SlideShare a Scribd company logo
1 of 16
Download to read offline
Microsoft
70-243
Administering and Deploying System Center
2012 Configuration Manager
Full versionis available at link below with affordable price.
 90 Days Free Updates
http://www.examsgrade.com/exam/70-243/
Edition = DEMO
Full Version Features:
 30 Days Money Back Guarantee
 Instant Download Once Purchased
 24 Hours Live Chat Support
http://www.examsgrade.com/exam/70-243/ pg. 2
Question: 1
You recently migrated from System Center Configuration Manager 2007 to System Center 2012
Configuration Manager.
Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bit
version of Windows 7.
Some client computers have the Microsoft Application Virtualization (App-V) client installed.
You have an Application named App1.
You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1.
You need to deploy the Application to all of the client computers.
The solution must minimize the amount of administrative effort.
What should you do?
A. Create a new Application that has three different deployment types and create a target collection
for each of the deployment types.
B. Create a new Application that has three different deployment types and configure global
conditions for each of the deployment types.
C. Create a new package for each version of App1.
D. Create a new Application for each version of App1.
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step2
How to Create Deployment Types in Configuration Manager
Supplemental Procedures to Create a Deployment Type
Step 6: Specify Requirements for the Deployment Type
1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the Create
Requirement dialog box, and add a new requirement.
2. From the Category drop-down list, select whether this requirement is for a device or a user, or
select Custom to use a previously created global condition. When you select Custom, you can also
click Create to create a new global condition. For more information about global conditions, see How
to Create Global Conditions in Configuration Manager.
3. From the Condition drop-down list, select the condition that you want to use to assess whether
the user or device meets the installation requirements. The contents of this list will vary depending
on the selected category.
4. From the Operator drop-down list, choose the operator that will be used to compare the selected
condition to the specified value to assess whether the user or device meets in the installation
requirement.
The available operators will vary depending on the selected condition.
5. In the Value field, specify the values that will be used with the selected condition and operator
whether the user or device meets in the installation requirement. The available values will vary
depending on the selected condition and the selected operator.
6. Click OK to save the requirement rule and exit the Create Requirement dialog box.
7. On the Requirements page of the Create Deployment Type Wizard, click Next.
http://www.examsgrade.com/exam/70-243/ pg. 3
http://www.examsgrade.com/exam/70-243/ pg. 4
Question: 2
You network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1)
environment.
You have an application named App1.
You need to ensure that users in the finance department can install App1 by using the Application
Catalog.
What should you do?
A. Create a required user deployment and target the deployment to all of the finance department
users.
B. Create a required user deployment and target the deployment to all of the client computers in the
finance department.
C. Create an available user deployment and target the deployment to all of the finance department
users.
D. Create an available user deployment and target the deployment to all of the client computers in
the finance department.
Answer: C
http://www.examsgrade.com/exam/70-243/ pg. 5
Explanation:
By selecting "Available" it will be selectable for the users in the Application Catalog.
The "Required" option would force the installation to all users in the finance department.
Further information:
http://technet.microsoft.com/en-us/library/gg682082.aspx
How to Deploy Applications in Configuration Manager
To deploy an application
...
8. On the Deployment Settings page of the Deploy Software Wizard, specify the following
information:
* Action – From the drop-down list, choose whether this deployment is intended to Install or
Uninstall the application.
* Purpose – From the drop-down list, choose one of the following options:
* Available - If the application is deployed to a user, the user sees the published application in the
Application Catalog and can request it on demand. If the application is deployed to a device, the user
will see it in the Software Center and can install it on demand.
* Required - The application is deployed automatically according to the configured schedule.
However, a user can track the application deployment status if it is not hidden, and can install the
application before the deadline by using the Software Center.
Question: 3
Your network contains a System Center 2012 Configuration Manager environment.
Two weeks ago, you deployed a Windows Installer package named App1.
You need to remediate a registry value that applies only to the client computers that have App1
installed.
The solution must minimize network traffic.
What should you do?
A. Modify the App1 Windows Installer package to contain the registry setting, and then create a new
application for App1.
B. Modify the App1 Windows Installer package to contain the registry setting, and then configure the
existing application for App1 to use the new Windows Installer package.
C. Create an application-based configuration item, configure a rule for an existential type, and then
import the registry setting from a client computer that has App1 installed.
D. Create an application-based configuration item, configure the detection method to use the
Windows Installer product code of App1, and then import the registry setting from a client computer
that has App1 installed.
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/gg682139.aspx
Introduction to Compliance Settings in Configuration Manager
Compliance settings in System Center 2012 Configuration Manager provides a unified interface and
user experience that lets you manage the configuration and compliance of servers, laptops, desktop
computers, and mobile devices in your organization. Compliance settings contains tools to help you
assess the compliance of users and client devices for many configurations, such as whether the
correct Windows operating system versions are installed and configured appropriately, whether all
http://www.examsgrade.com/exam/70-243/ pg. 6
required applications are installed and configured correctly, whether optional applications are
configured appropriately, and whether prohibited applications are installed. Additionally, you can
check for compliance with software updates, security settings, and mobile devices. Configuration
item settings of the type Windows Management Instrumentation (WMI), registry, script, and all
mobile device settings in Configuration Manager let you automatically remediate noncompliant
settings when they are found.
