System Center Configuration Manager Assessement 1 Flashcards

1
Q
  1. List out the various types of sites available in SCCM?
A
  • Primary site
  • Central Administration site
  • Secondary site
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Define Central Administration Site (CAS)?
A

The central administration site is at the top tier of the hierarchy. You can deploy a central administration site to expand a stand-alone primary site into a multisite hierarchy. The central administration site enables centralized reporting and management of certain hierarchy-wide roles, but does not directly support any clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Difference between Primary site and Secondary site?
A

Primary Site Secondary Site
Primary sites can be used to manage clients in well-connected networks. Secondary sites control content distribution for clients in remote locations across links that have limited network bandwidth
Primary site can Managed directly through Configuration Manager console installed on site server You manage a

secondary site from a central administration site or the secondary site’s direct parent primary site
A primary site can be a stand-alone primary site or a child primary site in a larger hierarchy Secondary sites must be attached to a primary site
Primary sites are responsible for processing all client data from their assigned clients Clients cannot assign the site directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Define Child site in SCCM?
A

A child site can be a primary site of a CAS or a secondary site of a primary site.

Central administration site with one or more child primary sites
Use this topology when you require more than one primary site to support management of all your devices and users
Primary site with one or more child primary sites
Use secondary sites to manage the transfer of deployment content and client data across low-bandwidth networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Mention various client deployments methods?
A

Client push installation
Group Policy installation
Manual installation
Software update point based installation
OS deployment
Image deployment
Upgrade installation
Logon script installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Mention some of the important site system roles in SCCM?
A

Distribution point
Fallback status point
Management point
PXE service point
Reporting point
Server locator point
Software update point
State migration point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Define the SCCM console?
A

SCCM console is a tool used to perform several tasks such as device management, network, and application deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Mention the types of Discovery methods that are available in SCCM?
A

Active Directory System Discovery
Active Directory Security Group Discovery
Active Directory User Discovery
Network Discovery
Forest Discovery
Heartbeat Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is Boundaries in the SCCM console, and what are the types of boundaries in SCCM?
A

A site boundary is a network location that contains one or more devices you want to manage or resources you want to provide to clients.
The different types of boundaries in SCCM are:
IP Subnet
IP Ranges
IPv6 Prefix
Active Directory Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Define Active Directory forest discovery?
A

The Active Directory Forest Discovery method is a way that Configuration Manager automatically discovers IP subnets and Active Directory sites based on information in AD DS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Define limiting collection?
A

When you create a new collection, you specify a base collection called a limiting collection. The limiting collection becomes the foundation for resources that can be added to the new collection. You can use limiting collections along with role-based access control to help ensure that delegated administrators can see only the objects that are relevant for their administrative tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Define inventory in SCCM?
A

Its a feature that maintain a record of your organization’s hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Define client policy?
A

A client policy contains settings that the configuration manager clients download A client policy contains settings such as: Software and hardware inventory settings, remote control settings, power managment settings etc….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is the Secondary site?
A

A secondary site enables you to manage the traffic between the primary site and the
secondary site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Define DDR?
A

When Configuration Manager discovers resources, it creates discovery data records (DDRs) that it submits to the Configuration Manager database. Each generated file has a .ddr extension, and the specific information that each record contains varies depending on the resource that Configuration Manager discovered and the discovery method it used. Records can include data such as:
The NetBIOS name of a computer.
The IP address and IP subnet of a computer or device.
The operating system name and version.
The media access control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Define Heartbeat Discovery?
A

The Heartbeat Discovery method refreshes Configuration Manager client computer discovery data in the site database.

17
Q
  1. What is the use of Intune?
A

Microsoft Intune is a cloud service from Microsoft that simplifies management of your users’ remote devices, including common phone technologies and computers. You can deploy Intune as an independent management solution, or you can integrate it with an on-premises Configuration Manager deployment

18
Q
  1. What are boundary types used to define boundaries?
A

The different types of boundaries in SCCM are:
IP Subnet
IP Ranges
IPv6 Prefix
Active Directory Site

19
Q
  1. What is the use of defining boundary groups?
A

Boundary groups assemble boundaries into logical groups for management. All combined boundaries within a single boundary group are assumed to have a high-speed connection between them. Boundary groups provide two functions in the Configuration Manager environment: Automatic site assignment andContent location requests.

20
Q
  1. You have a deployment of System Center Configuration Manager (Current Branch). Your company opens a new office. All the client computers in the new office use IPv6 addresses only. The IPv6 address of one of the computers is 2001:3823:2c50:6a39:e976:b0eb:93f7:fb41. You need to configure an IPv6 boundary in Configuration Manager for the new office.
    What should you use to configure the boundary?

