Q1. HOTSPOT
Your network contains a single Active Directory named contoso.com. A System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) primary site named S01 is deployed to contoso.com.
The Configuration Manager deployment includes the servers configured as shown in the following table.
The distribution point is configured to require HTTPS for client communications.
You have a domain computer named Computer1 that runs the 64-bit version of Windows
8.1.
You need to install the Configuration Manager client on Computer1 manually.
Which network location should you use to start the installation? To answer, select the
appropriate options in the answer area.
Answer:
Q2. Your network contains a System Center 2012 Configuration Manager environment.
You need to create a report that lists all of the client computers that do not have an Application named App1 installed.
Which query should you use to create the report?
A. SELECT SYS.Netbios_Name0, ARP.DisplayName0 FROM v_R_System AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP. ResourceID WHERE ARP.DisplayName0 NOT IN ('App1')
B. SELECT SYS.Netbios_Name0 from v_R_System SYS WHERE SYS.ResourceID IN (SELECT SYS.ResourceID FROM v_R_System AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID - ARP.ResourceID. WHERE ARP.DisplayName0 = 'App1')
C. SELECT SYS.Netbios_Name0 from v_R_System SYS WHERE SYS.ResourceID NOT IN (SELECT SYS.ResourceID FROM v_R_System AS SYS INNER JOIN v_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID = ARP.ResourceID WHERE ARP.DisplayName0 = 'App1')
D. SELECT SYS.Netbios_Name0, ARP.DisplayName0 FROM v_R_System AS SYS INNER JOIN V_GS_ADD_REMOVE_PROGRAMS AS ARP ON SYS.ResourceID - ARP.ResourceID WHERE ARP.DisplayName0 NOT LIKE 'App1'
Answer: C
Explanation:
SELECT computer name FROM table v_R_System (SQL Syntax)
WHERE resource ResourceID is NOT IN
Add Remove Programs WHERE DisplayName0 = 'App1'
SQL INNER JOIN Keyword
The INNER JOIN keyword returns rows when there is at least one match in both tables.
Reference: http://www.w3schools.com/sql/sql_join_inner.asp
Q3. Your company uses System Center 2012 Configuration Manager to distribute operating system images. The standard operating system for client computers is Windows 7 Enterprise (x86).
You receive 300 new desktop computers. Each computer has a new storage controller.
When you attempt to deploy an existing image to one of the computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase.
You need to ensure that you can deploy Windows 7 to the new computers by using an image.
What should you do?
A. Import the storage drivers to the Drivers container and update the task sequence.
B. Create a new x64 boot image and configure the operating system image to use the x64 boot image.
C. Create a new driver package and update the task sequence.
D. Update the existing x86 boot image to include the storage drivers.
Answer: D
Explanation:
Planning a Device Driver Strategy in Configuration Manager You can add Windows device drivers that have been imported into the driver catalog to boot images. Use the following guidelines when you add device drivers to a boot image:
*
Add only mass storage and network adapter device drivers to boot images because other types of drivers are not generally required. Drivers that are not required increase the size of the boot image unnecessarily.
*
Add only device drivers for Windows 7 to a boot image because the required version of Windows PE is based on Windows 7.
*
Ensure that you use the correct device driver for the architecture of the boot image. Do not add an x86 device driver to an x64 boot image.
Reference: Planning a Device Driver Strategy in Configuration Manager
http://technet.microsoft.com/en-us/library/gg712674.aspx
Q4. Your network contains an Active Directory forest.
The forest contains a System Center 2012 Configuration Manager environment.
The environment contains one primary site.
You need to ensure that the members of a group named Group1 are allowed to deploy applications to desktop computers.
The solution must minimize the number of permissions assigned to Group1.
What should you do?
A. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
B. Add the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
C. Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.
D. Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.
Answer: C
Explanation: * Application Deployment Manager A security role that grants permissions to administrative users so that they can deploy and monitor applications.
Incorrect Not A, Not D: Application Administrator A security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role.
Reference: Glossary for Microsoft System Center 2012 Configuration Manager
http://technet.microsoft.com/en-us/library/hh524341.aspx
Q5. HOTSPOT
You deploy System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to a server named Server1.
