network contains a System Center 2012 Configuration Manager environment. The environment contains a single primary site. The primary site has a distribution point and a management point. You need to recommend a commutation solution that meets the following requirements:
– Communication between the client computes in the research department and the management point must use MTTPS.
– Communication between all of the other client computes and the management point must be able to use HTTP.
– Minimize the number of site system.
What should you do?
A. Configure the existing management point to use MTTPS.
Configure the research department computers always to um MTTPS.
B. Create a now primary child site and configure the site to use native mode.
Assign all of the research department computers to the new site.
C. Install a new management point and configure the management point always to use MTTPS.
Configure the research department computers always to use MTTPS.
D. Install a new management point and configure Windows Firewall to block abound TCP port 80.
Configure the research department computes always to use MTTPS.
Answer: C
Explanation:
To communicate with a site system role, the client must first locate a site system support the protocol (HTTPS or HTTP) that the client can use. By default, clients use the most secure method available to them. using HTTPS before it communicates with a site system role that uses HTTP. When you deploy a site system role include management points, an Application Catalog website point, a state migration point, or distribution points, you must specify whether clients connect to the site system by using HTTP or HTTPS. If you use HTTP, you must also consider signing and encryption choices. In a single site, you can have one management point that accepts HTTPS client communication and another management point that accepts HTTP client communication. You can use one site to manage clients across different network locations that use different communication protocols and security settings.
Site properties, Client Computer Communication, default : HTTPS or HTTP
Other client computers can be configured for Internet and intranet client management. They can automatically switch between Internet-based client management and intranet client management when they detect a change of network. If these clients can find and connect to a management point that is configured for client connections on the intranet, they attempt to connect to an Internet- based management point.
http://technet.microsoft.com/en-us/library/gg712701#Planning_Intra_site_Com
QUESTION 30
Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your network contains a System Center 2012 Configuration Manager environment. Your company deploys 1,000 client computers. You discover that information about printers fails to appear in any inventory queries or reports. Information about other hardware devices appears in the inventory queries and reports. You need to ensure that Configuration Manager data includes information about the printers. What should you do?
A. Add a WMI class to the Hardware inventory Classes list.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Add a file name to the Software Inventory configuration.
D. Add a file name to the Hardware inventory configuration.
E. Add a file name to Software Metering.
F. Select Collect NOIDMIF files in Hardware Inventory.
G. Add a WMI class to the Sms_def.mof file.
H. Modify the Enable software inventory on clients setting.
I. Modify the Enable hardware inventory on clients setting.
Answer: B
If you want to pass Microsoft 70-243 exam successfully, donot missing to read latest greatexam Microsoft 70-243 practice tests
If you can master all greatexam questions you will able to pass 100% guaranteed.