How to 100% pass 70-243 exam? GreatExam provides the guaranteed 70-243 exam preparation material to boost up your confidence in 70-243 exam. Successful candidates have provided their reviews about our 70-243 dumps. Now GreatExam supplying the new version of 70-243 VCE and PDF dumps. We ensure our 70-243 exam questions are the most complete and authoritative compared with others’, which will ensure your 70-243 exam pass.
QUESTION 56
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.)
The network contains six servers. The servers are configured as shown in the following table.
You need to ensure that mobile device information is available in the hardware inventory.
What should you do?
A. Install a management point on Server5.
B. Configure IIS to support only HTTPS on Server5.
C. Install a management point on Server2.
D. Install Network Load Balancing (NLB) on Server3.
E. Install an enrollment proxy point on Server6.
F. Configure IIS to support only HTTP on Server3.
G. Configure the Exchange connector on Server3.
H. Install Network Load Balancing (NLB) on Server6.
I. Install a PXE-enabled protected distribution point on Server5.
J. Install the Windows Cluster service on Server3.
K. Install a PXE-enabled protected distribution point on Server4.
L. Install the Windows Cluster service on Server6.
M. Install Windows Server Update Services (WSUS) on Server3.
N. Install a protected distribution point on Server1.
O. Install a software update point on Server3.
Answer: G
Explanation:
http://technet.microsoft.com/en-us/library/gg682022.aspx
Determine How to Manage Mobile Devices in Configuration Manager
Use the following information to help you decide how to manage mobile devices in System Center 2012 Configuration Manager.
You can use Configuration Manager to enroll mobile devices and install the Configuration Manager client, you can use the mobile device legacy client (for example, for Windows CE mobile operating systems), and you can use the Exchange Server connector. In addition, in Configuration Manager SP1, you can enroll devices that run Windows Phone 8, Windows RT, and iOS by using the Windows Intune connector.
The following table lists these four mobile device management methods and provides information about the management functions that each method supports:
…
http://technet.microsoft.com/en-us/library/gg681976.aspx#BKMK_Determine_EnrollmentPoints
Determine the Site System Roles for Client Deployment in Configuration Manager – Determine Whether You Require an Enrollment Point and an Enrollment Proxy Point
Configuration Manager requires the enrollment point and the enrollment proxy point to enroll mobile devices and to enroll certificates for Mac computers (Configuration Manager SP1 only). These site system roles are not required if you will manage mobile devices by using the Exchange Server connector, or if you install the mobile device legacy client (for example, for Windows CE), or if you request and install the client certificate on Mac computers independently from Configuration Manager.
QUESTION 57
Your network contains a System Center 2012 Configuration Manager environment.
You create two custom client agent settings named ClientSettings1 and ClientSettings2.
You apply ClientSettings1 to all of the client computers in the sales department.
You apply ClientSettings2 to all of the client computers in the marketing department.
The client computers in the marketing department contain several custom registry settings.
You need to collect the custom registry settings from the marketing department computers.
What should you do?
A. Edit the default client agent settings and include the custom registry information.
B. Edit ClientSettings2 and include the custom registry information.
C. Create a new set of custom client agent settings for the marketing department and include the custom registry information.
D. Edit ClientSettings2 and exclude the custom registry information.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/gg682109#BKMK_CustomClientSettings
– Create a new set of custom client agent settings for the marketing department and include the custom registry information.
– Edit ClientSettings2 and include the custom registry information. <— probably not
Because editing isn’t that easy.
It is common sense, that you just add another client setting and deploy it to the collection.
Why? All settings can be separately deleted and especially named. Easier to handle.
QUESTION 58
Drag and Drop Question
Your network contains a System Center 2012 Configuration Manager environment.
You create a collection named All Marketing Users.
You need to inventory the desktop settings of the All Marketing Users collection.
What should you do?
To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/gg712290.aspx
How to Extend Hardware Inventory in Configuration Manager
System Center 2012 Configuration Manager hardware inventory reads information about devices by using Windows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-based Enterprise Management (WBEM), which is an industry standard for accessing management information in an enterprise environment.
In previous versions of Configuration Manager, you could extend hardware inventory by modifying the file sms_def.mof on the site server.
In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did in Configuration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes to collect by hardware inventory by using client settings. Configuration Manager provides the following methods to extend hardware inventory:
Enable or disable existing inventory classes – You can enable or disable the default inventory classes used by Configuration Manager or you can create custom client settings that allow you to collect different hardware inventory classes from specified collections of clients.
