PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to ensure that the user can access resources on the corporate network

You are a desktop support technician for your company. The computers on the corporate network run Windows Vista. The computers are configured to obtain IP addresses automatically.

A user reports that he cannot access resources on the corporate network. You discover that the IP address of the user’s computer is 169.254.17.9 with a 16-bit subnet mask. You restart the computer, but the user still cannot access resources on the corporate network.

You need to ensure that the user can access resources on the corporate network. What should you do?

You need to ensure that you can create Book1, and then reference the runbook in Service Manager

Your company has a datacenter in Los Angeles.

The datacenter contains a private cloud that is managed by using a System Center 2012 infrastructure.

A server named VMM1 hosts the System Center 2012 Service Manger management server. A server named Server2 hosts the System Center 2012 Orchestrator management server.

You plan to use a runbook named Book1 to update the status of Service Manager incidents.

You need to ensure that you can create Book1, and then reference the runbook in Service Manager.

What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

Which two actions should you perform? (Each correct answer presents part of the solution

You are a desktop support technician for your company. Your company has the following departments:

Sales: Computers belong to the corporate domain and run Windows Vista or Microsoft Windows XP Professional.
Accounting: Computers belong to the corporate domain and run Windows NT Workstation 4.0 with Service Pack 6.
Graphics: Computers belong to their own domain in a separate forest and run Windows Vista.
Research: Computers belong to a workgroup and run Windows Vista or Windows XP Professional.

You need to ensure that all the computers in the company authenticate by using Kerberos.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

What should you create?

Your company has a private cloud that is managed by using a System Center 2012 infrastructure.

The Service Manager management server is installed on a server named Server1. The Configuration Manager site server is installed on a server named Server2.

You create a baseline and several configuration items.

You need to configure Service Manager to create incidents for each Service Manager configuration item that is non-compliant with the baseline.

What should you create?

You need to ensure that the script can run successfully

You are a desktop support technician for your computer. The computers in your company run Windows Vista. You create a folder name Scripts on the root of drive C. You create a VBS script file and save the VBS script to the scripts fodler. When you run the script, the message shown in the exhibit appears. (Refer to the Exhibit.)

You need to ensure that the script can run successfully. What should you do?

Exhibit:

What should you create next?

You have a System Center 2012 Operations Manager infrastructure.

You have a line-of-business web application named App1. App1 stores its information in a dedicated Microsoft SQL Server database.

Your company defines a service level agreement (SLA) for App1 of at least 98 percent uptime.

You need to implement a solution that measures the availability of App1.

You create a distributed application for App1.

What should you create next?

You need to ensure that every administrative task prompts for verification of administrator credentials

You are a desktop support technician for your computer. The computers in your company run Windows Vista. When you perform a routine maintenance task, you discover that the computers do not prompt for verification of the administrator credentials. You need to ensure that every administrative task prompts for verification of administrator credentials. What should you do?

Which access mode should you configure to discover Router1?

Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.

The private cloud has a connection to a partner company. The connection uses a router named Router1. Router1 is owned by the partner company.

The partner company’s security policy states that only partner company network administrators can access the configuration information of the partner company’s network devices.

You need to monitor the availability of Rotuer1. The solution must meet the security policy requirement.

Which access mode should you configure to discover Router1?

You need to ensure that the user does not receive the error message

You are a desktop support technician for your company. The computers in your company run Windows Vista. When a user starts a computer, the user receives the following error message: “An Application Request Change was made for a known application file: C:\Program Files\Windows Defender\MpCmdRun.exe.” You need to ensure that the user does not receive the error message. You must achieve this goal without compromising the security of the computer. What should you do?

What should you create?

Your company has a private cloud that is managed by using a System Center 2012 infrastructure.

You deploy an application virtualization solution.

You deploy a server named RDServer1, and then you install the Remote Desktop Services server role.

RDServer1 is monitored by using Operations Manager.

You deploy a virtualized application named VirtualApp1 to RDServer1.

You need to set the state of RDServer1 to critical if CPU utilization by VirtualApp1 exceeds 70 percent for two minutes.

What should you create?