Compliance is evaluated by defining a configuration baseline that contains the configuration items
that you want to evaluate and settings and rules that describe the level of compliance you must
have. You can import this configuration data from the web in Microsoft System Center Configuration
Manager Configuration Packs as best practices that are defined by Microsoft and other vendors, in
Configuration Manager, and that you then import into Configuration Manager. Or, an administrative
user can create new configuration items and configuration baselines.
http://technet.microsoft.com/en-us/library/gg712331.aspx
How to Create Windows Configuration Items for Compliance Settings in Configuration Manager
Create configuration items in System Center 2012 Configuration Manager to define configurations
that you want to manage and assess for compliance on devices.
There are different types of configuration items:
Application configuration item
Used to determine compliance for an application. This can include whether the application is
installed and details about its configuration.
Operating system configuration item
Used to determine compliance for settings that relate to the operating system and its configuration.
Software updates configuration item Automatically created when you download software updates
with Configuration Manager. You do not create or see these configuration items in the Compliance
Settings node, but you can select them when you define configuration baselines.
General configuration item
Used to determine compliance for mobile devices.
Steps to Create a New Configuration Item for Client Computers
Use the following required steps to create a configuration item by using the Create Configuration
Item Wizard:
Step 1: Start the Create Configuration Item Wizard.
Step 2: Provide general information about the configuration item.
Step 3: Provide detection method information for the configuration item.
Step 4: Configure settings for the configuration item.
Step 5: Configure compliance rules for the configuration item.
Step 6: Specify supported platforms for the configuration item.
Step 7: Complete the wizard.
http://technet.microsoft.com/en-us/library/gg712331.aspx#BKMK_Step3
Step 3: Provide Detection Method Information for the Configuration Item
Use this procedure to provide detection method information for the configuration item.
Note: Applies only if you selected
This configuration item contains application settings on the General page of the wizard.
A detection method in Configuration Manager contains rules that are used to detect whether an
application is installed on a computer. This detection occurs before the configuration item is
assessed for compliance. To detect whether an application is installed, you can detect the presence
of a Windows Installer file for the application, use a custom script, or select Always assume
application is installed to assess the configuration item for compliance regardless of whether the
application is installed.
Question: 4
Your network contains a System Center 2012 Configuration Manager environment.
You need to create a collection that contains all of the virtual machines.
http://www.examsgrade.com/exam/70-243/ pg. 7
Which query should you use?
A. select * from SMS_R_System
where SMS_R_System.ResourceID not in
(select ResourceID from SMS_R_System
where SMS_R_System.IsVirtualMachine != 1)
B. select * from SMS_R_System
where SMS_R_System.IsVirtualMachine != 1
C. select * from SMS_R_System
where SMS_R_System.IsVirtualMachine = 1
D. select * from SMS_R_System
where SMS_R_System.ResourceID not in
(select ResourceID from SMS_R_System
where SMS_R_System.IsVirtualMachine = 1)
Answer: C
Question: 5
Your network contains a System Center 2012 Configuration Manager environment.
You create a report that lists compliance information.
You schedule the report to run every day at 20:00.
You need to ensure that on Friday, you can review the results of the report created on the previous
Monday.
What should you configure the report to do?
A. Use caching.
B. Use a shared schedule.
C. Render on Friday.
D. Use snapshots.
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/ms156325.aspx
Creating, Modifying, and Deleting Snapshots in Report History
Report history is a collection of report snapshots. You can maintain report history by adding and
deleting snapshots, or by modifying properties that affect report history storage. You can create
report history manually or on a schedule.
Further information:
http://technet.microsoft.com/en-us/library/ms157447.aspx
Cache a Report (Report Manager)
One way to improve performance is to configure caching properties for a report. When a report is
cached, a copy of the rendered report is saved for a short period of time. The first user who requests
the report must wait for all processing to complete before viewing the report. Subsequent users who
http://www.examsgrade.com/exam/70-243/ pg. 8
request the report within the caching period can view it right away because processing has already
occurred.
Question: 6
Your network contains an Active Directory forest.
The forest contains a System Center 2012 Configuration Manager environment.
The environment contains one primary site.
You need to ensure that the members of a group named Group1 are allowed to deploy applications
to desktop computers.
The solution must minimize the number of permissions assigned to Group1.
What should you do?
A. Assign the Application Administrator security role to Group1. Create a new collection that
contains all of the desktop computers. Add Group1 to the local Administrators group on each
desktop computer.
B. Add the Applicaton Deployment Manager security role to Group1. Create a new collection that
contains all of the desktop computers. Add Group1 to the local Administrators group on each
desktop computer.
C. Assign the Application Deployment Manager security role to Group1. Create a new collection that
contains all of the desktop computers. Scope Group1 to the new collection.
D. Assign the Application Administrator security role to Group1. Create a new collection that
contains all of the desktop computers. Scope Group1 to the new collection.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh524341.aspx
Glossary for Microsoft System Center 2012 Configuration Manager
Application Administrator
A security role that grants permissions to administrative users so that they can perform both the
Application Deployment Manager role and the Application Author role.
Application Deployment Manager
A security role that grants permissions to administrative users so that they can deploy and monitor
applications.
http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-
2012-configuration-manager.aspx
Role-Based Administration in System Center 2012 Configuration Manager
In Configuration Manager 2012, Security Roles are used to collectively group objects and
permissions (operations) for assignment to an Administrator. Instead of an individual permission set
on a single instance of object, the Security Role provides a single Role assignment to an
administrator; reducing the overall complexity with permission management. An “object” in the
Security Role is something that you want to manage access to and “permission” is the operational
functions, such as Read, Modify and Delete.
