final Flashcards

1
Q

SCCM Review Questions

You have a deployment of System Center Configuration Manager (Current Branch). Your company opens a new office. All the client computers in the new office use IPv6 addresses only. The IPv6 address of one of the computers is 2001:3823:2c50:6a39:e976:b0eb:93f7:fb41. You need to configure an IPv6 boundary in Configuration Manager for the new office.
What should you use to configure the boundary?

2001:3823:2c50:6a39
::93f7:fb41
2001:3823::
e976:b0eb:93f7:fb41

A

2001:3823:2c50:6a39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have a deployment of System Center Configuration Manager (Current Branch). Your company has a main office and a branch office. The branch office has five users. Some users use laptops and some users use desktop computers.
All the servers for the company are located in the main office. The branch office connects to the main office by using a VPN over a DSL connection to the main office. You need to minimize the bandwidth used to deploy updates to branch office clients over the VPN connection. The solution must minimize costs.
What should you configure in the branch office?

A distribution point
A software update point
A secondary site server
A cloud-based distribution point

A

A secondary site server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You deploy the first System Center Configuration Manager primary site server to your organization. You need to create the first user collection. The collection must contain members from an Active Directory security group and must update automatically. Which two actions should you perform? Each correct answer presents part of the solution.
Create a user collection that has membership based on a direct rule.

Configure Active Directory Forest Discovery.

Create a user collection that has membership based on a query rule

Configure Active Directory Group Discovery.

Create a user collection that has membership based on an include collection rule.

A

Create a user collection that has membership based on a query rule

Configure Active Directory Group Discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You work for a company named ADatum Corporation. The ADatum network contains an Active Directory domain named adatum.com. You have a partner company named Contoso, Ltd. The Contoso network contains an Active Directory domain named adatum.com.

All the client computers at both companies run Windows 10. Each company has a deployment of System Center Configuration Manager (Current Branch). ADatum has sales and IT departments.

ADatum has a collection for each department. Contoso has research, marketing, and human resources (HR) departments. Contoso has a collection for each department.

ADatum purchases Contoso. You configure on-premises mobile device management (MDM) in adatum.com.

You enroll the client computers in the IT department into on-premises MDM (Mobile Device Management).

You configure hybrid MDM in contoso.com. You need to view a detailed hardware inventory of an IT department computer that is currently offline. Which tool should you use?

Resource Explorer
Device Manager
Microsoft Intune in the Microsoft Azure portal
The Microsoft Azure portal

A

Resource Explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You install the System Center Configuration Manager client on a computer. When you check the Configuration Manager console, the computer does not appear in the console. Other computers appear in the console.

You need to review the Configuration Manager logs for the computer. What should you use?
The cmtrace.exe command
The Configuration Manager console
The statview.exe command
The Event Viewer console

A

The cmtrace.exe command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have a deployment of System Center Configuration Manager (Current Branch). You have the collections shown in the following table:

Collection name members
Collection 1 Compiter1, Computer2, Computer3
Collection 2 Computer1, Computer4, Computer6
Collection 3 Computer2, Computer5, Computer7

You create a new collection that has the following configurations:

Collection name: Collection4
Limiting collection: Collection1
Include Collections rule: Collection2
Exclude Collections rule: Collection3

What will Collection4 contain?
Computer1, Computer2, and Computer3 only
Computer1, Computer4, and Computer6 only
Computer1 only
Computer1, Computer2, Computer3, Computer4, and Computer6

A

Computer1 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have a deployment of System Center Configuration Manager (Current Branch) that contains the servers shown in the following table.

Server name Site system role
Server1 Management Point
Server2 Distribution Point
Server3 Enrollement Point
Server4 Software Update point

You need to configure the environment to ensure that operating systems can be deployed by using operating system deployment.
On which server should you enable PXE support?
Server1
Server2
Server3
Server4

A

Server2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a deployment of System Center Configuration Manager (Current Branch).
Your company has two sites named Site01 and Site02.
Site02 has 200 client computers that run Windows 10 and a server named Server01. You add the Distribution point site system role to Server01. You need to ensure that only the client computers in Site02 can download content from Server01. What should you configure?
Security scopes
Security roles
Boundary groups
Boundary group relationships

A

Boundary groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

.
You have a deployment of System Center Configuration Manager (Current Branch). You have offices in Montreal and Seattle. You need to deploy software to the client computers in the Montreal office only. What should you do first?
Create an Active Directory container.
Create a user collection that contains the users in the Montreal office.
Configure a boundary group for client assignment.
Create a boundary for the Montreal office that uses IP subnets.

A

Create a boundary for the Montreal office that uses IP subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have a deployment of System Center Configuration Manager (Current Branch). You plan to implement hybrid mobile device management (MDM).Which cloud service should you provision?
Microsoft Operations Manager Suite (OMS)
Microsoft Store for Business
Microsoft Intune
Microsoft Azure

A

Microsoft Intune

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When deploying a stand-alone Configuration Manager site in a large organization, how can you support remote offices?
Option 1: Deploy secondary sites in the larger remote locations.
Option 2: Deploy additional primary sites in the larger remote locations
Option 3: Deploy management points and distribution points in the smaller remote locations.
Option 4: Deploy a central administration site in the headquarters location and a single site for all the remote locations
Option 5: Deploy a Service Connection point in each location to provide the local users with services.

A

Option 1: Deploy secondary sites in the larger remote locations.
Option 3: Deploy management points and distribution points in the smaller remote locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment. You are running a training exercise for ABC.com’s administrators. You are currently discussing Heartbeat Discovery. Which of the following is TRUE with regards to Heartbeat Discovery? (Choose all that apply.)
It is the only discovery method that provides details about the client installation status.
The client computer must be able to contact its assigned update point to send the Heartbeat Discovery record.
You are unable to manually initiate a Heartbeat Discovery cycle on a client.
You are able to manually initiate a Heartbeat Discovery cycle on a client.

A

It is the only discovery method that provides details about the client installation status.

You are able to manually initiate a Heartbeat Discovery cycle on a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of two active directory forests named eu.ABC.com and us.ABC.com. SystemCenter Configuration Manager has been deployed in the us.ABC.com forest.You have employed a logon script for deploying the Configuration Manager client to workstations in the us.ABC.com forest. You are then instructed to automaticallydeploy the Configuration Manager client to workstations in the eu.ABC.com forest. You start by configuring a Client Push Installation account, and enabling theClient Push installation option.Which of the following actions should you take NEXT?

You should consider enabling the Active Directory System Discovery option
You should consider enabling the Database Discovery option.
You should consider enabling the Site Discovery option.
You should consider enabling the Domain Discovery option.

