You need to recover the encrypted data from the user’s computers
You are a desktop support technician for your company. The computers in your company run Windows Vista. The computers are encrypted with BitLocker. Each computers motherboard contains a Trusted Platform Model (TPM) chip. The password for the BitLocker is stored on the USB drive. A user reports that her computer does not start. You discovered that the computers TPM chip is faulty. You need to recover the encrypted data from the user’s computers. What should you do?
You need to configure Operations Manager to use mail
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.
The network contains an SMTP host named mail.contoso.com
You need to configure Operations Manager to use mail.contoso.com to send email notifications.
What should you do?
You need to ensure that your computer can download and apply new updates
You are a desktop support technician for your company. The computers in your company run Windows Vista. When you check for updates on the Windows Update Website, the 0x80070003 error appears. You need to ensure that your computer can download and apply new updates. What should you do?
What should you create first?
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.
The network contains a Microsoft Exchange Server 2010 organization.
You plan to import the Exchange Server 2010 Management Pack.
You need to configure Operation Manager to send Exchange-related notifications to Exchange Server administrators.
What should you create first?
What should you do?
You are a desktop support technician for your company. The computers in your company run Windows Vista. You install a legacy application and its compatibility fix on the computers. Users report that the compatibility fix is applied to all the applications that have the same name as the legacy application. You need to ensure that the compatibility fix is applied only to the legacy earlier application. What should you do?
You need to ensure that Server1 can send security events to Server2
The network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.
The private cloud contains two servers. The servers are configured as shown in the following table.
The network segments are separated by a firewall. All of the TCP ports from 1 to 1024 are allowed on the firewall.
You need to ensure that Server1 can send security events to Server2.
What should you do?
You need to compare the current security policy of the branch office computers with the custom security templa
You are a desktop support technician for your company. The computers in your company run Windows Vista. Your company has a main office and a branch office. You manage the computers at the branch office. The IT manager at the main office provides you with a custom security template. You need to compare the current security policy of the branch office computers with the custom security template. What should yo do?
What should you modify?
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.
The network contains an Active Directory forest named adatum.com
Operations Manager monitors a server named Operations1. Operations1 has a computer account in an oganizational unit (OU) named ServerOU1.
You create a group named GP1 as shown in the exhibit. (Refer to the Exhibit.)
You create a ruled named OMRule1 that generates an alert when an error is added to the Application log.
You target OMRule1 to GP1.
You discover that alerts fail to be generated when errors are added to the Application log on Operations1.
You need to ensure that an alert is generated when an error is added to the Application log on Operations1.
What should you modify?
Exhibit:
You need to prevent users from installing non-trusted certificates on their computers
You are a desktop support technician for your company. The computers on the corporate network run Windows Vista. You need to prevent users from installing non-trusted certificates on their computers. What should yo do?
Which firewall port or ports should you allow on the firewall?
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.
The network contains two network segments that are separated by a firewall.
You have a management server named Server1.
You create a discovery rule and configure the rule to discover SNMP devices.
You discover that only the devices on the network segment that contains Server1 are discovered.
You need to ensure that the devices supporting SNMP on both network segments are discovered.
Which firewall port or ports should you allow on the firewall?


