PrepAway - Latest Free Exam Questions & Answers

Category: 70-243 (v.2)

Exam 70-243: Administering and Deploying System Center 2012 Configuration Manager (update December 31th, 2014)

You need to ensure that the .xyz files are inventoried

Your network contains a System Center 2012 Configuration Manager environment.
Software Inventory and Hardware Inventory are enabled for all client computers.
All of the client computers have an application named App1 installed. App1 saves files to the
C:\Program Files\App1 folder. All of the files saved by App1 have a file name extension of
.xyz.

You configure Software Inventory to inventory all of the files that have the .xyz extension and
the .exe extension.
After six months, you discover that some of the client computers fail to inventory .xyz files.
All of the client computers inventory .exe files.
You need to ensure that the .xyz files are inventoried.
What should you do?

Which log file should you review?

Your network contains a System Center 2012 Configuration Manager environment.
You deploy the Configuration Manager client to all client computers.
You enable Hardware Inventory and Software Inventory for all of the client computers.
You discover that one of the client computers fails to report inventory data.
You confirm that the inventory files are copied correctly to the site server. You discover,
however, that the site server does not contain any data from the client computer.
You need to identify what is causing the reporting issue.
Which log file should you review?

Which log file should you review?

Your network contains a System Center 2012 Configuration Manager environment.
The network contains 10 database servers that run Microsoft SQL Server 2008. You have a
configuration baseline that is used to monitor the database servers.
You confirm that all of the database servers downloaded the configuration baseline.
You discover that a database server named Server1 fails to report any data for the
configuration baseline.
You need to identify whether Server1 evaluates the configuration items that are part of the
configuration baseline.
Which log file should you review?

What should you identify?

DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
Three users named User1, User2, and User3 will perform the following tasks:
User1 will review software metering data and inventory reports.
User2 will deploy applications and create alerts.
User3 will deploy applications and create distribution point groups.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer area. Each
security role may be used once, more than once, or not at all. Additionally, you may need to
drag the split bar between panes or scroll to view content.


Page 7 of 8« First...45678