Question: 7
Your network contains a single Active Directory domain.
The domain contains a System Center Configuration Manager 2007 site and a System Center 2012
Configuration Manager site.
http://www.examsgrade.com/exam/70-243/ pg. 9
You need to ensure that you can migrate objects from Configuration Manager 2007 to Configuration
Manager 2012.
What should you do?
A. Assign the computer account of the Central Administration site server permission to the
Configuration Manager 2007 site.
Assign the computer account of the Central Administration site server permission to the Microsoft
SQL Server database instance.
B. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration
Manager 2012 primary site.
C. Extend the Active Directory schema and assign the Central Administration site server permissions
to the SystemSystem Management container.
D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration
Manager 2007 primary site.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/gg712991.aspx
Determine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration
Manager
In Microsoft System Center 2012 Configuration Manager, the built-in migration functionality
replaces in-place upgrades of existing Configuration Manager infrastructure by providing a process
that transfers data from active Configuration Manager 2007 sites. The functionality provided by
migration helps you maintain investments that you have made in configurations and deployments
while you can take full advantage of core changes in the product introduced in System Center 2012
Configuration Manager. These changes include a simplified Configuration Manager hierarchy that
uses fewer sites and resources, and the improved processing by use of native 64-bit code that runs
on 64-bit hardware.
Migration can transfer most data from Configuration Manager 2007.
http://technet.microsoft.com/en-us/library/gg681981.aspx
Planning for Migration to System Center 2012 Configuration Manager
You must first install a System Center 2012 Configuration Manager hierarchy to be the destination
hierarchy before you can migrate data from a supported source hierarchy.
After you install the destination hierarchy, configure the management features and functions that
you want to use in your destination hierarchy before you start to migrate data.
http://technet.microsoft.com/en-us/library/gg712313.aspx
Prerequisites for Migration in System Center 2012 Configuration Manager
To migrate from a supported source hierarchy, you must have access to each applicable
Configuration Manager source site, and permissions within the System Center 2012 Configuration
Manager destination site
to configure and run migration operations.
Required Configurations for Migration
..
Data Gathering
To enable the destination site to gather data, you must configure the following two source site
access accounts for use with each source site:
* Source Site Account: This account is used to access the SMS Provider of the source site.
* For a Configuration Manager 2007 SP2 source site, this account requires Read permission to all
source site objects.
http://www.examsgrade.com/exam/70-243/ pg. 10
* For a System Center 2012 Configuration Manager source site, this account requires Read
permission to all source site objects. You grant this permission to the account by using role-based
administration.
* Source Site Database Account: This account is used to access the SQL Server database of the
source site and requires Read and Execute permissions to the source site database.
You can configure these accounts when you configure a new source hierarchy, data gathering for an
additional source site, or when you reconfigure the credentials for a source site. These accounts can
use a domain user account, or you can specify the computer account of the top-level site of the
destination hierarchy.
Security Note: If you use the Configuration Manager computer account for either access account,
ensure that this account is a member of the security group Distributed COM Users in the domain
where the source site resides.
When gathering data, the following network protocols and ports are used:
NetBIOS/SMB – 445 (TCP)
RPC (WMI) - 135 (TCP)
SQL Server - 1433 (TCP)
Question: 8
Your network contains a System Center 2012 Configuration Management environment.
The network contains 10 database servers that run Microsoft SQL Server 2008.
You have a configuration baseline that is used to monitor database servers.
You confirm that all of the database servers downloaded the configuration baseline.
You discover that a database server named Server1 fails to report any data for the configuration
baseline.
You need to identify whether Server 1 evaluates the configuration items that are part of the
configuration baseline.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: E
Explanation:
http://technet.microsoft.com/en-us/library/hh427342.aspx
Technical Reference for Log Files in Configuration Manager
DCMAgent.log
Client log file
Records high-level information about the evaluation, conflict reporting, and remediation of
configuration items and applications.
Further information:
http://www.examsgrade.com/exam/70-243/ pg. 11
Locationservices.log
Client log file Records the client activity for locating management points, software update points,
and distribution points.
Smsexec.log
Site server or site system server log file
Records the processing of all site server component threads.
Ccm.log
Site server log file
Records client push installation activities.
Sdmagent.log
Client log file
Records details about tracking of remediation and compliance. However, the software updates log
file,
Updateshandler.log, provides more informative details about installing the software updates
required for compliance.
Rcmctrl.log
Site server log file
Records the activities of database replication between sites in the hierarchy.
wsyncmgr.log
Site server log file
Records details about the software updates synchronization process.
Ciagent.log
Client log file
Records details about the process of remediation and compliance for compliance settings, software
updates, and application management.
hman.log
Site server log file
Records information about site configuration changes, and the publishing of site information in
Active
Directory Domain Services.
ContentTransferManager.log
Client log file
Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to
download or to access packages.
Sitestat.log Site server log file Records the availability and disk space monitoring process of all site
systems.
Question: 9
You enable Client Push.
You run Active Directory System Discovery.
You discover that some of the discovered computers do not have the System Center 2012
Configuration Manager client installed.
You need to identify why Client Push fails of the client computers.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
http://www.examsgrade.com/exam/70-243/ pg. 12
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh427342.aspx
Technical Reference for Log Files in Configuration Manager
Ccm.log
Site server log file
Records client push installation activities.
Further information:
Locationservices.log
Client log file
Records the client activity for locating management points, software update points, and distribution
points.
Smsexec.log
Site server or site system server log file Records the processing of all site server component threads.