Configuration Manager manages all of the client computers, including a computer named Client1.
A hardware inventory cycle is initiated on Client1.
You need to identify which Inventory classes were collected on Client1 and when the inventory was added to the site database.
Which log files should you review? To answer, select the appropriate options in the answer area.
Answer:
Q6. DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment. Three users named User1, User2, and User3 will perform the following tasks:
User1 will review software metering data and inventory reports.
User2 will deploy Applications and create alerts.
User3 will create configuration items.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer area. Each security role may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q7. Your network contains a single Active Directory domain.
The functional level of the domain is Server 2003. The domain contains the following servers:
Ten servers that run Windows Server 2003 Twenty servers that run Windows Server 2008 One server that has Microsoft Exchange Server 2007 installed One server that has System Center 2012 Configuration Manager installed
Users have mobile devices that run Windows Mobile 6.5 and Windows Phone 7.0.
You need to ensure that you can manage the settings of the mobile devices and perform remote device wipes by using Configuration Manager.
What should you do? (Chose all that apply)
A. Upgrade all of the Windows 2003 domain controllers to Windows 2008 R2.
B. Upgrade the Exchange server to Exchange Server 2010.
C. Configure an Exchange connector.
D. Change the functional level of the domain to Windows 2008.
E. Upgrade all of the domain controllers to Windows 2008 R2.
Answer: B,C
Explanation: Need to upgrade to Exchange Server 2010 and configure an Exchange connector.
Reference: Supported Configurations for Configuration Manager - Configuration Manager System
http://technet.microsoft.com/en-us/library/gg682077.aspx#BKMK_SupConfigMobileClientReq
Q8. Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients.
All of the client computers have Windows Firewall enabled.
Windows Firewall is configured to allow File and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center 2012 Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager client to an of the client computers.
Which client installation methods should you identify? (Choose all that Apply.)
A. a logon script installation
B. a manual client installation
C. a software update-based client installation
D. a Client Push Installation
E. an Active Directory Group Policy-based installation
Answer: C,D,E
Explanation:
C. Software update point uses the local SYSTEM account and All client computers are configured as WSUS clients. So the firewall should not affect functionality.
D: Client Push Installation requires File and Printer Sharing and runs with the local SYSTEM account.
E: Group Policy Installation requires File and Printer Sharing and runs with the local SYSTEM account.
Incorrect:
Not A: The Logon script runs with the user's credentials.
Not B: Manual installation also runs with the user's credentials.
Reference: http://technet.microsoft.com/en-us/library/gg682191.aspx
Q9. Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration Site named Site1 and a primary site named Site2.
You discover that none of the packages created on Site1 are displayed in Site2.
You need to identify whether there is a replication issue between the sites.
What should you review?
A. the Inventoryagent.log file
B. the Rcmctrl.log file
C. the Microsoft SQL Server replication diagnostic files
D. the Despool.log file
Answer: B
Explanation:
Technical Reference for Log Files in Configuration Manager - Site Server and Site System
Server Logs rcmctrl.log :
Site server log file
Records the activities of database replication between sites in the hierarchy.
Reference: http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_SiteSiteServerLog
Q10. You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You plan to create a Configuration Manager query.
You need to identify which components can be included in the WQL statement.
Which three components should you identify? Each correct answer presents a complete solution.
A. Criteria
B. Collection limiting
C. Security
D. Omit duplicate rows
E. Joins
Answer: A,D,E
Explanation: A: Example: (keyword where) SELECT * FROM SMS_R_System WHERE OperatingSystemNameAndVersion LIKE '%Workstation 6.1
D: Example (keyword distinct):
SELECT DISTINCT *
FROM SMS_R_System AS Sys
WHERE
Sys.SystemOUName = 'Contoso.Domain.local/OUName'
E: Example:
SELECT DISTINCT *
FROM SMS_R_System AS Sys
INNER JOIN SMS_G_System_ADD_REMOVE_PROGRAMS AS ARP ON
ARP.ResourceId = Sys.ResourceId
WHERE
ARP.DisplayName LIKE '%Visio%'
Reference: Example WQL Queries for Configuration Manager