Beruflich Dokumente
Kultur Dokumente
com makes
use of SCCM. You want to make sure that all example.com client workstations have the
same default client settings for hardware inventory configured. You have to make use of the
correct procedure to extend hardware inventory. Which of the following actions should you
take?
A. You should consider creating custom WMI classes in Configuration Manager.
B. You should consider enabling the default WMI classes used by Configuration
Manager.
C. You should consider creating an IDMIF file.
D. You should consider creating a NOIDMIF file.
Question 5. You deploy Windows 7 by using Operating System Deployment (OSD). The
development task sequence contains steps to install software updates and Applications. The
amount of time required to deploy the Windows 7 image has increased significantly during
the last six months. You need to recommend a solution to reduce the amount of time it
takes to deploy the image. What should you recommend?
A. Synchronize software updates before deploying the image.
B. Use offline servicing for the image.
C. Create a new automatic deployment rule.
D. Add an additional Install Software Updates step to the deployment task sequence.
Question 6. Your company uses System Center 2012 Configuration Manager to distribute
operating system images. The standard operating system for client computers is Windows 7
Enterprise (x86). You receive 300 new desktop computers. Each computer has a new storage
controller. When you attempt to deploy an existing image to one of the computers, you
receive an error message indicating that a storage device cannot be found during the pre-
boot deployment phase. You need to ensure that you can deploy Windows 7 to the new
computers by using an image. What should you do?
A. Import the storage drivers to the Drivers container and update the task sequence.
B. Create a new x64 boot image and configure the operating system image to use x64 boot
image.
C. Create a new driver package and update the task sequence.
D. Update the existing x86 boot image to include the storage drivers.
Question 8. As a Configuration Admin for a single primary site you need to provide users
with the ability to remotely reset their mobile device to the factory settings. What should
you install?
A. Application Catalog web service point and Application Catalog website point
B. Out of Band service point and Application Catalog web service point
C. Device management point and System Health validator point
D. System Health Validator point and Application Catalog website point
Question 9. Your network contains a WSUS server. All client computers are configured as
WSUS clients. All the client computers have Windows Firewall enabled. Windows Firewall is
configured to block File and Printer Sharing. Users are not configured as local
Administrators on their client computers. You deploy System Center Configuration Manager.
You need to identify which methods you can use to deploy the Configuration Manager
client to all the client computers. Which client installation methods should you identify?
A. Logon script installation
B. Manual client installation
C. Software update-based client installation
D. Client Push Installation
E. Active Directory Group Policy-based installation
Question 10. Your network contains a Configuration Manager environment. You need to
change the organization name displayed by Configuration Manager. Which settings should
you modify from the Configuration Manager console?
A. Client Policy
B. Computer Agent
C. User and Device Affinity
D. Compliance Settings
Question 11. In your SCCM setup, Software Inventory and Hardware Inventory are enabled
for all of the client computers. All of the client computers have an Application named Test1
installed. Test1 saves files to the C:\test folder. All of the files saved by Test1 have a file
name extension of .pdf. You configure Software Inventory to inventory all of the files that
have the .pdf extension and the .exe extension. After six months, you discover that some of
the client computers fad to inventory .pdf files. All of the client computers inventory .exe
files. You need to ensure that the .pdf files are inventoried. What should you do?
A. Modify C:\Program Files\Test1\NO_SMS_On_Drive.sms.
B. Delete C:\Program Files\Test1\NO-SMS_On_Drive.sms.
C. Modify C:\test\Skpswi.dat.
D. Delete C:\test\Skpswi.dat.
Question 12. After configuring Software Inventory in your SCCM setup, you discover that a
group of client computers fails to report software inventory data. The client computers
report hardware inventory data. You confirm that Configuration Manager can deploy
Applications to the group of client computers. You need to identify what is causing the
reporting issue. Which log files should you review?
A. Filesystemfile.log
B. Dataldr.log
C. Mp_sinv.log
D. Inventoryagent.log
E. Hman.log
Question 13. You create a deployment to install Microsoft Office 2013. The deployment
targets 4,000 client computers on the network. Two weeks after you create the deployment,
you discover that Office 2013 fails to install on a client computer named SYS1. You need to
identify whether SYS1 started downloading the Application of Office 2013. Which log file
should you review?
A. Locationservices.log
B. Ccm.log
C. Sitestat.log
D. Rcmctrl.log
E. Dcmagent.log
F. Contenttransfermanager.log
Question 15. You need to create a list of all the client computers that have a version of
Visual Studio installed. You write the following query:
select SYS.Name from SMS_R_System SYS
join SMS_G_Syatem_ADD_REMOVE_PROGRAMS ARP
on ARP.ResourceId = SYS.ResourceId
What should you add to the query?
A. where ARP.DisplayName like “Visual Studio*”
B. where ARP.DisplayName = “*Visual Studio*”
C. where ARP.DisplayNarae = “%%Visual Studio”
D. where ARP.DisplayName like “Visual studio%”
Question 16. Your network contains a Configuration Manager environment. You need to
receive an email message every day that lists all non-compliant clients. What should you
do?
A. Create an alert subscription.
B. Configure a Microsoft SQL Server Reporting Services (SSRS) report.
C. Configure an in-console alert.
D. Create a ConfigMgr query.
Question 17. You create a report named Report1. Report1 is used by multiple users. Users
report that it takes too long to load Report1. You need to reduce the amount of time it
takes to load Report1. What should you do?