Sdmagent.log
Client log file Records details about tracking of remediation and compliance. However, the software
updates log file, Updateshandler.log, provides more informative details about installing the software
updates required for compliance.
DCMAgent.log
Client log file
Records high-level information about the evaluation, conflict reporting, and remediation of
configuration items and applications.
Rcmctrl.log
Site server log file
Records the activities of database replication between sites in the hierarchy.
wsyncmgr.log
Site server log file Records details about the software updates synchronization process.
Ciagent.log
Client log file Records details about the process of remediation and compliance for compliance
settings, software updates, and application management.
hman.log
Site server log file
Records information about site configuration changes, and the publishing of site information in
Active Directory Domain Services.
ContentTransferManager.log
Client log file
Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to
download or to access packages.
Sitestat.log
Site server log file Records the availability and disk space monitoring process of all site systems.
Question: 10
Your network contains a System Center 2012 Configuration Manager environment.
You add a software update point to the environment.
http://www.examsgrade.com/exam/70-243/ pg. 13
You receive a message indicating that SMS WSUS Synchronization failed.
You need to retrieve additional information about the message.
Which log file should you review?
A. Locationservices.log
B. Smsexec.log
C. Ccm.log
D. Sdmagent.log
E. Dcmagent.log
F. Rcmctrl.log
G. Wsyncmgr.log
H. Ciagent.log
I. Hman.log
J. Contenttransfermanager.log
K. Sitestat.log
Answer: G
Explanation:
http://technet.microsoft.com/en-us/library/hh427342.aspx
Technical Reference for Log Files in Configuration Manager
wsyncmgr.log
Site server log file
Records details about the software updates synchronization process.
Further information:
Locationservices.log
Client log file
Records the client activity for locating management points, software update points, and distribution
points.
Smsexec.log
Site server or site system server log fiel
Records the processing of all site server component threads.
Ccm.log
Site server log file
Records client push installation activities.
Sdmagent.log
Client log file
Records details about tracking of remediation and compliance. However, the software updates log
file,
Updateshandler.log, provides more informative details about installing the software updates
required for compliance.
DCMAgent.log
Client log file
Records high-level information about the evaluation, conflict reporting, and remediation of
configuration items and applications.
Rcmctrl.log Site server log file Records the activities of database replication between sites in the
hierarchy.
Ciagent.log
Client log file
Records details about the process of remediation and compliance for compliance settings, software
updates, and application management.
hman.log
http://www.examsgrade.com/exam/70-243/ pg. 14
Site server log file Records information about site configuration changes, and the publishing of site
information in Active Directory Domain Services.
ContentTransferManager.log
Client log file Schedules the Background Intelligent Transfer Service (BITS) or the Server Message
Block (SMB) to download or to access packages.
Sitestat.log Site server log file Records the availability and disk space monitoring process of all site
systems.
Question: 11
Your network contains a System Center 2012 Configuration Manager environment.
The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. the Inventoryagent.log file
B. the Colleval.log file
C. the Microsoft SQL Server replication diagnostic files
D. the Despool.log file (or Replmgr.log IN EXAM!)
Answer: D
Explanation:
Despool.log
Site server log file
Records incoming site-to-site communication transfers.
Personal note:
Usually, you look at the Rcmctrl.log file. But since that isn't one of the possible answers, you are left
with the
Despool.log file.
Further information:
http://technet.microsoft.com/en-us/library/hh427342.aspx
Technical Reference for Log Files in Configuration Manager
InventoryAgent.log
Client log file
Records activities of hardware inventory, software inventory, and heartbeat discovery actions on the
client.
Colleval.log
Primary site and central administration site log file
Records details about when collections are created, changed, and deleted by the Collection
Evaluator.
http://msdn.microsoft.com/en-us/library/ms151756%28v=sql.105%29.aspx
SQL Server 2008 R2 - Troubleshooting (Replication)
Question: 12
Your company uses System Center 2012 Configuration Manager to deploy applications.
The company purchases a new application named App1. App1 can be installed only on client
computers that run Windows 7.
http://www.examsgrade.com/exam/70-243/ pg. 15
You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of
memory and 300 Gb of free disk space.
What should you create?
A. a Query object
B. custom client user settings
C. a configuration baseline
D. a query-based collection
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/gg682177.aspx
Introduction to Collections in Configuration Manager
Collections in System Center 2012 Configuration Manager represent logical groupings of resources,
such as users and devices. You can use collections to help you perform many tasks, such as managing
applications, deploying compliance settings, or installing software updates. You can also use
collections to manage groups of client settings.
..
Query Rule
Query rules dynamically update the membership of a collection based on a query that Configuration
Manager runs on a schedule. For example, you can create a collection of users who are a member of
the Human Resources organizational unit in Active Directory Domain Services. Unlike direct rule
collections, this collection membership automatically updates when you add or remove new users to
the Human Resources organizational unit.
Further information:
http://technet.microsoft.com/en-us/library/gg682073.aspx
Prerequisites for Compliance Settings in Configuration Manager
..
To run queries related to compliance settings: Read permission for the Query object.
http://technet.microsoft.com/en-us/library/gg712688.aspx
Planning for Client Settings in Configuration Manager
Use client settings in System Center 2012 Configuration Manager to configure user and device
settings for the hierarchy. Client settings include configuration options such as the hardware
inventory and schedule, and the polling schedule for client policy.
