PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following describes a reason for installing the Application Catalog web service point?

You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in
their environment.
ABC.com’s hierarchy only includes a primary site. Have installed the Application Catalog web
service point and Application Catalog website point.
Which of the following describes a reason for installing the Application Catalog web service point?

Which of the following actions should be taken to recover the user account?

You work as a Network Administrator at AIOTestking.com. AIOTestking.com has an Active Directory
Domain Services (AD DS) domain named AIOTestking.com. All servers in the AIOTestking.com domain
have Microsoft Windows Server 2012 R2 installed and all client computers have Microsoft
Windows 8 Pro installed.
You have been charged with using tombstone reanimation to recover a user account named Mia
Hamm that was deleted from Active Directory.

Which of the following actions should be taken to recover the user account?

Which of the following is TRUE with regards to the deployment methods available for this situation?

You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com.
ABC.com has a Windows Server Update Services (WSUS) server installed on their network, and
have their workstations configured as WSUS clients. ABC.com’s workstations are configured to
have Windows Firewall enabled, with File and Printer Sharing blocked. ABC.com users do not
have local Administrators rights on their workstations.
After deploying System Center 2012 Configuration Manager in ABC.com’s environment, you want
to deploy the Configuration Manager client to all ABC.com’s workstations.
Which of the following is TRUE with regards to the deployment methods available for this
situation?

What minimum password length should be configured for CredSettings02 applied to FinUsers?

You work as the network administrator for a Microsoft Windows Server 2008 domain named
AIOTestking.com. AIOTestking.com has a Financial division which utilizes two organizational units (OU)
named FinUsers and FinComputers for user and computer account storage. The Development
division user and computer accounts are configured as members of global security groups named
DevUsers and DevComputers.
You configure two Password Settings objects for Financial division members named Credential01
and Credential02. You additionally configure a minimum password length of 4 for CredSettings01
and 7 for CredSettings02. AIOTestking.com wants you to determine the required password length
minimum for Development division users.
What minimum password length should be configured for CredSettings02 applied to FinUsers?

Which of the following actions can you take to view the hardware inventory data that System Center 2012 Config

You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in
their environment.

You have configured the use hardware inventory in System Center 2012 Configuration Manager to
collect data regarding the hardware configuration of client devices. You have selected the Enable
hardware inventory on clients setting in client settings.
Which of the following actions can you take to view the hardware inventory data that System
Center 2012 Configuration Manager collects? (Choose all that apply.)

Which two of the following steps should you perform first?

You work as a Network Administrator at AIOTestking.com. AIOTestking.com has an Active Directory
Domain Services (AD DS) domain named AIOTestking.com. All servers in the AIOTestking.com domain
have Microsoft Windows Server 2012 R2 installed.
You want to clone a domain controller to create another domain controller.

Which two of the following steps should you perform first? (Choose two).

Which of the following are client settings available for devices?

You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in
their environment.
You are running a training exercise for ABC.com’s administrators. You are currently discussing
client settings that are configurable via the Configuration Manager console.
Which of the following are client settings available for devices? (Choose all that apply.)

How would you access the contents of the snapshot?

You work as a Network Administrator at AIOTestking.com. AIOTestking.com has an Active Directory
Domain Services (AD DS) domain named AIOTestking.com. The AIOTestking.com network has a Windows
Server 2012 R2 domain controller named TESTKING-DC10 which hosts the Web Server, DNS
and DHCP services.
You create a snapshot backup of TESTKING-DC10 using the Ntdsutil utility and mount the
snapshot.
How would you access the contents of the snapshot?

How can you meet this requirement?

You work as a Network Administrator at AIOTestking.com. AIOTestking.com has an Active Directory
Domain Services (AD DS) domain named AIOTestking.com.
The network has a Server 2012 R2 server named TESTKING-SR09. TESTKING-SR09 runs a
custom line-of-business (LOB) application used by all company users.

You create a Data Collector Set (DCS) to monitor performance counters for TESTKING-SR09.
You need to ensure that when the size of the folder containing the performance log data reaches
500MB, previous data is deleted.
How can you meet this requirement?

Which of the following are log files that relate to reporting?

You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in

their environment.
You are running a training exercise for ABC.com’s administrators. You are currently discussing log
files related to the different functions in Configuration Manager.
Which of the following are log files that relate to reporting?