A

You should consider enabling the Active Directory System Discovery option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com.ABC.com has a Windows Server Update Services (WSUS) server installed on their network, and have their workstations configured as WSUS clients. ABC.com’sworkstations are configured to have Windows Firewall enabled, with File and Printer Sharing blocked. ABC.com users do not have local Administrators rights ontheir workstations. After deploying System Center Configuration Manager in ABC.com’s environment, you want to deploy the Configuration Manager client toall ABC.com’s workstations. Which of the following is TRUE with regards to the deployment methods available for this situation?

You can use a logon script, a software update-based client, or an Active Directory Group Policy-based installation.
You can only use of a logon script, or a software update-based client installation
You can only use of a software update-based client, or an Active Directory Group Policybased installation
You can only use of a logon script installation.
You can only use of a software update-based client installation.
You can only use of an Active Directory Group Policy-based installation.

A

You can use a logon script, a software update-based client, or an Active Directory Group Policy-based installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You have configured the use hardware inventory in System Center Configuration Manager to collect data regarding the hardware configuration of clientdevices. You have selected the Enable hardware inventory on clients setting in client settings. Which of the following actions can you take to view the hardwareinventory data that System Center Configuration Manager collects? (Choose all that apply.)

You should consider making use of Resource Explorer.
You should consider viewing the Despool.log file.
You should consider create query-based collections.
You should consider viewing the Smsprov.log file.

A

You should consider making use of Resource Explorer.

You should consider create query-based collections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are running a training exercise for ABC.com’s administrators. You are currently discussing client settings that are configurable via the Configuration Managerconsole. Which of the following are client settings available for devices? (Choose all that apply.)
Computer Restart
Mobile Devices
Computer Agent
User and Device Affinity
Endpoint Protection

A

Computer Restart
Computer Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are running a training exercise for ABC.com’s administrators. You are currently discussing log files related to the different functions in Configuration Manager.Which of the following are log files that relate to reporting?
EPMgr.log
Ddm.log
AIUSMSI.log
Srsrp.log
Hman.log
SdmAgent.log
Smsshv.log

A

EPMgr.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager. All client workstations in ABC.com’s System Center Configuration Manager hierarchy include a newly developed custom hardwaredevice.You want to make sure that data regarding the newly developed custom hardware device is included in the Configuration Manager information.Which of the following actions should you take?

You should consider adding a WMI class to the Hardware inventory Classes list.
You should consider enabling the default WMI classes used by Configuration Manager.
You should consider creating an IDMIF file.
You should consider creating an NOIDMIF file.

A

You should consider adding a WMI class to the Hardware inventory Classes list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You want to determine the amount of copies of a certain software program have been deployed to ABC.com’s workstations. You also want find out if users are stillrunning a certain software program.You have to make use of the data from software inventory. You also have to make use of another feature in conjunction with the data from software inventory.Which of the following should you use?
You should consider making use of software metering.
You should consider making use of query rules.
You should consider making use of the Resource Monitor.
You should consider making use of the Performance Monitor.

A

You should consider making use of software metering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are running a training exercise for System Center Configuration Manager users. You are currently discussing the integration of Configuration Managerwith SQL Server Reporting Services. Which of the following are benefits of this integration? (Choose all that apply.)
It allows for the use of an industry standard reporting system to query the Configuration Manager database.
It displays reports via notepad.
It prevents subscriptions to reports.
It provides high performance, availability, and scalability

A

t provides high performance, availability, and scalability
It allows for the use of an industry standard reporting system to query the Configuration Manager database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are in the process of creating collections in System Center Configuration Manager. You want to make sure that you make use of a membership rule typethat gives you direct control over which resources are members of the collection.Which of the following is the option you should make use of?

You should consider making use of the Direct rule.
You should consider making use of the Include collection rule.
You should consider making use of the Query rule.
You should consider making use of the Exclude collection rule

A

You should consider making use of the Direct rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are in the process of running a training exercise for System Center Configuration Manager users. You are currently discussing the management functionof the Management point site system role.Which of the following options suitably describes the management function of the Management point site system role?

It contains source files for clients to download
It integrates with SQL Server Reporting Services to create and manage reports for Configuration Manager.
It provides policy and service location data to clients and receives configuration data from clients.
It runs Configuration Manager services.
It hosts the SQL Server database

A

It provides policy and service location data to clients and receives configuration data from clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You work as a network administrator at ABC.com. ABC.com network contains 1,500 client computers and 500 printers and makes use of System Center Configuration Manager. All the printers are associated with a System Center Configuration Manager client. However, detailed information about the printers donot appear in System Center Configuration Manager.How would you ensure that System Center Configuration Manager collects information about the printers?
You should consider adding an inventory class for the printers
You should consider creating NOIDMIF files for the printers.
You should consider creating IDMIF files for the printers.
You should consider creating Managed Object Format (MOF) files for the printers

A

You should consider adding an inventory class for the printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.The ABC.com environment has a primary site that includes a distribution point and a management point. You have been tasked with the devising a solution thatallows for workstations in ABC.com’s Sales department to communicate with the management point via HTTPS only. The solution should also allow for ABC.com’sother workstations to communicate with the management point via HTTP, while also keeping the amount of site systems to a minimum. Which of the followingactions should you take? (Choose two.)
You should consider installing a new management point and configuring it to always use HTTPS.
You should consider creating a Central Administration site
You should consider configuring the Sales department workstations to always use HTTPS
You should consider making HTTPS the default communication protocol for the site.

A

You should consider installing a new management point and configuring it to always use HTTPS.

You should consider configuring the Sales department workstations to always use HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You have been instructed to create a collection named after ABC.com’s Sales department. You want to produce a list of the desktop settings of users in the Sales department. Which of the following actions should you take first?
You should consider deploying the custom client device setting to the collection.
You should consider creating a custom client device setting.
You should consider creating a custom client administrator setting.
You should consider deploying the custom client administrator setting to the collection.

