Which query should you use?
Your network contains a System Center 2012 Configuration Manager environment.
You need to create a collection that contains all of the virtual machines.
Which query should you use?
What should you configure the report to do?
Your network contains a System Center 2012 Configuration Manager environment.
You create a report that lists compliance information.
You schedule the report to run every day at 20:00.
You need to ensure that on Friday, you can review the results of the report created on the previous
Monday.
What should you configure the report to do?
You need to ensure that the members of a group named Group1 are allowed to deploy applications to desktop comp
Your network contains an Active Directory forest.
The forest contains a System Center 2012 Configuration Manager environment.
The environment contains one primary site.
You need to ensure that the members of a group named Group1 are allowed to deploy applications
to desktop computers.
The solution must minimize the number of permissions assigned to Group1.
What should you do?
You need to ensure that you can migrate objects from Configuration Manager 2007 to Configuration Manager 2012
Your network contains a single Active Directory domain.
The domain contains a System Center Configuration Manager 2007 site and a System Center 2012
Configuration Manager site.
You need to ensure that you can migrate objects from Configuration Manager 2007 to Configuration
Manager 2012.
What should you do?
Which log file should you review?
Your network contains a System Center 2012 Configuration Management environment.
The network contains 10 database servers that run Microsoft SQL Server 2008.
You have a configuration baseline that is used to monitor database servers.
You confirm that all of the database servers downloaded the configuration baseline.
You discover that a database server named Server1 fails to report any data for the configuration
baseline.
You need to identify whether Server 1 evaluates the configuration items that are part of the
configuration baseline.
Which log file should you review?
Which log file should you review?
You enable Client Push.
You run Active Directory System Discovery.
You discover that some of the discovered computers do not have the System Center 2012
Configuration Manager client installed.
You need to identify why Client Push fails of the client computers.
Which log file should you review?
Which log file should you review?
Your network contains a System Center 2012 Configuration Manager environment.
You add a software update point to the environment.
You receive a message indicating that SMS WSUS Synchronization failed.
You need to retrieve additional information about the message.
Which log file should you review?
What should you review?
Your network contains a System Center 2012 Configuration Manager environment.
The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
What should you create?
Your company uses System Center 2012 Configuration Manager to deploy applications.
The company purchases a new application named App1. App1 can be installed only on client
computers that run Windows 7.
You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of
memory and 300 Gb of free disk space.
What should you create?
Which client installation methods should you identify?
Your network contains a Windows Server Update Services (WSUS) server.
All client computers are configured as WSUS clients.
All of the client computers have Windows Firewall enabled.
Windows Firewall is configured to allow File and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center 2012 Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager client to an of
the client computers.
Which client installation methods should you identify? (Choose all that Apply.)