All Configuration Manager clients in the hierarchy use the Default Client Settings that are
automatically created when you install Configuration Manager. However, you can modify the default
client settings and you can create custom client settings to override the default client settings for
specific users or devices.
http://technet.microsoft.com/en-us/library/gg682139.aspx
Introduction to Compliance Settings in Configuration Manager
..
Compliance is evaluated by defining a configuration baseline that contains the configuration items
that you want to evaluate and settings and rules that describe the level of compliance you must
have.
http://www.examsgrade.com/exam/70-243/ pg. 16
For More Information:
http://www.examsgrade.com/exam/70-243/

More Related Content

Recently uploaded

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 

Featured

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

70-243 Exam Real Practice Test For Solution Experts

  • 1. Microsoft 70-243 Administering and Deploying System Center 2012 Configuration Manager Full versionis available at link below with affordable price.  90 Days Free Updates http://www.examsgrade.com/exam/70-243/ Edition = DEMO Full Version Features:  30 Days Money Back Guarantee  Instant Download Once Purchased  24 Hours Live Chat Support
  • 2. http://www.examsgrade.com/exam/70-243/ pg. 2 Question: 1 You recently migrated from System Center Configuration Manager 2007 to System Center 2012 Configuration Manager. Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bit version of Windows 7. Some client computers have the Microsoft Application Virtualization (App-V) client installed. You have an Application named App1. You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1. You need to deploy the Application to all of the client computers. The solution must minimize the amount of administrative effort. What should you do? A. Create a new Application that has three different deployment types and create a target collection for each of the deployment types. B. Create a new Application that has three different deployment types and configure global conditions for each of the deployment types. C. Create a new package for each version of App1. D. Create a new Application for each version of App1. Answer: B Explanation: http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step2 How to Create Deployment Types in Configuration Manager Supplemental Procedures to Create a Deployment Type Step 6: Specify Requirements for the Deployment Type 1. On the Requirements page of the Create Deployment Type Wizard, click Add to open the Create Requirement dialog box, and add a new requirement. 2. From the Category drop-down list, select whether this requirement is for a device or a user, or select Custom to use a previously created global condition. When you select Custom, you can also click Create to create a new global condition. For more information about global conditions, see How to Create Global Conditions in Configuration Manager. 3. From the Condition drop-down list, select the condition that you want to use to assess whether the user or device meets the installation requirements. The contents of this list will vary depending on the selected category. 4. From the Operator drop-down list, choose the operator that will be used to compare the selected condition to the specified value to assess whether the user or device meets in the installation requirement. The available operators will vary depending on the selected condition. 5. In the Value field, specify the values that will be used with the selected condition and operator whether the user or device meets in the installation requirement. The available values will vary depending on the selected condition and the selected operator. 6. Click OK to save the requirement rule and exit the Create Requirement dialog box. 7. On the Requirements page of the Create Deployment Type Wizard, click Next.
  • 4. http://www.examsgrade.com/exam/70-243/ pg. 4 Question: 2 You network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. You have an application named App1. You need to ensure that users in the finance department can install App1 by using the Application Catalog. What should you do? A. Create a required user deployment and target the deployment to all of the finance department users. B. Create a required user deployment and target the deployment to all of the client computers in the finance department. C. Create an available user deployment and target the deployment to all of the finance department users. D. Create an available user deployment and target the deployment to all of the client computers in the finance department. Answer: C
  • 5. http://www.examsgrade.com/exam/70-243/ pg. 5 Explanation: By selecting "Available" it will be selectable for the users in the Application Catalog. The "Required" option would force the installation to all users in the finance department. Further information: http://technet.microsoft.com/en-us/library/gg682082.aspx How to Deploy Applications in Configuration Manager To deploy an application ... 8. On the Deployment Settings page of the Deploy Software Wizard, specify the following information: * Action – From the drop-down list, choose whether this deployment is intended to Install or Uninstall the application. * Purpose – From the drop-down list, choose one of the following options: * Available - If the application is deployed to a user, the user sees the published application in the Application Catalog and can request it on demand. If the application is deployed to a device, the user will see it in the Software Center and can install it on demand. * Required - The application is deployed automatically according to the configured schedule. However, a user can track the application deployment status if it is not hidden, and can install the application before the deadline by using the Software Center. Question: 3 Your network contains a System Center 2012 Configuration Manager environment. Two weeks ago, you deployed a Windows Installer package named App1. You need to remediate a registry value that applies only to the client computers that have App1 installed. The solution must minimize network traffic. What should you do? A. Modify the App1 Windows Installer package to contain the registry setting, and then create a new application for App1. B. Modify the App1 Windows Installer package to contain the registry setting, and then configure the existing application for App1 to use the new Windows Installer package. C. Create an application-based configuration item, configure a rule for an existential type, and then import the registry setting from a client computer that has App1 installed. D. Create an application-based configuration item, configure the detection method to use the Windows Installer product code of App1, and then import the registry setting from a client computer that has App1 installed. Answer: D Explanation: http://technet.microsoft.com/en-us/library/gg682139.aspx Introduction to Compliance Settings in Configuration Manager Compliance settings in System Center 2012 Configuration Manager provides a unified interface and user experience that lets you manage the configuration and compliance of servers, laptops, desktop computers, and mobile devices in your organization. Compliance settings contains tools to help you assess the compliance of users and client devices for many configurations, such as whether the correct Windows operating system versions are installed and configured appropriately, whether all