A

You should consider creating a custom client device setting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You have been instructed to deploy a newly developed application. You have to make sure that the new application can only be installed on workstations that meetspecified hardware and software conditions.Which of the following actions should you take?
You should consider creating a new global condition.
You should consider creating a suitable requirement rule.
You should consider creating custom client agent settings
You should consider creating custom client administrator settings

A

You should consider creating a suitable requirement rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.Users in ABC.com’s Research department are assigned to workstations within that department.The workstations are configured as primary devices for these users. The Research department users can, however, log on to workstations in other departments.You have been instructed to deploy a newly developed application. You have to make sure that the new application is only available to Research department userswhen they are logged on to their assigned workstations.
Which of the following actions should you take?
You should consider creating a requirement rule, and setting the Primary Device option to False
You should consider creating a requirement rule, and setting the Primary Device option to True.
You should consider creating a user requirement rule.
You should consider creating a new global condition

A

You should consider creating a requirement rule, and setting the Primary Device option to True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.Subsequent to deploying a new application, named ABCApp13, to numerous ABC.com client workstations, you decide to keep an eye on which workstations arecurrently installing ABCApp13.Which of the following actions should you take?
You should consider accessing the System Status node of the Configuration Manager console.
You should consider accessing the Deployments node of the Configuration Manager console.
You should consider accessing the Client Status node of the Configuration Manager console.
You should consider accessing the Distribution Status node of the Configuration Manager console

A

You should consider accessing the Deployments node of the Configuration Manager console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are currently analyzing the ccm.log file.Which of the following activities are recorded in this log?
Client push installation activities.
Configuration Manager client status evaluation activities that are initiated by the evaluation scheduled task.
Activities of the client and the SMS Agent Host service.
Activities related to the maintenance and capture of data related to client performance counters.

A

Client push installation activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.ABC.com’s hierarchy includes a Central Administration site and a primary site. You are currently analyzing the ddm.log files. Which of the following describes a reason for this?
To view files that transfer via file-based replication between sites
To view details about site-to-site job and package replication.
To view the activities of the discovery data manager.
To view the replication of files between the site server components and the Scheduler component.

A

To view the activities of the discovery data manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Your company uses System Center Configuration Manager to deploy applications.
The company purchases a new application named App1. App1 can be installed only on client computers that run Windows 7.
You need to ensure that App1 is installed only on Windows 7 computers that have at least 2 Gb of memory and 300 Gb of free disk space.
What should you create?
A Query object
A custom client user settings
A configuration baseline
A query-based collection

A

A query-based collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Your network contains a Windows Server Update Services (WSUS) server. All client computers are configured as WSUS clients.
All of the client computers have Windows Firewall enabled. Windows Firewall is configured to allow File and Printer Sharing.
Users are not configured as local Administrators on their client computers.
You deploy System Center Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager client to an of the client computers.
Which client installation methods should you identify? (Choose all that Apply.)

A logon script installation
A manual client installation
A software update-based client installation
A Client Push Installation
An Active Directory Group Policy-based installation

A

A software update-based client installation
A Client Push Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Your network contains a single Active Directory domain.
You plan to deploy System Center Configuration Manager.
The hierarchy will have a Central Administration Site and five Primary Sites.
You need to ensure that you can target user groups for software distribution.
The solution must minimize network traffic.
Which Configuration Manager discovery method should you use?
Active Directory User Discovery and Active Directory Group Discovery on the primary sites
Active Directory User Discovery and Active Directory Group Discovery on the Central Administration site
Active Directory User Discovery on the Central Administration site and Active Directory Group Discovery on the primary sites
Active Directory User Discovery on the primary sites and Active Directory Group Discovery on every site

A

Active Directory User Discovery and Active Directory Group Discovery on the primary sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Your network contains a System Center Configuration Manager environment.
You deploy the Configuration Manager client to all client computers.
You enable Hardware Inventory and Software Inventory for all of the client computers.
You discover that one of the client computers fails to report inventory data.
You confirm that the inventory files are copied correctly to the site server. You discover, however, that the site server does not contain any data from the client computer.
You need to identify what is causing the reporting issue.
Which log file should you review?
Dataldr.log
Mp_hinv.log
Inventoryagent.log
Contenttransfermanager.log

A

Dataldr.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Your network contains a System Center Configuration Manager environment.
Your company develops a custom hardware device and installs the device on all of the client computers in the research department.
You discover that information about the device fails to appear in any inventory queries or reports.
Information about other hardware devices appears in the inventory queries and reports.
You need to ensure that Configuration Manager data include information about the custom hardware device.
What should you do?

Enable a default WMI class in the Hardware Inventory Classes list.
Modify the Enable hardware inventory on clients setting.
Add a WMI class to the Hardware inventory Classes list.
Add a file name to the Software Inventory configuration
Select Collect NOIDMIF files in Hardware Inventory.
Add a file name to the Hardware inventory configuration.
Add a file name to Software Metering.
Add a WMI class to the Sms_def.mof file.

Modify the Enable software inventory on clients setting.

A

Add a WMI class to the Hardware inventory Classes list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Your network contains a System Center Configuration Manager environment.
Your company deploys a custom Application to 2,000 client computers by using Configuration Manager.
The Application is not listed in Add Remove Programs.
You discover that information about the Application fails to appear in the inventory queries and inventory reports.
You verify that information about other Applications appear in the inventory reports.
You need to ensure that Configuration Manager data includes installation information about the custom Application.
What should you do?
Enable a default WMI class in the Hardware Inventory Classes list.
Modify the Enable hardware inventory on clients setting.
Add a WMI class to the Hardware inventory Classes list.
Add a file name to the Software Inventory configuration
Select Collect NOIDMIF files in Hardware Inventory.
Add a file name to the Hardware inventory configuration.
Add a file name to Software Metering.
Add a WMI class to the Sms_def.mof file.

Modify the Enable software inventory on clients setting.

A

Add a file name to Software Metering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Your network contains a System Center Configuration Manager environment.
You need to change the organization name displayed by Configuration Manager.
Which settings should you modify from the Configuration Manager console?
Software inventory
Computer Agent
User and Device Affinity
Compliance Settings

A

Computer Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Your network contains a System Center Configuration Manager environment.
You create two custom client agent settings named ClientSettings1 and ClientSettings2. You apply ClientSettings1 to all of the client computers in the sales department. You apply ClientSettings2 to all of the client computers in the marketing department.
The client computers in the marketing department contain several custom registry settings.
You need to collect the custom registry settings from the marketing department computers.
What should you do?

Edit the default client agent settings and include the custom registry information
Edit ClientSettings2 and exclude the custom registry information
Create a new set of custom client agent settings for the marketing department and include the custom registry information.
Edit ClientSettings2 and include the custom registry information.

A

Edit ClientSettings2 and include the custom registry information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Your network contains two Active Directory forests named contoso.com and litwareinc.com.
You implement System Center Configuration Manager in the contoso.com forest.
You deploy the Configuration Manager client to all of the client computers in contoso.com by using a logon script.
You need to ensure that the Configuration Manager client is automatically deployed to all of the client computers in the litwareinc.com forest.
What should you do? (Choose all that Apply.)
Configure a Client Push Installation account.
Enable Client Push installation
Enable Active Directory System Discovery.
Configure an administrative user.
Enable Active Directory Forest Discovery

A

Enable Active Directory Forest Discovery
Configure a Client Push Installation account.
Enable Client Push installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Your network contains a System Center Configuration Manager Service Pack 1 (SP1) environment.
You have a sales department that contains 500 employees, 20 of whom are sales managers. Each sales department employee has a desktop computer that is configured as their primary device.
The sales managers frequently log on to computers in the marketing department.
You plan to deploy a new sales application named App1.
You need to ensure that App1 is only available to the sales department employees when they log on to their primary device.
What should you do?
In a requirement rule, set OrganizationUnit = Sales
In Client Settings, set Allow user to define their primary devices to False.
In a requirement rule, set Primary Device = True.
In Client Settings, set Allow user to define their primary devices to True.

