You need to recommend a solution to minimize the amount of network traffic between the perimeter network and t
Your network contains a System Center 2012 Configuration Manager environment that contains six
servers configured as shown in the following table:
Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are
in the internal network.
You plan to deploy servers to the perimeter network by using Configuration Manager.
The operating system for each server will be installed over the network.
The installations will begin automatically, as soon as each server starts for the first time.
You need to recommend a solution to minimize the amount of network traffic between the
perimeter network and the internal network during the installation of the operating systems.
What should you do?
You need to ensure that you collect inventory data from the remote computers
Your network contains a System Center 2012 Configuration Manager environment that contains six
servers configured as shown in the following table:
Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are
in the internal network.
A corporate security policy states that remote computers are forbidden to communicate directly
with servers on the internal network.
You need to ensure that you collect inventory data from the remote computers.
What should you do?
You need to centrally manage software updates for all of the servers by using Configuration Manager
Your network contains a System Center 2012 Configuration Manager environment that contains six
servers configured as shown in the following table:
Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are
in the internal network.
Administrators currently apply software updates to servers manually.
You discover that Server4 was never updated.
You need to centrally manage software updates for all of the servers by using Configuration
Manager.
What should you do first?
You need to ensure that mobile device information is available in the hardware inventory
Your network contains a System Center 2012 Configuration Manager environment as shown in the
exhibit. (Click the Exhibit button.)
(The exhibit shows that: Server5 and Server6 are in the perimeter network, while Server1, Server2,
Server3, and Server4 are in the internal network.)
The network contains six servers. The servers are configured as shown in the following table.
You need to ensure that mobile device information is available in the hardware inventory.
What should you do first?
You need to ensure that mobile device information is available in the hardware inventory
Your network contains a System Center 2012 Configuration Manager environment as shown in the
exhibit. (Click the Exhibit button.)
(The exhibit shows that: Server5 and Server6 are in the perimeter network, while Server1, Server2,
Server3, and Server4 are in the internal network.)
The network contains six servers. The servers are configured as shown in the following table.
You need to ensure that mobile device information is available in the hardware inventory.
What should you do first?
You need to inventory the environment variables of the All Managed Servers collection
DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
You create a collection named All Managed Servers.
You need to inventory the environment variables of the All Managed Servers collection.
What should you do?
To answer, move the four appropriate actions from the list of actions to the answer area and
arrange.
Which node should you select in the Configuration Manager console?
HOTSPOT
Your network contains a System Center 2012 Configuration Manager environment.
You deploy an application to 1,000 client computers.
You need to identify which client computers are in the process of installing the application.
Which node should you select in the Configuration Manager console?
To answer, select the appropriate node in the answer area.
You need to inventory the desktop settings of the All Marketing Users collection
DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
You create a collection named All Marketing Users.
You need to inventory the desktop settings of the All Marketing Users collection.
What should you do?
To answer, move the four appropriate actions from the list of actions to the answer area and
arrange them in the correct order.
What should you identify?
DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
Three users named User1, User2, and User3 will perform the following tasks:
User1 will review software metering data and inventory reports.
User2 will deploy Applications and create alerts.
User3 will create configuration items.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer are
a. Each security role may be used once, more than once, or not at all. Additionally, you may need to
drag the split bar between panes or scroll to view content.
You need to inventory the installed software on Windows Phone and iOS devices
Your network contains a single Active Directory domain named contoso.com.
System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) is deployed to contoso.com.
You need to inventory the installed software on Windows Phone and iOS devices.
What should you do first?