A. Enable caching for the report.
B. Decrease the Size of the ReportServer database.
C. Decrease the session timeout value for the Reports website.
D. Increase the size of the ReportServerTempDB database.
Question 18. You are creating a configuration item that contains application settings for
Microsoft Office 2013. You need to detect whether Office 2013 is installed before validating
the configuration item. What should you do?
A. Create a query-based collection.
B. Create an automatic deployment rule.
C. Create a report to display all installed software.
D. Enable Use Windows Installer detection.
Question 19. A domain consists of workstations that have a 32-bit version of Windows 7
Enterprise installed. This image is deployed using SCCM. You want to make sure that this
image is kept up-to-date. Which of the following is TRUE when updating boot images?
(Choose all that apply.)
A. You can add device drivers to a boot without importing and enabling them in the device
driver catalog.
B. The boot image does not change any of the associated packages that the boot
image references.
C. You must update the distribution points that contain a version of the boot image
subsequent to you making changes to a boot image.
D. You can schedule an update of the distribution point.
Question 20. As a Configuration manager admin, you have been instructed to assign
security admin named James, a security role that allows him to define and monitor security
policies. Which of the following is the security role that should be assigned to James?.
A. Asset Manager.
B. Endpoint Protection Manager.
C. Compliance Settings Manager.
D. Infrastructure Administrator.
Question 1. As an SCCM admin, you are running a training exercise for company’s
administrators. You are currently discussing client settings that are configurable via the
Configuration Manager console. Which of the following are client settings available for
devices? (Choose all that apply.)
A. Computer Restart
B. Mobile Devices
C. Computer Agent
D. User and Device Affinity
E. Endpoint Protection
Question 2. Which of the following are log files that relate to reporting?
A. EPMgr.log
B. ddm.log
C. AIUSMSI.log
D. srsrp.log.
Question 3. You have been instructed to analyze a log file that schedules the Background
Intelligent Transfer Service (BITS) or the Server Message Block (SMB) to download or to
access packages. Which of the following actions should you take?
Question 4. Suppose that you have been tasked with devising a strategy that allows for the
restoration of the Central Administration site. Which of the following actions should you
take?
A. You should consider enabling the Backup Site Server maintenance task and setting
a schedule via the Configuration Manager console.
B. You should consider creating a snapshot backup strategy.
C. You should consider configuring a differential backup strategy.
D. You should consider configuring a incremental backup strategy.
Question 5. You want to determine the amount of copies of a certain software program
have been deployed to all workstations. You also want find out if users are still running a
certain software program. You have to make use of the data from software inventory. You
also have to make use of another feature in conjunction with the data from software
inventory. Which of the following should you use?
A. Software metering.
B. Query rules.
C. Resource Monitor.
D. Performance Monitor.
Question 6. You are currently discussing the integration of Configuration Manager with SQL
Server Reporting Services. Which of the following are benefits of this integration? (Choose
all that apply.)
A. It allows for the use of an industry standard reporting system to query the
Configuration Manager database.
B. It displays reports via notepad.
C. It prevents subscriptions to reports.
D. It provides high performance, availability, and scalability.
Question 7. What membership rule type gives you direct control over which resources are
members of the collection. Which of the following is the option you should make use of?.
A. Direct rule.
B. Query rule.
C. Include collection rule.
D. Exclude collection rule.
A. Application
B. Operating system
C. Software updates
D. General
Question 9. You have been informed that some service level agreement (SLA) issues
occurring on some of company’s workstations. You want to make use of the Configuration
Manager console to pin point the problem. Which of the following actions should you take?
Question 10. You have been asked to create a collection for Finance department in a
company. You want to produce a list of the desktop settings of users in the Finance
department. Which of the following actions should you take first ?.
Question 11. How can you ensure that the new application can only be installed on
workstations that meet specified hardware and software conditions. Which of the following
actions should you take?
A. Details regarding the configuration, database connectivity, and health of the WSUS server
for the site.
B. Details regarding the software update synchronization process.
C. Details regarding compliance status for the software updates.
D. Details regarding software update point configurations and connections to the WSUS
server for subscribed update categories, classifications, and languages.
Question 16. You are currently analyzing the ccm.log file. Which of the following activities
are recorded in this log?
Question 17. You want to analyze a log file that records information regarding the creation,
modification, and removal of collections by the Collection Evaluator. Which log file should
you examine?
A. Colleval.log file.
B. CcmEval.log file.
C. CcmEvalTask.log file.
D. AppIntentEval.log file.
Question 18. In Configuration Manager console you see that there is a downward trend in
client health. Which reasons should you identify?
A. In Client Status Settings Properties, the Heartbeat discovery during the following days
interval is shorter than the Heartbeat Discovery interval.
B. The age set in the Delete Aged Discovery Data maintenance task is shorter than the
Heartbeat Discovery interval.
C. The Delete Obsolete Client Discovery Data maintenance task is disabled.
D. The Active Directory sites that are members of boundary groups are modified.
Question 19. The hierarchy will have a Central Administration Site and five Primary Sites.
You need to ensure that you can target user groups for software distribution. The solution
must minimize network traffic. Which Configuration Manager discovery method should you
use?
Question 20. Suppose that a hierarchy contains a Central Administration Site named C01
and a primary site named P01. You discover that none of the packages created on C01 are
displayed in P01. You need to identify whether there is a replication issue between the sites.
What should you review?
A. Inventoryagent.log file
B. Rcmctrl.log file
C. Microsoft SQL Server replication diagnostic files
D. Despool.log file