A

In a requirement rule, set Primary Device = True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Your network contains a single Active Directory domain named contoso.com.
System Center Configuration Manager Service is deployed to contoso.com.
You need to inventory the installed software on Windows Phone and iOS devices.
What should you do first?
Configure Software Inventory.
Add a Microsoft Intune subscription
Configure Network Discovery.

Install the Configuration Manager client.
Enroll the mobile devices.

A

Configure Software Inventory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

You have a System Center Configuration Manager deployment that contains 8,000 client computers.
When a custom application named App1.exe is installed on a computer, a registry value of App1=TRUE is added to the registry. App1 is installed on approximately half of the computers.
You need to recommend a solution for creating a collection named Collection1 that contains only computers on which App1.exe is installed. The solution must minimize administrative effort.
What should you include in the recommendation?
A collection that has a query-based membership rule
A configuration item
A custom client device settings
A software category

A

A collection that has a query-based membership rule

43
Q

Your company has 120,000 client computers.
You plan to deploy System Center Configuration Manager to the computers.
You need to install Configuration Manager by using the fewest number of sites possible.
Which site configuration should you use?
Two individual stand-alone primary sites
A single primary site and four secondary sites
A stand-alone primary site
A Central Administration site and two primary sites

A

A stand-alone primary site

44
Q

When you use the features of Microsoft System Center Configuration Manager (Configuration Manager), you can perform complex management tasks, including which from the following tasks:
Hardware and software inventory.
Application management.
Operating system deployment.
Software update management.
Protection from malware
Messaging management

Internet connexion management
Voice over IP management

A

Hardware and software inventory.
Application management.
Operating system deployment.
Software update management.
Protection from malware

45
Q

Configuration Manager supports the management of devices beyond a perimeter firewall through integration with:
Windows Intune
SQL Server 201X
Windows Server Update Services
Internet information Services (IIS)

A

Windows Intune

46
Q

What is the purpose of Central Administration Site (CAS)?

It is at the top of the hierarchy, and you can use it for generating reports and administration.
You use CAS site to manage client systems. All client systems are assigned to a CAS.
You can use CAS to control bandwidth usage between physical locations
Client systems can report information to, and retrieve information from a CAS

A

It is at the top of the hierarchy, and you can use it for generating reports and administration

47
Q

In the Configuration manager Console, whre are located the actions that you can perform on the currently selected object?
In the ribbon section
In the workspaces section
In the results pane section
In the navigation pane

A

In the ribbon section

48
Q

You want to see devices that have been discovered by Active Diretory systems dicovery method. In which workspace of the Configuration manager cosnole are they displayed?
Assets and compliance
Administration
Monitoring
Software Library

A

Assets and compliance

49
Q

Where would you find the node for managing collections?
Collections are contained in the Assets and Compliance workspace
Collections are contained in Administration workspace
Collections are contained in the monitoring workspace
Collections are contained in the Software and libraries workspace

A

Collections are contained in the Assets and Compliance workspace

50
Q

Why should you not disable Heartbeat Discovery?
Heartbeat Discovery ensures that resource records do not age out of the Configuration Manager database accidentally.
Heartbeat Discovery is enabled by default and cannot be disabled
Heartbeat Discovery is required for the other discovery methods to work
Heartbeat Discovery gives you the status of the configuration manager server in real time

A

Heartbeat Discovery ensures that resource records do not age out of the Configuration Manager database accidentally.

51
Q

You notice that the All User Groups built-in collection lists no members, even though you want this collection to be populated. What should you do?
Verify that you have enabled and run the Active Directory Group Discovery method.
Verify that you have enabled and run the Active Directory user Discovery method.
Verify that you have enabled and run the Active Directory heartbeat Discovery method
Verify that you have enabled and run the Active Directory System Discovery method

A

Verify that you have enabled and run the Active Directory Group Discovery method.

52
Q

Which discovery method will create IP subnet boundaries automatically when it discovers them?
Active Directory Forest Discovery will create IP subnet boundaries automatically when it discovers them
Netowrk Discovery will create IP subnet boundaries automatically when it discovers them
Active Directory System Discovery will create IP subnet boundaries automatically when it discovers them
Active Directory Site Discovery will create IP subnet boundaries automatically when it discovers them

A

Active Directory Forest Discovery will create IP subnet boundaries automatically when it discovers them

53
Q

You have created a boundary group and have added several boundaries. However, you notice that clients within the boundaries are not being installed. What should you do?
You have to configure the boundary group to provide site assignment by selecting the Use this boundary group for site assignment check box.
You have to configure each boundary to provide site assignment by selecting the Use this boundary for site assignment check box.
You have to configure the heartbeat discovery method for automatic site assignment.
You have to assign the boundary group manually to the site
You have to assign the boundary group manually to the site

A

You have to configure the boundary group to provide site assignment by selecting the Use this boundary group for site assignment check box.

54
Q

You need to create a collection that includes a static list of members. Which rule type should you use?
You should use the Direct rule to create a static list of members in a collection.
You should use the Query based rule to create a static list of members in a collection.
You should use the Include rule to create a static list of members in a collection.
You should use the Exclude rule to create a static list of members in a collection.

A

You should use the Direct rule to create a static list of members in a collection

55
Q

Which executable determines the location of the source files, and downloads them to begin the installation process for the Configuration Manager client agent?
CCMSetup.exe determines the location of the source files, and downloads them for use when installing the Configuration Manager client agent.
CCMSetup.msi determines the location of the source files, and downloads them for use when installing the Configuration Manager client agent.
CCMSetup.cab determines the location of the source files, and downloads them for use when installing the Configuration Manager client agent.
msiexec.exe determines the location of the source files, and downloads them for use when installing the Configuration Manager client agent.

A

CCMSetup.exe determines the location of the source files, and downloads them for use when installing the Configuration Manager client agent.

56
Q

What rights does the client push-installation account require?
It requires administrative rights on the machine on which the installation is running.
It requires account operators rights on the machine on which the installation is running.
No special rights are required on the machine on which the installation is running.
It requires a user to be looged on the machine on which the installation is running.

