Which of the following is FALSE?
The Network Access Account is used by client computers when they cannot use their local computer account to
access content on distribution points. For example, this applies to workgroup clients and computers from
untrusted domains. This account might also be used during operating system deployment when the computer
installing the operating system does not yet have a computer account on the domain.
Which of the following is FALSE?
Site system servers within the same site communicate with…?
System Center 2012 Configuration Manager uses site system roles to support operations at each site.
Computers that host the Configuration Manager site are named site servers, and computers that host the other
site system roles are named site system servers.
Site system servers within the same site communicate with each other by using which protocol?
You need to apply the override for Pack1 to the group i…
Your company has a datacenter in Los Angeles that contains a System Center 2012 Operations Manager
infrastructure.
You create three unsealed management packs named Pack1, Pack2, and Pack3.
You create an override for Pack1.
You create a group in Pack2.
You need to apply the override for Pack1 to the group in Pack2.
What should you do before you apply the override?
The process of searching your environment is called ___?
Via Operations Manager you can use the Operations console to search your environment for manageable
objects and then deploy an agent to any object that you want to monitor. The process of searching your
environment is called ___?
Which of the following is NOT a default role?
When you install a Configuration Manager site, several default site system roles are automatically installed for
the site.
These site system roles are required for the core operation of each site and although some default site system
roles can be moved to other servers, they cannot be removed from the site.
Which of the following is NOT a default role?
What RAID configuration is this?
For a typical DPM deployment there is a recommended RAID configuration. This configuration provides an
effective compromise between capacity, cost, reliability, and performance.
What RAID configuration is this?
Which of the following Configuration Manager discovery …
System Center 2012 Configuration Manager discovery identifies computer and user resources that you can
manage by using Configuration Manager. It can also discover the network infrastructure in your environment.
Which of the following Configuration Manager discovery methods provides details about the client installation
status?
Which Site System Role would run the Configuration Mana…
Configuration Manager uses site system roles to support management operations at each site. When you
install a Configuration Manager site, some site system roles are automatically installed and assigned to the
server on which Configuration Manager Setup has run successfully. Which Site System Role would run the
Configuration Manager services?
Which of these answers is FALSE regarding System Center…
Which of these answers is FALSE regarding System Center 2012 – Data Protection Manager (DPM)?
What should you create?
Your company has a private cloud that is managed by using a System Center 2012 infrastructure.
You deploy an application virtualization solution.
You deploy a server named RDServer1, and then you install the Remote Desktop Services server role.
RDServer1 is monitored by using Operations Manager.
You deploy a virtualized application named VirtualApp1 to RDServer1.
You need to set the state of RDServer1 to critical if CPU utilization by VirtualApp1 exceeds 70 percent for two
minutes.
What should you create?