  • 6. http://www.examsgrade.com/exam/70-243/ pg. 6 required applications are installed and configured correctly, whether optional applications are configured appropriately, and whether prohibited applications are installed. Additionally, you can check for compliance with software updates, security settings, and mobile devices. Configuration item settings of the type Windows Management Instrumentation (WMI), registry, script, and all mobile device settings in Configuration Manager let you automatically remediate noncompliant settings when they are found. Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe the level of compliance you must have. You can import this configuration data from the web in Microsoft System Center Configuration Manager Configuration Packs as best practices that are defined by Microsoft and other vendors, in Configuration Manager, and that you then import into Configuration Manager. Or, an administrative user can create new configuration items and configuration baselines. http://technet.microsoft.com/en-us/library/gg712331.aspx How to Create Windows Configuration Items for Compliance Settings in Configuration Manager Create configuration items in System Center 2012 Configuration Manager to define configurations that you want to manage and assess for compliance on devices. There are different types of configuration items: Application configuration item Used to determine compliance for an application. This can include whether the application is installed and details about its configuration. Operating system configuration item Used to determine compliance for settings that relate to the operating system and its configuration. Software updates configuration item Automatically created when you download software updates with Configuration Manager. You do not create or see these configuration items in the Compliance Settings node, but you can select them when you define configuration baselines. General configuration item Used to determine compliance for mobile devices. Steps to Create a New Configuration Item for Client Computers Use the following required steps to create a configuration item by using the Create Configuration Item Wizard: Step 1: Start the Create Configuration Item Wizard. Step 2: Provide general information about the configuration item. Step 3: Provide detection method information for the configuration item. Step 4: Configure settings for the configuration item. Step 5: Configure compliance rules for the configuration item. Step 6: Specify supported platforms for the configuration item. Step 7: Complete the wizard. http://technet.microsoft.com/en-us/library/gg712331.aspx#BKMK_Step3 Step 3: Provide Detection Method Information for the Configuration Item Use this procedure to provide detection method information for the configuration item. Note: Applies only if you selected This configuration item contains application settings on the General page of the wizard. A detection method in Configuration Manager contains rules that are used to detect whether an application is installed on a computer. This detection occurs before the configuration item is assessed for compliance. To detect whether an application is installed, you can detect the presence of a Windows Installer file for the application, use a custom script, or select Always assume application is installed to assess the configuration item for compliance regardless of whether the application is installed. Question: 4 Your network contains a System Center 2012 Configuration Manager environment. You need to create a collection that contains all of the virtual machines.
  • 7. http://www.examsgrade.com/exam/70-243/ pg. 7 Which query should you use? A. select * from SMS_R_System where SMS_R_System.ResourceID not in (select ResourceID from SMS_R_System where SMS_R_System.IsVirtualMachine != 1) B. select * from SMS_R_System where SMS_R_System.IsVirtualMachine != 1 C. select * from SMS_R_System where SMS_R_System.IsVirtualMachine = 1 D. select * from SMS_R_System where SMS_R_System.ResourceID not in (select ResourceID from SMS_R_System where SMS_R_System.IsVirtualMachine = 1) Answer: C Question: 5 Your network contains a System Center 2012 Configuration Manager environment. You create a report that lists compliance information. You schedule the report to run every day at 20:00. You need to ensure that on Friday, you can review the results of the report created on the previous Monday. What should you configure the report to do? A. Use caching. B. Use a shared schedule. C. Render on Friday. D. Use snapshots. Answer: D Explanation: http://technet.microsoft.com/en-us/library/ms156325.aspx Creating, Modifying, and Deleting Snapshots in Report History Report history is a collection of report snapshots. You can maintain report history by adding and deleting snapshots, or by modifying properties that affect report history storage. You can create report history manually or on a schedule. Further information: http://technet.microsoft.com/en-us/library/ms157447.aspx Cache a Report (Report Manager) One way to improve performance is to configure caching properties for a report. When a report is cached, a copy of the rendered report is saved for a short period of time. The first user who requests the report must wait for all processing to complete before viewing the report. Subsequent users who
  • 8. http://www.examsgrade.com/exam/70-243/ pg. 8 request the report within the caching period can view it right away because processing has already occurred. Question: 6 Your network contains an Active Directory forest. The forest contains a System Center 2012 Configuration Manager environment. The environment contains one primary site. You need to ensure that the members of a group named Group1 are allowed to deploy applications to desktop computers. The solution must minimize the number of permissions assigned to Group1. What should you do? A. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer. B. Add the Applicaton Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer. C. Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection. D. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection. Answer: C Explanation: http://technet.microsoft.com/en-us/library/hh524341.aspx Glossary for Microsoft System Center 2012 Configuration Manager Application Administrator A security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role. Application Deployment Manager A security role that grants permissions to administrative users so that they can deploy and monitor applications. http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center- 2012-configuration-manager.aspx Role-Based Administration in System Center 2012 Configuration Manager In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions (operations) for assignment to an Administrator. Instead of an individual permission set on a single instance of object, the Security Role provides a single Role assignment to an administrator; reducing the overall complexity with permission management. An “object” in the Security Role is something that you want to manage access to and “permission” is the operational functions, such as Read, Modify and Delete. Question: 7 Your network contains a single Active Directory domain. The domain contains a System Center Configuration Manager 2007 site and a System Center 2012 Configuration Manager site.