A

It requires administrative rights on the machine on which the installation is running.

57
Q

You have modified the inventory schedule for both hardware and software inventory. If you want to force the change to a specific client, which action must you initiate from the Configuration Manager Control Panel application on the client?
You must initiate Machine Policy Retrieval & Evaluation Cycle.
You must initiate Machine PolicySoftware update Retrieval & Evaluation Cycle.
You must restart the computer.
You must initiate Application Retrieval & Evaluation Cycle

A

You must initiate Machine Policy Retrieval & Evaluation Cycle.

58
Q

Which tool can you use to view hardware and software inventory results for a single computer?
You can use Resource Explorer to view hardware and software inventory results.
You can use CMTrace.exe to view hardware and software inventory results.
You can use computer management to view hardware and software inventory results.
You can use reports to view hardware and software inventory results.
You can use client push to view hardware and software inventory results.

A

You can use Resource Explorer to view hardware and software inventory results.

You can use reports to view hardware and software inventory results.

59
Q

How can you determine whether hardware has changed on a managed computer?
Hardware history will display any changes to inventory that a specific client has reported.
Software history will display any changes to inventory that a specific client has reported
System restore will display any changes to inventory that a specific client has reported.
SQL reporting services will display any changes to inventory that a specific client has reported.

A

Hardware history will display any changes to inventory that a specific client has reported.

60
Q

You have enabled software metering and have just deployed a new application throughout your network. By default, what will trigger the automatic creation of a disabled software-metering rule?
The software-metering rule is created when the application is present in the inventory data of 10 percent of computers.
The software-metering rule is created when the application is present in the inventory data of 90 percent of computers.
The software-metering rule is created when the application is present in the inventory data of 50 percent of computers.
The software-metering rule is created when the application is present in the
inventory data on any computer.

A

The software-metering rule is created when the application is present in the inventory data of 10 percent of computers.

61
Q

What are some of the differences between an application and a package?
An application uses deployment types instead of programs.
You can define supersedence relationships in an application.
You can add more user-searchable information to an application.
You can define supersedence relationships in a package.
You can add more user-searchable information to a package

A

An application uses deployment types instead of programs.
You can define supersedence relationships in an application.
You can add more user-searchable information to an application.

62
Q

What is a detection method?

Detection methods enable the deployment process to determine whether an application is present in a system
Detection methods enable the deployment process to determine whether an a system qualify for the application deployment
Detection methods enable the deployment process to determine whether an application or a package is more suitable for a system.
Detection methods enable the deployment process to determine wether an application meets the requirements in a system

A

Detection methods enable the deployment process to determine whether an application is present in a system

63
Q

You can assign client devices either to a secondary site or to a central administration site.
True
False

A

False

64
Q

Which of the following tasks could you use Configuration Manager Inventory for?

Locate systems with particular software installed
Find all systems with specific hardware that you are planning on retiring.
Assist an investigation by finding the dates, times, and systems that a user has signed in to.
Deploy a software upgrade.
Remote-control a device and assist a user with an issue

A

Deploy a software upgrade

Locate systems with particular software installed
Find all systems with specific hardware that you are planning on retiring.

65
Q

Which of the following types of information can be collected through a Hardware Inventory?

Information about the operating system.
Information about the battery on a laptop.
Information about BitLocker status
A list of installed applications.
Information about a user’s desktop configuration.

A

Information about the operating system.
Information about the battery on a laptop.
Information about BitLocker status
A list of installed applications.
Information about a user’s desktop configuration.

66
Q

You need to ensure that a deployed application only goes to users who request that application. When you are creating the application in Configuration Manager, what steps should you take to accomplish this?
On the General page of the Deploy Software Wizard, select the specific user collection that applies to the users you want the application to go to.
On the User Experience page of the Deploy Software Wizard, clear the Commit changes at deadline or during a maintenance window (requires restart) check box.
On the Content page of the Deploy Software Wizard, specify the distribution point for the specific subset of users you want the application to go to.
On the Deployment Settings page of the Deploy Software Wizard, select the Require administrator approval if users request this application check box.
On the Deployment Settings page of the Deploy Software Wizard, in the Purpose dropdown box, click Required.

A

On the Deployment Settings page of the Deploy Software Wizard, select the Require administrator approval if users request this application check box.

67
Q

You have an Application named Test1. You need to ensure that users in the finance department can install Test1 by using the Application Catalog. What should you do?
Create a required user deployment and target deployment to all of the finance department users.
Create a required user deployment and target the deployment to all client computers in the finance department.
Create an available user deployment and target the deployment to all of the finance department users.
Create an available user deployment and target the deployment to all client computers in the finance department.

A

Create an available user deployment and target the deployment to all of the finance department users.

68
Q

After deploying a new application, named test1, to numerous client workstations, you decide to keep an eye on which workstations are currently installing test1. Which of the following actions should you take?

Access the System Status node of the Configuration Manager console.
Consider accessing the Deployments node of the Configuration Manager console
Access the Client Status node of the Configuration Manager console.
Access the Distribution Status node of the Configuration Manager console.

A

Consider accessing the Deployments node of the Configuration Manager console

69
Q

What from the following can be used as a detection Method for apllication deployement?

A file
A registry key
Windows Installer Product Code
The application language
The application version

A

A file
A registry key
Windows Installer Product Code

70
Q

What is use of Global Condition?
Global conditions are conditions used by requirement rules
Global conditions are conditions used by Collections
Global conditions are conditions used by hardware Inventory
Global conditions are conditions used by software Inventory

A

Global conditions are conditions used by requirement rules

71
Q

You have a deployment of System Center Configuration Manager. You configure discovery. You have a query that returns all devices without the Configuration Manager client installed. You create a collection that based on the query.
You need to deploy the Configuration Manager client only to the members of the collection.
Which deployment method should you use?
a package deployment
a software update point-based installation
a manual client push installation
a Group Policy installation

A

a manual client push installation

72
Q

Your company manages all its desktop computers by using System Center Configuration Manager.
You need to collect software usage data from all the computers. The solution must ensure that all the software usage data is sent to Configuration Manager daily.
Which two actions should you perform? Each correct answer presents part of the solution
Deploy the script to the All Systems collection
Create a software metering rule.
Deploy a Group Policy object (GPO) that contains the script.
Create a script that contains the commercial ID for Windows Analytics.
Modify the Client Settings

A

Create a software metering rule.
Modify the Client Settings

73
Q

You enable Client Push.
You run Active Directory System Discovery.
You discover that some of the discovered computers do not have the System Center Configuration Manager client installed.
You need to identify why Client Push fails on some of the client computers.
Which log file should you review?
Locationservices.log
Smsexec.log
Ccm.log
Ccmsetup.exe
Ddr.log
Wsyncmgr.log

A

Ccm.log

74
Q

You have a deployment of System Center Configuration Manager.
Configuration Manager includes the administrative users shown in the following table:

User name Security role Security scope
User1 Infrastructure Administrator Default, Scope1
User2 Operating System Deployment Manager Scope1
User3 Full Administrator Default, Scope1
User4 Endpoint Protection Manager Scope1
User5 Asset Manager Default
User6 Operations Administrator Scope1
User7 Operations Administrator Default
User8 Operating System Deployment Manager Default, Scope1

You add a capture image named Capture1 to Configuration Manager. You set the security scope of Capture1 to Scope1. Which users can create a task sequence that uses Capture1?