Add a new inventory class – You can add a new inventory class from the WMI namespace of another device.
Import and export hardware inventory classes – You can import and export Managed Object Format (MOF) files that contain inventory classes from the Configuration Manager console.
Create NOIDMIF Files – Use NOIDMIF files to collect information about client devices that cannot be inventoried by Configuration Manager.
Create IDMIF Files – Use IDMIF files to collect information about assets in your organization that are not associated with a Configuration Manager client, for example, projectors, photocopiers and network printers.
http://msdn.microsoft.com/en-us/library/windows/desktop/aa394121%28v=vs.85%29.aspx
Win32_Desktop class (Windows)
The Win32_Desktop WMI class represents the common characteristics of a user’s desktop. The properties of this class can be modified by the user to customize the desktop.
Further information:
The screenshots show the wizard screen.
Since we need to inventory WMI information, that means we need Hardware Inventory and you can only do that with a Custom Client Device Setting.
QUESTION 59
Your network contains a System Center 2012 Configuration Manager environment.
You create a report named Report1. Report1 is used by multiple users.
Users report that it takes too long to load Report1.
You need to reduce the amount of time it takes to load Report1.
What should you do?
A. Enable caching for the report.
B. Decrease the Size of the ReportServer database.
C. Decrease the session timeout value for the Reports website.
D. Increase the size of the ReportServerTempDB database.
Answer: A
Explanation:
Report caching can shorten the time it takes for a user to retrieve a report, particularly if the
report is large or accessed frequently. When a report is requested, a query is sent to the database, an intermediate form of the report is cached on the report server, and the final
report is rendered to the end user. Report caching forces the intermediate version of the
report to be cached on the report server and provides a more consistent user experience
with a reduced load on the database.
QUESTION 60
Your company uses System Center 2012 Configuration Manager to deploy applications.
The company purchases a new application named Appl. App1 can be installed only on client computers that run Windows 7.
You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 GB of memory and 300 GB of free disk space.
What should you create?
A. a Query object
B. custom client device settings
C. requirement rules
D. custom client user settings
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/gg682082.aspx
How to Deploy Applications in Configuration Manager
Before you can deploy an application in Microsoft System Center 2012 Configuration Manager, you must create at least one deployment type for the application.
http://technet.microsoft.com/en-us/library/gg682174.aspx
How to Create Deployment Types in Configuration Manager
Steps to Create a Deployment Type
Step 1: Start the Create Deployment Type Wizard.
Step 2: Specify whether you want to automatically detect or to manually define the deployment type information.
Step 3: Specify the content options for the deployment type.
Step 4: Configure the detection methods to indicate the presence of the application.
Step 5: Specify the user experience options for the deployment type.
Step 6: Specify the requirements for the deployment type.
Requirements are used to specify the conditions that must be met before a deployment type can be installed on a client device.
Step 7: Specify the dependencies for the deployment type.
Step 8: Confirm the deployment type settings and complete the wizard.
Step 9: Configure additional options for the deployment types that contain virtual applications.
http://technet.microsoft.com/en-us/library/gg682174.aspx#BKMK_Step61
Step 6: Specify Requirements for the Deployment Type
On the Requirements page of the Create Deployment Type Wizard, click Add to open the Create Requirement dialog box, and add a new requirement.
From the Category drop-down list, select whether this requirement is for a device or a user, or select Custom to use a previously created global condition. When you select Custom, you can also click Create to create a new global condition.
Important: If you create a requirement of the category User and the condition Primary Device, and then deploy the application to a device collection, the requirement will evaluate as false.
From the Condition drop-down list, select the condition that you want to use to assess whether the user or device meets the installation requirements. The contents of this list will vary depending on the selected category.
From the Operator drop-down list, choose the operator that will be used to compare the selected condition to the specified value to assess whether the user or device meets in the installation requirement. The available operators will vary depending on the selected condition.
In the Value field, specify the values that will be used with the selected condition and operator whether the user or device meets in the installation requirement. The available values will vary depending on the selected condition and the selected operator.
Click OK to save the requirement rule and exit the Create Requirement dialog box.
On the Requirements page of the Create Deployment Type Wizard, click Next.
http://technet.microsoft.com/en-us/library/gg682048.aspx
How to Create Global Conditions in Configuration Manager
In System Center 2012 Configuration Manager, global conditions are rules that represent business or technical conditions that you can use to specify how an application is provided and deployed to client devices.