A. 2001:3823:2c50:6a39
B. ::93f7:fb41
C. 2001:3823::
D. e976:b0eb:93f7:fb41

A

A. 2001:3823:2c50:6a39

21
Q
  1. You have a deployment of System Center Configuration Manager (Current Branch). Your company has a main office and a branch office. The branch office has five users. Some users use laptops and some users use desktop computers.
    All the servers for the company are located in the main office. The branch office connects to the main office by using a VPN over a DSL connection to the main office. You need to minimize the bandwidth used to deploy updates to branch office clients over the VPN connection. The solution must minimize costs.
    What should you configure in the branch office?

A. distribution point
B. software update point
C. secondary site server
D. a cloud-based distribution point

A

C. secondary site server

22
Q
  1. You deploy the first System Center Configuration Manager primary site server to your organization. You need to create the first user collection. The collection must contain members from an Active Directory security group and must update automatically. Which two actions should you perform? Each correct answer presents part of the solution.

A. Create a user collection that has membership based on a direct rule.
B. Configure Active Directory Forest Discovery.
C. Create a user collection that has membership based on a query rule.
D. Configure Active Directory Group Discovery.
E. Create a user collection that has membership based on an include collection rule.

A

C. Create a user collection that has membership based on a query rule.
D. Configure Active Directory Group Discovery.

23
Q
  1. You work for a company named ADatum Corporation. The ADatum network contains an Active Directory domain named adatum.com. You have a partner company named Contoso, Ltd. The Contoso network contains an Active Directory domain named adatum.com.
    All the client computers at both companies run Windows 10. Each company has a deployment of System Center Configuration Manager (Current Branch). ADatum has sales and IT departments.
    ADatum has a collection for each department. Contoso has research, marketing, and human resources (HR) departments. Contoso has a collection for each department.
    ADatum purchases Contoso. You configure on-premises mobile device management (MDM) in adatum.com.
    You enroll the client computers in the IT department into on-premises MDM (Mobile Device Management).
    You configure hybrid MDM in contoso.com. You need to view a detailed hardware inventory of an IT department computer that is currently offline. Which tool should you use?

A. Resource Explorer
B. Device Manager
C. Microsoft Intune in the Microsoft Azure portal
D. The Microsoft Azure portal

A

A. Resource Explorer

24
Q
  1. You have a deployment of System Center Configuration Manager (Current Branch). You have the collections shown in the following table.

collection1 computer1,computer2,computer3
collection2 computer1,computer4 , computer6
collection3 computer2 computer5 computer7

You create a new collection that has the following configurations:

Collection name: Collection4
Limiting collection: Collection1
Include Collections rule: Collection2
Exclude Collections rule: Collection3
What will Collection4 contain?

A. Computer1, Computer2, and Computer3 only
B. Computer1, Computer4, and Computer6 only
C. Computer1 only
D. Computer1, Computer2, Computer3, Computer4, and Computer6

A

C. Computer1 only

25
Q
  1. You have a deployment of System Center Configuration Manager (Current Branch) that contains the servers shown in the following table.

server1 management point
server2 distribution point
server3 Enrollment point
server4 software update point

You need to configure the environment to ensure that operating systems can be deployed by using operating system deployment.
On which server should you enable PXE support?

A. Server1
B. Server2
C. Server3
D. Server4

A

B. Server2

26
Q
  1. You install the System Center Configuration Manager client on a computer. When you check the Configuration Manager console, the computer does not appear in the console. Other computers appear in the console.
    You need to review the Configuration Manager logs for the computer. What should you use?

A. the cmtrace.exe command
B. the Configuration Manager console
C. the statview.exe command
D. the Event Viewer console

A

A. the cmtrace.exe command

27
Q
  1. You have a deployment of System Center Configuration Manager (Current Branch).
    Your company has two sites named Site01 and Site02.
    Site02 has 200 client computers that run Windows 10 and a server named Server01. You add the Distribution point site system role to Server01. You need to ensure that only the client computers in Site02 can download content from Server01. What should you configure?

A. security scopes
B. security roles
C. boundary groups
D. boundary group relationships

A

C. boundary groups

28
Q
  1. You have a deployment of System Center Configuration Manager (Current Branch). You have offices in Montreal and Seattle. You need to deploy software to the client computers in the Montreal office only. What should you do first?

A. Create an Active Directory container.
B. Create a user collection that contains the users in the Montreal office.
C. Configure a boundary group for client assignment.
D. Create a boundary for the Montreal office that uses IP subnets.

A

D. Create a boundary for the Montreal office that uses IP subnets.

29
Q
  1. You have a deployment of System Center Configuration Manager (Current Branch). You plan to implement hybrid mobile device management (MDM).Which cloud service should you provision?

A. Microsoft Operations Manager Suite (OMS)
B. Microsoft Store for Business
C. Microsoft Intune
D. Microsoft Azure

A

C. Microsoft Intune