User1
User2
User3
User4
User5
User6
User7
User8

A

User2
User3
User8

75
Q

You have a deployment of System Center Configuration Manager that contains a single primary site. A server named MP01 is the only management point in the site. A server named DP01 is the only distribution point in the site.
You need to ensure that you can deploy operating systems over the network to bare-metal computers.
Which two actions should you perform? Each correct answer presents part of the solution.

Enable Wake On Lan in the firmware of the client computers
Integrate the Microsoft Deployment Toolkit (MDT) and Configuration Manager
Configure unknown computer support on DP01
Configure DP01 to accept PXE requests.
Add the State migration point site system role to DP01
Configure unknown computer support on MP01
Configure MP01 to accept PXE requests.

A

Configure unknown computer support on DP01
Configure DP01 to accept PXE requests.

76
Q

You have a deployment of System Center Configuration Manager. You configure the Backup Site Server maintenance task to back up Configuration Manager to a local folder.
You need to create a script to restart the Configuration Manager server after the backup completes. How should you create the script?

Create a script file named AfterBackup.bat and save it in the script file location program Files\Microsoft Configuration Manager\inboxes\smsbkup.box
Create a script file named AfterBackup.bat and save it in the script file location program Files\Microsoft Configuration Manager\inboxes\scripts
Create a script file named AfterBackup.bat and save it in the script file location program Files\Microsoft Configuration Manager\inboxes\scheduele.box
Create a script file named AfterBackup.bat and save it in the script file location program Files\Microsoft Configuration Manager\inboxes\backups

A

Create a script file named AfterBackup.bat and save it in the script file location program Files\Microsoft Configuration Manager\inboxes\smsbkup.box

77
Q

You have a deployment of System Center Configuration Manager. You need to ensure that help desk users can use the Configuration Manager console to remotely control Configuration Manager clients.
Which two actions should you perform? Each correct answer presents part of the solution

Add the help desk users to the local Administrators group on each client computer
Enable Remote Desktop on the client computers.
Configure a client settings policy.
Allow connections to TCP port 3389 on the client computers.
Allow connections to TCP port 2701 on the client computers.

A

Configure a client settings policy.
Allow connections to TCP port 2701 on the client computers.

78
Q

Your network contains an Active Directory forest named adatum.com. The forest has a deployment of System Center Configuration Manager.
You create two users named User1 and User2 in adatum.com.
You plan to delegate the following tasks:
-> User1 must be able to view collections and their members.
-> User2 must be able to import driver packages.
You need to add User1 and User2 to security roles. The solution must use the principle of least privilege.
To which security role should you add each user?

User1: Application Deployment Manager
User1: Asset Manager
User1: Company Resource Access Manager
User1: Compliance Settings Manager
User1: Operations Administrator
target Operating System Deployment Manager
User1 and user2: Application Deployment Manager
User2: Asset Manage
User1 and User2: Company Resource Access Manager
User2: Compliance Settings Manager

A

User1: Application Deployment Manager
target Operating System Deployment Manager

79
Q

You are adminitering a System Center Configuration Manager environment with a single primary site.
Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bit version of Windows 7.
Some client computers have the Microsoft Application Virtualization (App-V) client installed.
You have an Application named App1.
You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1.
You need to deploy the Application to all of the client computers.
The solution must minimize the amount of administrative effort.
What should you do?

Create a new Application that has three different deployment types and create a target collection for each of the deployment types
Create a new Application that has three different deployment types and configure global conditions for each of the deployment types.
Create a new package for each version of App1.
Create a new Application for each version of App1.

A

Create a new Application that has three different deployment types and configure global conditions for each of the deployment types.

80
Q

Your network contains a System Center Configuration Manager environment.
You have created an application named App and you need to ensure that users in the finance department can install App1 by using the Application Catalog or software center.
What should you do?

Create a required user deployment and target the deployment to all of the finance department users.
Create a required user deployment and target the deployment to all of the client computers in the finance department.
Create an available user deployment and target the deployment to all of the finance department users.
Create available user deployment and target the deployment to all of the client computers in the finance department.

A

Create an available user deployment and target the deployment to all of the finance department users.

81
Q

Your network contains a System Center Configuration Manager environment.
Two weeks ago, you deployed a Windows Installer package named App1.
You need to remediate a registry value that applies only to the client computers that have App1 installed. The solution must minimize network traffic.
What should you do?

Modify the App1 Windows Installer package to contain the registry setting, and then create a new application for App1.
Modify the App1 Windows Installer package to contain the registry setting, and then configure the existing application for App1 to use the new Windows Installer package.
Create an application-based configuration item, configure a rulefor an existential type, and then import the registry setting from a client computer that has App1 installed.
Create an application-based configuration item, configure the detection method to use the Windows Installer product code of App1, and then import the registry setting from a client computer that has App1 installed.

A

Create an application-based configuration item, configure the detection method to use the Windows Installer product code of App1, and then import the registry setting from a client computer that has App1 installed.

82
Q

Your network contains an Active Directory forest named adatum.com. The forest has a deployment of System Center Configuration Manager.
You create two users named User1 and User2 in adatum.com.
You plan to delegate the following tasks:
-> User1 must be able to view collections and their members.
-> User2 must be able to import driver packages.
You need to add User1 and User2 to security roles. The solution must use the principle of least privilege.
To which security role should you add each user?

User1: Application Deployment Manager
User1: Asset Manager
User1: Company Resource Access Manager
User1: Compliance Settings Manager
User1: Operations Administrator
target Operating System Deployment Manager
User1 and user2: Application Deployment Manager
User2: Asset Manage
User1 and User2: Company Resource Access Manager
User2: Compliance Settings Manager

A

User1: Application Deployment Manager
target Operating System Deployment Manager

83
Q

You are adminitering a System Center Configuration Manager environment with a single primary site.
Your network contains a client computer that runs the 64-bit version of Windows 7 and the 32-bit version of Windows 7.
Some client computers have the Microsoft Application Virtualization (App-V) client installed.
You have an Application named App1.
You have a 64-bit version of App1, a 32-bit version of App1, and a virtual version of App1.
You need to deploy the Application to all of the client computers.
The solution must minimize the amount of administrative effort.
What should you do?