QUESTION 61
Hotspot Question
Your network contains a System Center 2012 Configuration Manager environment.
You deploy an application to 1,000 client computers.
You need to identify which client computers are in the process of installing the application.
Which node should you select in the Configuration Manager console?
To answer, select the appropriate node in the answer area.
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/gg682201
How to Monitor Applications in Configuration Manager
In Microsoft System Center 2012 Configuration Manager, you can monitor the deployment of all software, including software updates, compliance settings, applications, task sequences, and packages and programs.
You can monitor deployments by using the Monitoring workspace in the Configuration Manager console or by using reports.
Applications in Configuration Manager support state-based monitoring, which allows you to track the last application deployment state for users and devices. These state messages display information about individual devices.
For example, if an application is deployed to a collection of users, you can view the compliance state of the deployment and the deployment purpose in the Configuration Manager console.
An application deployment state has one of the following compliance states:
Success – The application deployment succeeded or was found to be already installed.
In Progress – The application deployment is in progress.
Unknown – The state of the application deployment could not be determined. This state is not applicable for deployments with a purpose of Available. This state is typically displayed when state messages from the client are not yet received.
Requirements Not Met – The application was not deployed because it was not compliant with a dependency or a requirement rule, or because the operating system to which it was deployed was not applicable.
Error – The application failed to deploy because of an error.
To monitor the state of an application in the Configuration Manager console
In the Configuration Manager console, click Monitoring.
In the Monitoring workspace, click Deployments.
To review deployment details for each compliance state and the devices in that state, select a deployment, and then, on the Home tab, in the Deployment group, click View Status to open the Deployment Status pane. In this pane, you can view the assets with each compliance state. Click any asset to view more detailed information about the deployment status to that asset.
To review general status information about an application deployment, select a deployment, and then click the Summary tab in the Selected Deployment window.
To review information about the applications deployment type, select a deployment, and then click the Deployment Types tab in the Selected Deployment window.
QUESTION 62
Your network contains a System Center 2012 Configuration Manager environment.
Software Inventory and Hardware Inventory are enabled for all client computers.
All of the client computers have an application named App1 installed.
App1 saves files to the C:\Program Files\App1 folder.
All of the files saved by App1 have a file name extension of .xyz.
You configure Software Inventory to inventory all of the files that have the .xyz extension and the .exe extension.
After six months, you discover that some of the client computers fail to inventory .xyz files.
All of the client computers inventory .exe files.
You need to ensure that the .xyz files are inventoried.
What should you do?
A. Modify C:\Program Files\App1\Skpswi.dat.
B. Modify C:\NO_SMS_On_Drive.sms.
C. Delete C:\Program Files\App1\Skpswi.dat.
D. Delete C:\NO_SMS_On_Drive.sms.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh691018.aspx
How to Exclude Folders from Software Inventory in Configuration Manager
You can create a hidden file named Skpswi.dat and place it in the root of a client hard drive to exclude it from System Center 2012 Configuration Manager software inventory.
You can also place this file in the root of any folder structure you want to exclude from software inventory. This procedure can be used to disable software inventory on a single workstation or server client, such as a large file server.
Note: Software inventory will not inventory the client drive again unless this file is deleted from the drive on the client computer.
QUESTION 63
Your network contains a System Center 2012 Configuration Manager environment.
You deploy the Configuration Manager client to all client computers.
You enable Hardware Inventory and Software Inventory for all of the client computers.
You discover that one of the client computers fails to report inventory data.
You confirm that the inventory files are copied correctly to the site server.
You discover, however, that the site server does not contain any data from the client computer.
You need to identify what is causing the reporting issue.
Which log file should you review?
A. Dataldr.log
B. Inventoryagent.log
C. Mp_hinv.log
D. Contenttransfermanager.log
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/hh427342.aspx
Technical Reference for Log Files in Configuration Manager
dataldr.log
Site Server log file
Records information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database.
Further information 1:
MP_Hinv.log
Site system server log file
Records details about the conversion of XML hardware inventory records from clients and the copy of those files to the site server.
InventoryAgent.log
Client log file
Records activities of hardware inventory, software inventory, and heartbeat discovery actions on the client.
Contenttransfermanager.log
Client log file
Schedules the Background Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to access packages.
