[Free] Download New Latest (November) Microsoft 70-243 Actual Tests 61-70

Ensurepass

QUESTION 61

Hotspot Question

Your network contains a System Center 2012 Configuration Manager environment. You deploy an application to 1,000 client computers. You need to identify which client computers are in the process of installing the application. Which node should you select in the Configuration Manager console? To answer, select the appropriate node in the answer area.

 

clip_image002

 

Correct Answer:

clip_image004

Explanation:

 

clip_image006

 

 

QUESTION 62

Your network contains a System Center 2012 Configuration Manager environment. Software Inventory and Hardware Inventory are enabled for all client computers. All of the client computers have an application named App1 installed. App1 saves files to the C:Program FilesApp1 folder. All of the files saved by App1 have a file name extension of .xyz. You configure Software Inventory to inventory all of the files that have the .xyz extension and the .exe extension. After six months, you discover that some of the client computers fail to inventory .xyz files. All of the client computers inventory .exe files. You need to ensure that the .xyz files are inventoried. What should you do?

 

A.

Modify C:Program FilesApp1Skpswi.dat.

B.

Modify C:NO_SMS_On_Drive.sms.

C.

Delete C:Program FilesApp1Skpswi.dat.

D.

Delete C:NO_SMS_On_Drive.sms.

 

Correct Answer: C

Explanation:

http://www.msfaq.se/2009/12/controlling-software-inventory-skpswidat/

 

 

 

 

 

 

 

 

 

 

QUESTION 63

Your network contains a System Center 2012 Configuration Manager environment. You deploy the Configuration Manager client to all client computers. You enable Hardware Inventory and Software Inventory for all of the client computers. You discover that one of the client computers fails to report inventory data. You confirm that the inventory files are copied correctly to the site server. You discover, however, that the site server does not contain any data from the client computer. You need to identify what is causing the reporting issue. Which log file should you review?

 

A.

Dataldr.log

B.

Inventoryagent.log

C.

Mp_hinv.log

D.

Contenttransfermanager.log

 

Correct Answer: A

Explanation:

dataldr.log

Records information about the processing of Management Information Format (MIF) files and hardware inventory in the Configuration Manager database.

 

 

QUESTION 64

Your network contains a System Center 2012 Configuration Manager environment. The network contains 10 database servers that run Microsoft SQL Server 2008. You have a configuration baseline that is used to monitor the database servers. You confirm that all of the database servers downloaded the configuration baseline. You discover that a database server named Server1 fails to report any data for the configuration baseline. You need to identify whether Server1 evaluates the configuration items that are part of the configuration baseline. Which log file should you review?

 

A.

Ciagent.log

B.

Sitestat.log

C.

Ccm.log

D.

Rcmctrl.log

E.

Smsexec.log

F.

Dcmagent.log

G.

Hman.log

H.

Contenttransfermanager.log

I.

Sdmagent.log

J.

Wsyncmgr.log

K.

Locationservices.log

 

Correct Answer: F

Explanation:

http://technet.microsoft.com/en-us/library/hh427342.aspx

DCMAgent.log

Records high-level information about the evaluation, conflict reporting, and remediation of configuration items and applications.

 

 

 

 

 

 

QUESTION 65

Your network contains a System Center 2012 Configuration Manager environment. You add a software update point to the environment. You receive a message indicating that SMS WSUS Synchronization failed. You need to retrieve additional information about the message. Which log file should you review?

 

A.

Ciagent.log

B.

Contenttransfermanager.log

C.

Sdmagent.bg

D.

Dcmagent.log

E.

Locationservices.log

F.

Wsyncmgr.log

G.

Rcmctrl.log

H.

Ccm.log

I.

Sitestat.log

J.

Smsexec.log

K.

Hman.log

 

Correct Answer: F

Explanation:

http://technet.microsoft.com/en-us/library/hh427342.aspx

wsyncmgr.log

Records details about the software updates synchronization process

 

 

QUESTION 66

You enable Client Push. You run Active Directory System Discovery. You discover that some of the discovered computers do not have the System Center 2012 Configuration Manager client installed. You need to identify why Client Push fails on some of the client computers. Which log file should you review?