Create a new Application that has three different deployment types and create a target collection for each of the deployment types
Create a new Application that has three different deployment types and configure global conditions for each of the deployment types.
Create a new package for each version of App1.
Create a new Application for each version of App1.

A

Create a new Application that has three different deployment types and configure global conditions for each of the deployment types.

84
Q

Your network contains a System Center Configuration Manager environment.
You have created an application named App and you need to ensure that users in the finance department can install App1 by using the Application Catalog or software center.
What should you do?

Create a required user deployment and target the deployment to all of the finance department users.
Create a required user deployment and target the deployment to all of the client computers in the finance department.
Create an available user deployment and target the deployment to all of the finance department users.
Create available user deployment and target the deployment to all of the client computers in the finance department.

A

Create an application-based configuration item, configure the detection method to use the Windows Installer product code of App1, and then import the registry setting from a client computer that has App1 installed.

85
Q

Your network contains an Active Directory forest. The forest contains a System Center Configuration Manager environment. The environment contains one primary site.
You need to ensure that the members of a group named Group1 are allowed to deploy applications to desktop computers.
The solution must minimize the number of permissions assigned to Group1.
What should you do?

Assign the Application Administrator security roleto Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
Add the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.
Assign the Application Administrator security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.

A

Assign the Application Deployment Manager security role to Group1. Create a new collection that contains all of the desktop computers. Scope Group1 to the new collection.

86
Q

Your network contains a System Center Configuration Manager environment.
The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server . Server2 contains the
Configuration Manager database. Server2 fails.
You install SQL Server on a new server. You name the server Server3.
You need to restore the Configuration Manager database to the new server.
What should you do?

From Server1, run the Configuration Manager Setup Wizard.
From Server2, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.
From Server2, run Microsoft SQL Server Management Studio, and then restore the backed up SQL Server database andlog files.
From Server1, run the Site Repair Wizard.

A

From Server1, run the Configuration Manager Setup Wizard.

87
Q

Your company uses System Center Configuration Manager with Microsoft Forefront Endpoint Protection integration.
You deploy Forefront Endpoint Protection to all client computers.
The company uses a management Application named App1.
You discover that Forefront Endpoint Protection blocks App1.
You need to ensure that App1 can run.
How should you configure the Default Client Malware Policy?

Create a software restriction policy.
Add a process exclusion.
Add a file location exclusion.
Modify the schedule scan settings.
Click the Use behavior monitoring check box

A

Add a process exclusion.
Add a file location exclusion.

88
Q

Your network contains a System Center Configuration Manager environment.
The Configuration Manager databases are located on a remote server that runs Microsoft SQL Server. You need to ensure that you can restore the Central Administration site.
What should you do?

From the Configuration Manager console, enable the Backup Site Server maintenance task and set a schedule
From Microsoft SQL Server Management Studio, create a maintenance plan for the site databases.

From Task Scheduler, create a scheduled task that runs smssqlbkup.exe.
From Windows Server Backup, schedule a full system backup.

A

From the Configuration Manager console, enable the Backup Site Server maintenance task and set a schedule

89
Q

Your company uses System Center Configuration Manager to distribute operating system images. You receive 300 new desktop computers. All of the client computers have the same hardware configuration.
When you attempt to deploy a Windows 10 image to one of the client computers, you receive an error message indicating that a storage device cannot be found during the pre-boot deployment phase.
You need to ensure that you can deploy Windows 10 to the new computers by using an image.
What should you do?

Update the existing boot image to include the storage drivers
Clear the contents of the Drivers container and update the task sequence.
Import the storage drivers to the Drivers container and update the task sequence.
Create a new driver package and update the task sequence.

A

Update the existing boot image to include the storage drivers

90
Q

Your company has a main office and a branch office. You have a deployment of System Center Configuration Manager.
The main office has a software update point. Currently, all client computers receive Microsoft updates from the main office.
You need to ensure that the computers in the branch office receive updates from a local server. The solution must meet the following requirements:
-> Ensure that the updates are managed by using Configuration Manager.
-> Ensure that the computers in the branch office scan for updates against a local catalog.
What should you deploy to the branch office?

A software update point, a service connection point, and an Application Catalog website point
A software update point, a distribution point, and a reporting services point
Windows Server Update Services (WSUS), a service connection point, and a management point
Windows Server Update Services (WSUS), a software update point, and a distribution point

A

Windows Server Update Services (WSUS), a software update point, and a distribution point

91
Q

Your network contains a System Center Configuration Manager environment.
The Client Status node in the Configuration Manager console shows a downward trend in client health. You verify the logs on several clients.
You discover that the clients are healthy and are communicating normally to management points.
You need to identify the reasons why the Configuration Manager console displays a downward trend in client health.
Which reasons should you identify?

In Client Status Settings Properties, the Heartbeat discovery during the following days interval is shorter than the Heartbeat Discovery interval
The age set in the DeleteAged Discovery Data maintenance task is shorter than the Heartbeat Discovery interval.
The Delete Obsolete Client Discovery Data maintenance task is disabled.
The Active Directory sites that are members of boundary groups are modified.
Microsoft SQL Server replication to the management points stopped.

A

The age set in the DeleteAged Discovery Data maintenance task is shorter than the Heartbeat Discovery interval.
The Delete Obsolete Client Discovery Data maintenance task is disabled

92
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.
You are running a training exercise for ABC.com’s administrators. You are currently discussing the use of Endpoint Protection in Configuration Manager.
Which of the following are TURE with regards to making use of Endpoint Protection in Configuration Manager?

You are allowed to configure antimalware policies and Windows Firewall settings for selected groups of computers via custom antimalware policies and client settings.
You are only allowed to use Windows Update to download the latest antimalware definition files to keep client workstations up-to-date.
You are allowed to make use of Configuration Manager software updates to download the most recent antimalware definition files to keep client workstations up-to-date.
You are not allowed to send email notifications to administrative users to inform them when malware is detected on client workstations.

A

You are allowed to configure antimalware policies and Windows Firewall settings for selected groups of computers via custom antimalware policies and client settings.

You are allowed to make use of Configuration Manager software updates to download the most recent antimalware definition files to keep client workstations up-to-date.

93
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Cente Configuration Manager in their environment.
You have been instructed to assign a fellow administrator, named Andy Reid, a security role that allows him to define and monitor security policies.
Which of the following is the security role that should be assigned to Andy Reid?