Further information 2:
http://technet.microsoft.com/en-us/library/bb932206.aspx
Troubleshooting Configuration Manager Performance
Slow Hardware Inventory Processing – Solution
If you suspect that hardware inventory report processing is slow for a Configuration Manager 2007 site, the following actions should be taken:
Inspect the client inventoryagent.log log file to determine whether the client is sending delta hardware inventory reports or full reports. After initial client deployment, a very high percentage of hardware inventory reports should be deltas, which contain much less data than full inventory reports. If you are seeing a significant number of full inventory reports, this could be caused by inconsistent inventory report processing by the site server.
For example, a delta hardware inventory report could be processed before a full inventory report for the same system has been processed. In this situation, a hardware inventory resynchronization request will be sent to the client and an additional full inventory report will be generated. To determine whether this is happening, review the dataldr.log log file on the site server.
Inspect the size of the hardware inventory files in the site server’s inbox directory to determine whether the software inventory files have grown significantly from previous inventory reports. If hardware inventory report file sizes have grown beyond an initial hardware inventory report file size baseline, you should determine the cause and whether the larger inventory report files are expected to be larger. One possibility is that the site’s SMS_def.mof file has been modified to collect more inventory information from clients.
Determine whether there is a consistent SMS_def.mof hardware inventory reporting file in use throughout the hierarchy. If not, the hardware inventory processor might be running very slowly because of changes in the database schema caused by the different SMS_def.mof files throughout the hierarchy. The dataloader.log log file will record instances of database schema changes and should be reviewed when investigating this issue.
This article was originally written for SMS, but the same principles should apply to SCCM 2012:
http://technet.microsoft.com/en-us/library/cc723597.aspx
Chapter 20 – Hardware and Software Inventory Flowcharts
If a backlog of MIF files accumulates at the site server (that is, if MIF files are not being processed):
Examine the Inventory Data Loader status messages or the Dataldr.log file to determine whether the Inventory Data Loader has been able to connect to the SMS site database server. Inventory Data Loader might be unable to write a discovered client’s MIF to the database.
If the MIF files are not being processed on the site server:
Verify that Inventory Data Loader successfully parsed the MIF file by checking Inventory Data Loader status messages or the Dataldr.log file. If the MIF file cannot be processed, it will be transferred to the \Badmifs directory.
If inventory from clients is not being reported to a new parent site:
Examine the Dataldr.log file to verify that Inventory Data Loader has read the *.sha file, stopped all new MIF file processing, and is creating MIF files for each client’s data in the site database to forward to the parent site.
QUESTION 64
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Manager environment.
The network contains 10 database servers that run Microsoft SQL Server 2008.
You have a configuration baseline that is used to monitor the database servers.
You confirm that all of the database servers downloaded the configuration baseline.
You discover that a database server named Server1 fails to report any data for the configuration baseline.
You need to identify whether Server1 evaluates the configuration items that are part of the configuration baseline.
Which log file should you review?
A. Ciagent.log
B. Sitestat.log
C. Ccm.log
D. Rcmctrl.log
E. Smsexec.log
F. Dcmagent.log
G. Hman.log
H. Contenttransfermanager.log
I. Sdmagent.log
J. Wsyncmgr.log
K. Locationservices.log
Answer: F
Explanation:
http://technet.microsoft.com/en-us/library/hh427342.aspx
DCMAgent.log
Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and applications.
QUESTION 65
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Manager environment.
You add a software update point to the environment.
You receive a message indicating that SMS WSUS Synchronization failed.
You need to retrieve additional information about the message.
Which log file should you review?
A. Ciagent.log
B. Contenttransfermanager.log
C. Sdmagent.bg
D. Dcmagent.log
E. Locationservices.log
F. Wsyncmgr.log
G. Rcmctrl.log
H. Ccm.log
I. Sitestat.log
J. Smsexec.log
K. Hman.log
Answer: F
Explanation:
http://technet.microsoft.com/en-us/library/hh427342.aspx
wsyncmgr.log
Records details about the software updates synchronization process
QUESTION 66
Note: This question is part of a series of questions that use the same set of answer choices.
An answer choice may be correct for more than one question in the series.
You enable Client Push.
You run Active Directory System Discovery.
You discover that some of the discovered computers do not have the System Center 2012 Configuration Manager client installed.
You need to identify why Client Push fails on some of the client computers.
Which log file should you review?