 

A.

Sdmagent.log

B.

Dcmagent.log

C.

Rcmctrl.log

D.

Smsexec.log

E.

Locationservices.log

F.

Contenttransfermanager.log

G.

Ccm.log

H.

Wsyncmgr.log

I.

sitestat.log

J.

Ciagent.log

K.

Hman.log

 

Correct Answer: G

Explanation:

http://technet.microsoft.com/en-us/library/hh427342.aspx

ccm.log

Records client push installation activities.

 

 

 

 

 

QUESTION 67

Drag and Drop Question

Your network contains a System Center 2012 Configuration Manager environment. Three users named User1, User2, and User3 will perform the following tasks:

 

– User1 will review software metering data and inventory reports.

– User2 will deploy applications and create alerts.

– User3 will deploy applications and create distribution point groups.

 

You need to identify which security role must be assigned to which user. What should you identify? To answer, drag the appropriate security role to the correct user in the answer area. Each security role may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.

 

clip_image007

 

Correct Answer:

 

clip_image009

 

Explanation:

Application Administrator

This security role:

Provides permissions included in both the Application Author and Application Deployment Manager roles.

Provides permissions to manage queries, read and modify site permissions, manage collections, and manage settings for user device affinity.

Application Deployment Manager

This security role provides permissions to:

View applications and manage deployments, alerts, templates, packages, and programs.

View collections and their members, status messages, queries, and conditional delivery rules.

Asset Manager

This security role provides permissions to manage hardware and software inventory, software metering, and the Asset Intelligence reporting classes.

 

 

 

QUESTION 68

Your network contains a System Center 2012 Configuration Manager environment. The hierarchy contains a Central Administration site named Site1 and a primary site named Site2. You discover that none of the collections created on Site1 are displayed on Site2. You need to identify whether there is replication issue between the sites. What should you review?

 

A.

the Colleval.log file.

B.

the Despool.log file

C.

the Rcmctrl.log file

D.

the Sender.log file

 

Correct Answer: C

Explanation:

despool.log

Records incoming site-to-site commun
ication transfers. rcmctrl.log Records the activities of database replication between sites in the hierarchy. sender.log Records the files that transfer by file-based replication between sites.

 

 

QUESTION 69

Your network contains a System Center 2012 Configuration Manger environment.

You wirte the following query:

 

select SYS.Name from SMS_R_System SYS

join SMS_G_System_ADD_REMOVE_PROGRAMS ARP

on ARP.ResourceID = SYS.ResourceId

 

You need to create a list of aall the client computers that have a version of Microsoft Office installed.

What should you add to the query?

 

A.

where ARP.DisplayName like “Microsoft Office*”

B.

where ARP.DisplayName = “Microsoft Office*”

C.

where ARP.DisplayName like “Microsoft Office%”

D.

where ARP.DisplayName = “%Microsoft Office”

 

Correct Answer: C

Explanation:

http://technet.microsoft.com/en-us/library/bb694123

For relational operators that perform LIKE comparisons (“is like” or “is not like”), you can use wildcard characters within the string. You can use the following wildcards.

Wildcard Description

%

Any string of zero or more characters

_ (underscore)

Any single character

[]

Any single character within the range or set (for example [a-f] or [abcdef]) [^]

Any single character not within the specified range (for example [^a-f] or [^abcdef])

 

 

 

 

 

 

QUESTION 70

You need to detect whether Office 2010 is installed before validating the configuration item. What should you do?

 

A.

Create a query-based collection.

B.

Create an automatic deployment rule.

C.

Enable Use Windows Installer detection.

D.

Create a report to display all installed software.

 

Correct Answer: C

Explanation:

* Here are the basic steps for adding a Windows Installer detection method:

1. From the Deployment Type Properties dialog, select the Detection Method tab, and click Add Clause .

2. Choose the appropriate setting type. In this case, select Windows Installer , and click the Browse button.

3. Navigate to the d
esired .msi file and select Open . The product code appears, as By default, the rule looks for only the product code.

4. Click OK to save the detection rule.

* Example:

 

clip_image011

 

Free VCE & PDF File for Microsoft 70-243 Actual Tests

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…