Asset Manager.
Endpoint Protection Manager.
Compliance Settings Manager.
Infrastructure Administrator.

A

Endpoint Protection Manager.

94
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are running a training exercise for ABC.com’s administrators. You are currently discussing Heartbeat Discovery.Which of the following is TRUE with regards to Heartbeat Discovery?
It is the only discovery method that provides details about the client installation status.
The client computer must be able to contact its assigned update point to send the Heartbeat Discovery record.
You are unable to manually initiate a Heartbeat Discovery cycle on a client.
You are able to manually initiate a Heartbeat Discovery cycle on a client.

A

It is the only discovery method that provides details about the client installation status.
You are able to manually initiate a Heartbeat Discovery cycle on a client.

95
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of two active directory forests named eu.ABC.com and us.ABC.com. SystemCenter Configuration Manager has been deployed in the us.ABC.com forest.You have employed a logon script for deploying the Configuration Manager client to workstations in the us.ABC.com forest. You are then instructed to automatically deploy the Configuration Manager client to workstations in the eu.ABC.com forest. You start by configuring a Client Push Installation account, and enabling theClient Push installation option. Which of the following actions should you take NEXT?
You should consider enabling the Active Directory System Discovery option.
You should consider enabling the Database Discovery option.
You should consider enabling the Site Discovery option
You should consider enabling the Domain Discovery option.

A

You should consider enabling the Active Directory System Discovery option.

96
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.ABC.com has a server, named ABC-SR13, which has Windows Deployment Services (WDS) and Internet Information Services (IIS) installed.You have been instructed to devise a deployment strategy for deploying servers on ABC.com’s Extranet via System Center Configuration Manager. Yourstrategy should allow for the installation of operating systems on the servers that installs automatically on initial server startup. Your strategy should also allow forthe reduction of network traffic between the Extranet and the Intranet throughout the installation process.Which of the following actions should you take on ABC-SR13?

You should consider making use of a PXE-enabled protected distribution point on ABC-SR13.
You should consider making use of a Preferred distribution point on ABC-SR13.
You should consider making use of a Multicast distribution point on ABC-SR13.
You should consider making use of a cloud-based distribution point on ABC-SR13.

A

You should consider making use of a PXE-enabled protected distribution point on ABC-SR13.

97
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You are in the process of running a training exercise for System Center Configuration Manager users. You are currently discussing the prerequisites forSoftware Updates in Configuration Manager.Which of the following is TRUE with regards to the prerequisites for Software Updates in Configuration Manager?

You should install a Windows Server Update Services (WSUS) server prior to creating the software update point site system role.
You should install a Windows Server Update Services (WSUS) server subsequent to creating the software update point site system role
You have to create distribution points for storing the content for software updates that clients require for compliance.
You do not create distribution points.
You should install a software update point on the Windows Server Update Services (WSUS) server to deploy software updates in Configuration Manager.
You should install a software update point on any domain server to deploy software updates in Configuration Manager

A

You should install a Windows Server Update Services (WSUS) server prior to creating the software update point site system role.

you have to create distribution points for storing the content for software updates that clients require for compliance.

You should install a software update point on the Windows Server Update Services (WSUS) server to deploy software updates in Configuration Manager.

98
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.You have been instructed to create a collection named after ABC.com’s Sales department. You want to produce a list of the desktop settings of users in the Sales department. Which of the following actions should you take FIRST?
You should consider deploying the custom client device setting to the collection.
You should consider creating a custom client device setting
You should consider creating a custom client administrator setting.
You should consider deploying the custom client administrator setting to the collection

A

You should consider creating a custom client device setting

99
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.Subsequent to deploying a new application, named ABCApp13, to numerous ABC.com client workstations, you decide to keep an eye on which workstations arecurrently installing ABCApp13.Which of the following actions should you take?
You should consider accessing the System Status node of the Configuration Manager console.
You should consider accessing the Deployments node of the Configuration Manager console.
You should consider accessing the Client Status node of the Configuration Manager console.
You should consider accessing the Distribution Status node of the Configuration Manager console.

A

You should consider accessing the Deployments node of the Configuration Manager console.

100
Q

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center Configuration Manager in their environment.ABC.com’s hierarchy includes a Central Administration site and a primary site. You are currently analyzing the ddm.log files.Which of the following describes a reason for this?

To view files that transfer via file-based replication between sites.
To view details about site-to-site job and package replication.
To view the activities of the discovery data manager.
To view the replication of files between the site server components and the Scheduler component

A

To view the activities of the discovery data manager.

101
Q

Your network contains a single Active Directory domain. You plan to deploy System Center Configuration Manager.
The hierarchy will have a Central Administration Site and five Primary Sites.
You need to ensure that you can target user groups for software distribution.
The solution must minimize network traffic.
Which Configuration Manager discovery method should you use?
Active Directory User Discovery and Active Directory Group Discovery on the primary sites
Active Directory User Discovery and Active Directory Group Discovery on the Central Administration site
Active Directory User Discovery on the Central Administration site and Active Directory Group Discovery on the primary sites

Active Directory User Discovery on the primary sites and Active Directory Group Discovery on every site

A

Active Directory User Discovery and Active Directory Group Discovery on the primary sites

102
Q

Your company has a main office and a branch office. The branch office connects to the main office by using a VPN over DSL connection.
The branch office contains 500 client computers that run Windows 8.1. All the computers are on the same subnet.
You plan to upgrade the operating system on the computers by using Configuration Manager. During the upgrade process, you will maintain the user state and the files.
You need to recommend a solution to reduce the amount of WAN traffic during the operating system deployments.
What two components should you include in the recommendation?

A cloud management gateway
A distribution point
A cloud-based distribution point
A fallback status point
A management point
A state migration point

A

A management point
A distribution point

103
Q

Your network contains a single Active Directory domain named contoso.com. System Center Configuration Manager is deployed to contoso.com.
You have a Windows 8.1 operating system image named Image1 in Configuration Manager. Image1 has the data source of \server1.contoso.com\source\Image1.wim.

New client computers are deployed by using Image1.

You have an application named App1. App1 is a configuration utility that must be installed by using a Windows Installer (MSI) package.

You need to ensure that App1 is included in all future deployments of Image1.

Which four actions should you perform in sequence? Arrange them in the correct order

A. Refresh Image1
B. Install App1.exe
C. Deploy Image1
D. Capture an image
E. Mount Image1.wim
F. Unmount Image1.wim
G. Scheduele updates for Image1
H. Distribute the image to distribution points

A

A. Refresh Image1
B. Install App1.exe
C. Deploy Image1
D. Capture an image
E. Mount Image1.wim
F. Unmount Image1.wim
G. Scheduele updates for Image1
H. Distribute the image to distribution points