What should you do?
Your network contains a System Center 2012 Configuration Manager environment. Two weeks ago, you deployed a Windows Installer package named App1. You need to remediate a registry value that applies only to the client computers that have App1 installed. The solution must minimize network traffic. What should you do?
What should you do?
Your network contains a System Center 2012 Configuration Manager environment. Two weeks ago, you deployed a Windows Installer package named App1. You need to remediate a registry value that applies only to the client computers that have App1 installed. The solution must minimize network traffic. What should you do?
Which actions should you recommend?
You are designing a Windows Phone 7 application. A beta tester has changed the theme on the phone and now cannot see the text on the pages in the application. You need to recommend modifications so that the text in the application is always visible. Which actions should you recommend? (Each correct answer presents a complete solution. Choose all that apply.)
What should you do?
Your company network includes Forefront Identity Manager (FIM) 2010. Your company uses many custom attributes bound to resource types. One custom attribute is an integer type bound to multiple resource types requiring validation of different ranges of values. The attribute must ensure that valid data is entered for the new integer type attribute. You need to extend the schema of the FIM Portal to validate integer data entry. What should you do?
What should you do?
Your network contains a System center 2012 Configuration Manager environment. You are creating a configuration item that contains application settings for Microsoft Office 2010. You need to detect whether Office 2010 is installed before validating the configuration item. What should you do?
What should you do?
Your network contains a System center 2012 Configuration Manager environment. You are creating a configuration item that contains application settings for Microsoft Office 2010. You need to detect whether Office 2010 is installed before validating the configuration item. What should you do?
Which input scope should you recommend?
You are designing a Windows Phone 7 application. You need to display the keyboard layout in the application so users can use special keys to enter website addresses efficiently. Which input scope should you recommend?
What should you do?
You use Forefront Identity Manager (FIM) 2010 in your company network. You create a new resource type in the FIM Portal that supports a third-party web application. You need to mark the new resource type in the FIM Portal as essential for the third-party application. What should you do?
What should you do?
Your network contains a System Center 2012 Configuration Manager environment. You create a report named Report1. Report1 is used by multiple users. Users report that it takes too long to load Report1. You need to reduce the amount of time it takes to load Report1. What should you do?
What should you do?
Your network contains a System Center 2012 Configuration Manager environment. You create a report named Report1. Report1 is used by multiple users. Users report that it takes too long to load Report1. You need to reduce the amount of time it takes to load Report1. What should you do?