  • 9. http://www.examsgrade.com/exam/70-243/ pg. 9 You need to ensure that you can migrate objects from Configuration Manager 2007 to Configuration Manager 2012. What should you do? A. Assign the computer account of the Central Administration site server permission to the Configuration Manager 2007 site. Assign the computer account of the Central Administration site server permission to the Microsoft SQL Server database instance. B. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration Manager 2012 primary site. C. Extend the Active Directory schema and assign the Central Administration site server permissions to the SystemSystem Management container. D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration Manager 2007 primary site. Answer: A Explanation: http://technet.microsoft.com/en-us/library/gg712991.aspx Determine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration Manager In Microsoft System Center 2012 Configuration Manager, the built-in migration functionality replaces in-place upgrades of existing Configuration Manager infrastructure by providing a process that transfers data from active Configuration Manager 2007 sites. The functionality provided by migration helps you maintain investments that you have made in configurations and deployments while you can take full advantage of core changes in the product introduced in System Center 2012 Configuration Manager. These changes include a simplified Configuration Manager hierarchy that uses fewer sites and resources, and the improved processing by use of native 64-bit code that runs on 64-bit hardware. Migration can transfer most data from Configuration Manager 2007. http://technet.microsoft.com/en-us/library/gg681981.aspx Planning for Migration to System Center 2012 Configuration Manager You must first install a System Center 2012 Configuration Manager hierarchy to be the destination hierarchy before you can migrate data from a supported source hierarchy. After you install the destination hierarchy, configure the management features and functions that you want to use in your destination hierarchy before you start to migrate data. http://technet.microsoft.com/en-us/library/gg712313.aspx Prerequisites for Migration in System Center 2012 Configuration Manager To migrate from a supported source hierarchy, you must have access to each applicable Configuration Manager source site, and permissions within the System Center 2012 Configuration Manager destination site to configure and run migration operations. Required Configurations for Migration .. Data Gathering To enable the destination site to gather data, you must configure the following two source site access accounts for use with each source site: * Source Site Account: This account is used to access the SMS Provider of the source site. * For a Configuration Manager 2007 SP2 source site, this account requires Read permission to all source site objects.
  • 10. http://www.examsgrade.com/exam/70-243/ pg. 10 * For a System Center 2012 Configuration Manager source site, this account requires Read permission to all source site objects. You grant this permission to the account by using role-based administration. * Source Site Database Account: This account is used to access the SQL Server database of the source site and requires Read and Execute permissions to the source site database. You can configure these accounts when you configure a new source hierarchy, data gathering for an additional source site, or when you reconfigure the credentials for a source site. These accounts can use a domain user account, or you can specify the computer account of the top-level site of the destination hierarchy. Security Note: If you use the Configuration Manager computer account for either access account, ensure that this account is a member of the security group Distributed COM Users in the domain where the source site resides. When gathering data, the following network protocols and ports are used: NetBIOS/SMB – 445 (TCP) RPC (WMI) - 135 (TCP) SQL Server - 1433 (TCP) Question: 8 Your network contains a System Center 2012 Configuration Management environment. The network contains 10 database servers that run Microsoft SQL Server 2008. You have a configuration baseline that is used to monitor database servers. You confirm that all of the database servers downloaded the configuration baseline. You discover that a database server named Server1 fails to report any data for the configuration baseline. You need to identify whether Server 1 evaluates the configuration items that are part of the configuration baseline. Which log file should you review? A. Locationservices.log B. Smsexec.log C. Ccm.log D. Sdmagent.log E. Dcmagent.log F. Rcmctrl.log G. Wsyncmgr.log H. Ciagent.log I. Hman.log J. Contenttransfermanager.log K. Sitestat.log Answer: E Explanation: http://technet.microsoft.com/en-us/library/hh427342.aspx Technical Reference for Log Files in Configuration Manager DCMAgent.log Client log file Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and applications. Further information:
  • 11. http://www.examsgrade.com/exam/70-243/ pg. 11 Locationservices.log Client log file Records the client activity for locating management points, software update points, and distribution points. Smsexec.log Site server or site system server log file Records the processing of all site server component threads. Ccm.log Site server log file Records client push installation activities. Sdmagent.log Client log file Records details about tracking of remediation and compliance. However, the software updates log file, Updateshandler.log, provides more informative details about installing the software updates required for compliance. Rcmctrl.log Site server log file Records the activities of database replication between sites in the hierarchy. wsyncmgr.log Site server log file Records details about the software updates synchronization process. Ciagent.log Client log file Records details about the process of remediation and compliance for compliance settings, software updates, and application management. hman.log Site server log file Records information about site configuration changes, and the publishing of site information in Active Directory Domain Services. ContentTransferManager.log Client log file Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to access packages. Sitestat.log Site server log file Records the availability and disk space monitoring process of all site systems. Question: 9 You enable Client Push. You run Active Directory System Discovery. You discover that some of the discovered computers do not have the System Center 2012 Configuration Manager client installed. You need to identify why Client Push fails of the client computers. Which log file should you review? A. Locationservices.log B. Smsexec.log C. Ccm.log D. Sdmagent.log E. Dcmagent.log F. Rcmctrl.log G. Wsyncmgr.log
  • 12. http://www.examsgrade.com/exam/70-243/ pg. 12 H. Ciagent.log I. Hman.log J. Contenttransfermanager.log K. Sitestat.log Answer: C Explanation: http://technet.microsoft.com/en-us/library/hh427342.aspx Technical Reference for Log Files in Configuration Manager Ccm.log Site server log file Records client push installation activities. Further information: Locationservices.log Client log file Records the client activity for locating management points, software update points, and distribution points. Smsexec.log Site server or site system server log file Records the processing of all site server component threads. Sdmagent.log Client log file Records details about tracking of remediation and compliance. However, the software updates log file, Updateshandler.log, provides more informative details about installing the software updates required for compliance. DCMAgent.log Client log file Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and applications. Rcmctrl.log Site server log file Records the activities of database replication between sites in the hierarchy. wsyncmgr.log Site server log file Records details about the software updates synchronization process. Ciagent.log Client log file Records details about the process of remediation and compliance for compliance settings, software updates, and application management. hman.log Site server log file Records information about site configuration changes, and the publishing of site information in Active Directory Domain Services. ContentTransferManager.log Client log file Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to access packages. Sitestat.log Site server log file Records the availability and disk space monitoring process of all site systems. Question: 10 Your network contains a System Center 2012 Configuration Manager environment. You add a software update point to the environment.
