How should you configure the servers?

DRAG DROP
A company has a single-domain Active Directory Domain Services (AD DS) environment. Some servers and all
domain controllers are deployed on the internal network. All servers in the perimeter network are joined to a
workgroup. The company uses System Center 2012 R2 Operations Manager to monitor the server
infrastructure on the internal network.
The company plans to use Audit Collection Services (ACS) for one Internet Information Services (IIS) server
that is in the perimeter network.
You need to configure the authentication type and ACS role for Operations Manager and the IIS server.
How should you configure the servers? To answer, drag the appropriate authentication type and ACS roleto the
location or locations in the answer area. Each authentication type and ACS role may be used once, morethan
once, or not at all. You may need to drag the splitbar between panes or scroll to view content.

DRAG DROP
A company has a single-domain Active Directory Domain Services (AD DS) environment. Some servers and all
domain controllers are deployed on the internal network. All servers in the perimeter network are joined to a
workgroup. The company uses System Center 2012 R2 Operations Manager to monitor the server
infrastructure on the internal network.
The company plans to use Audit Collection Services (ACS) for one Internet Information Services (IIS) server
that is in the perimeter network.
You need to configure the authentication type and ACS role for Operations Manager and the IIS server.
How should you configure the servers? To answer, drag the appropriate authentication type and ACS roleto the
location or locations in the answer area. Each authentication type and ACS role may be used once, morethan
once, or not at all. You may need to drag the splitbar between panes or scroll to view content.

Answer:

Explanation:



Leave a Reply 6

Your email address will not be published. Required fields are marked *


Matt

Matt

How to Configure Certficates for ACS Collector and Forwarder
http://technet.microsoft.com/en-us/library/hh872886.aspx

When the Audit Collection Service (ACS) Forwarder is located in a domain separate from the domain where the ACS Collector is located, and no two-way trust exists between the two domains, certificates must be used so that authentication can take place between the ACS Forwarder and the ACS Collector.

Ismail

Ismail

So what is the right order?

ward

ward

its the correct order .. he’s explaining why we are using certificates..

Andrew

Andrew

This is a Hyper-V related question? Seems to be more for SCOM?

robber

robber

maybe you should read the title of the exam!

Ph03n1X

Ph03n1X

The title of the exam is “Server Virtualization with Windows Server Hyper-V and System Center”. This clearly a deep-dive SCOM question and should have no place on this exam.