A. Sdmagent.log
B. Dcmagent.log
C. Rcmctrl.log
D. Smsexec.log
E. Locationservices.log
F. Contenttransfermanager.log
G. Ccm.log
H. Wsyncmgr.log
I. sitestat.log
J. Ciagent.log
K. Hman.log
Answer: G
Explanation:
http://technet.microsoft.com/en-us/library/hh427342.aspx
ccm.log
Records client push installation activities.
QUESTION 67
Drag and Drop Question
Your network contains a System Center 2012 Configuration Manager environment.
Three users named User1, User2, and User3 will perform the following tasks:
– User1 will review software metering data and inventory reports.
– User2 will deploy applications and create alerts.
– User3 will deploy applications and create distribution point groups.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer area. Each security role may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Explanation:
Application Administrator
This security role:
• Provides permissions included in both the Application Author and Application Deployment Manager roles.
• Provides permissions to manage queries, read and modify site permissions, manage collections, and manage settings for user device affinity.
Application Deployment Manager
This security role provides permissions to:
• View applications and manage deployments, alerts, templates, packages, and programs.
• View collections and their members, status messages, queries, and conditional delivery rules.
Asset Manager
This security role provides permissions to manage hardware and software inventory, software metering, and the Asset Intelligence reporting classes.
QUESTION 68
Your network contains a System center 2012 Configuration Manager environment.
The environment contains a reporting services point.
A group of users is responsible for creating custom reports.
The custom reports will be published.
You need to identify which tools can be used to create and publish custom reports to Microsoft SQL Server Reporting Services (SSRS).
Which tools should you identify?
A. Reporting Services Configuration Manager
B. Microsoft SQL Server Management Studio
C. Microsoft SQL Server Business Intelligence Development Studio
D. Microsoft Access 2010 and Reporting Services Configuration Manager
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/gg508710.aspx
Overview of Custom Reports
Custom reports are intended for advanced users who are comfortable creating their own
reports by using Microsoft SQL Server Reporting Services and SQL Server Business
Intelligence Development Studio, SQL Server Reporting Services Report Builder, or
Microsoft Visual Studio Report Designer.
Further information:
http://msdn.microsoft.com/en-us/library/ms155792(v=sql.100)
Reporting Services Components and Tools
http://msdn.microsoft.com/en-us/library/ms345231.aspx
Custom Report Items
http://msdn.microsoft.com/en-us/library/ms345253
Custom Report Item Implementation Requirements
http://technet.microsoft.com/en-us/library/gg682105.aspx
Introduction to Reporting in Configuration Manager
http://technet.microsoft.com/en-us/library/hh338693.aspx
Creating Custom Report Models in SQL Server Reporting Services
QUESTION 69
Your network contains a System Center 2012 Configuration Manger environment.
You wirte the following query:
select SYS.Name from SMS_R_System SYS
join SMS_G_System_ADD_REMOVE_PROGRAMS ARP
on ARP.ResourceID = SYS.ResourceId
You need to create a list of all the client computers that have a version of Microsoft Office installed.
What should you add to the query?
A. where ARP.DisplayName like “Microsoft Office*”
B. where ARP.DisplayName = “Microsoft Office*”
C. where ARP.DisplayName like “Microsoft Office%”
D. where ARP.DisplayName = “%Microsoft Office”
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/bb694123
For relational operators that perform LIKE comparisons (“is like” or “is not like”), you can use wildcard characters within the string.
You can use the following wildcards.
Wildcard Description
%
Any string of zero or more characters
_ (underscore)
Any single character
[]
Any single character within the range or set (for example [a-f] or [abcdef]) [^]
Any single character not within the specified range (for example [^a-f] or [^abcdef])
QUESTION 70
You need to detect whether Office 2010 is installed before validating the configuration item.
What should you do?
A. Create a query-based collection.
B. Create an automatic deployment rule.
C. Enable Use Windows Installer detection.
D. Create a report to display all installed software.
Answer: C
Explanation:
* Here are the basic steps for adding a Windows Installer detection method:
1. From the Deployment Type Properties dialog, select the Detection Method tab, and click Add Clause .
2. Choose the appropriate setting type. In this case, select Windows Installer , and click the Browse button.
3. Navigate to the desired .msi file and select Open .
The product code appears, as By default, the rule looks for only the product code.
4. Click OK to save the detection rule.
All the 70-243 braindumps are updated. Get a complete hold of 70-243 PDF dumps and 70-243 practice test with free VCE player through GreatExam and boost up your skills.