  • 13. http://www.examsgrade.com/exam/70-243/ pg. 13 You receive a message indicating that SMS WSUS Synchronization failed. You need to retrieve additional information about the message. Which log file should you review? A. Locationservices.log B. Smsexec.log C. Ccm.log D. Sdmagent.log E. Dcmagent.log F. Rcmctrl.log G. Wsyncmgr.log H. Ciagent.log I. Hman.log J. Contenttransfermanager.log K. Sitestat.log Answer: G Explanation: http://technet.microsoft.com/en-us/library/hh427342.aspx Technical Reference for Log Files in Configuration Manager wsyncmgr.log Site server log file Records details about the software updates synchronization process. Further information: Locationservices.log Client log file Records the client activity for locating management points, software update points, and distribution points. Smsexec.log Site server or site system server log fiel Records the processing of all site server component threads. Ccm.log Site server log file Records client push installation activities. Sdmagent.log Client log file Records details about tracking of remediation and compliance. However, the software updates log file, Updateshandler.log, provides more informative details about installing the software updates required for compliance. DCMAgent.log Client log file Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and applications. Rcmctrl.log Site server log file Records the activities of database replication between sites in the hierarchy. Ciagent.log Client log file Records details about the process of remediation and compliance for compliance settings, software updates, and application management. hman.log
  • 14. http://www.examsgrade.com/exam/70-243/ pg. 14 Site server log file Records information about site configuration changes, and the publishing of site information in Active Directory Domain Services. ContentTransferManager.log Client log file Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to access packages. Sitestat.log Site server log file Records the availability and disk space monitoring process of all site systems. Question: 11 Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2. You discover that none of the packages created on Site1 are displayed in Site2. You need to identify whether there is a replication issue between the sites. What should you review? A. the Inventoryagent.log file B. the Colleval.log file C. the Microsoft SQL Server replication diagnostic files D. the Despool.log file (or Replmgr.log IN EXAM!) Answer: D Explanation: Despool.log Site server log file Records incoming site-to-site communication transfers. Personal note: Usually, you look at the Rcmctrl.log file. But since that isn't one of the possible answers, you are left with the Despool.log file. Further information: http://technet.microsoft.com/en-us/library/hh427342.aspx Technical Reference for Log Files in Configuration Manager InventoryAgent.log Client log file Records activities of hardware inventory, software inventory, and heartbeat discovery actions on the client. Colleval.log Primary site and central administration site log file Records details about when collections are created, changed, and deleted by the Collection Evaluator. http://msdn.microsoft.com/en-us/library/ms151756%28v=sql.105%29.aspx SQL Server 2008 R2 - Troubleshooting (Replication) Question: 12 Your company uses System Center 2012 Configuration Manager to deploy applications. The company purchases a new application named App1. App1 can be installed only on client computers that run Windows 7.
  • 15. http://www.examsgrade.com/exam/70-243/ pg. 15 You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of memory and 300 Gb of free disk space. What should you create? A. a Query object B. custom client user settings C. a configuration baseline D. a query-based collection Answer: D Explanation: http://technet.microsoft.com/en-us/library/gg682177.aspx Introduction to Collections in Configuration Manager Collections in System Center 2012 Configuration Manager represent logical groupings of resources, such as users and devices. You can use collections to help you perform many tasks, such as managing applications, deploying compliance settings, or installing software updates. You can also use collections to manage groups of client settings. .. Query Rule Query rules dynamically update the membership of a collection based on a query that Configuration Manager runs on a schedule. For example, you can create a collection of users who are a member of the Human Resources organizational unit in Active Directory Domain Services. Unlike direct rule collections, this collection membership automatically updates when you add or remove new users to the Human Resources organizational unit. Further information: http://technet.microsoft.com/en-us/library/gg682073.aspx Prerequisites for Compliance Settings in Configuration Manager .. To run queries related to compliance settings: Read permission for the Query object. http://technet.microsoft.com/en-us/library/gg712688.aspx Planning for Client Settings in Configuration Manager Use client settings in System Center 2012 Configuration Manager to configure user and device settings for the hierarchy. Client settings include configuration options such as the hardware inventory and schedule, and the polling schedule for client policy. All Configuration Manager clients in the hierarchy use the Default Client Settings that are automatically created when you install Configuration Manager. However, you can modify the default client settings and you can create custom client settings to override the default client settings for specific users or devices. http://technet.microsoft.com/en-us/library/gg682139.aspx Introduction to Compliance Settings in Configuration Manager .. Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe the level of compliance you must have.
  • 16. http://www.examsgrade.com/exam/70-243/ pg. 16 For More Information: http://www.examsgrade.com/exam/70-243/