Your network contains a single Active Directory domain. You have 100 servers that run Windows
Server 2008 R2 and 5,000 client computers that run Windows 7. You plan to deploy Applications to
the client computers. You need to recommend an Application deployment strategy that meets the
following requirements:
·Applications must be deployed only to client computers that meet the minimum hardware
requirements.
·Deployments must be scheduled to occur outside business hours.
·Detailed reports on the success or failure of the Application deployments must be provided.
What should you recommend?
A.
Deploy Applications by using Group Policy.
B.
Implement Windows Server Update Services (WSUS).
C.
Implement Microsoft System Center Operations Manager (SCOM) 2007 R2.
D.
Implement Microsoft System Center Configuration Manager (SCCM) 2007 R2.
Explanation:
http ://technet.microsoft.com/en-us/library/bb680651.aspx
Welcome to Microsoft System Center Configuration Manager 2007. Configuration Manager 2007
contributes to a more effective Information Technology (IT) department by enabling secure and
scalable operating system and application deployment and desired configuration management,
enhancing system security, and providing comprehensive asset management of servers, desktops,
and mobile devices.
Post-Setup Configuration Tasks
After Setup has run, there are still a few tasks you must perform to have a functioning Configuration
Manager 2007 site. For example, you might need to assign new site system roles and install clients.
For more information, see Checklist for Required Post Setup Configuration Tasks.
Common Configuration Manager Tasks
For more information about how to do common Configuration Manager 2007 tasks, see the
following topics.
• Planning and Deploying the Server Infrastructure for Configuration Manager 2007
• Planning and Deploying Clients for Configuration Manager 2007
• Collect hardware and software asset information
• Distribute software
• Deploy software updates
• Deploy operating systems
• Manage desired configurations
• Remotely administer a computer
• Restrict non-compliant computers from accessing the network
• Manage mobile devices like Smartphones and Pocket PCs