Your network contains a single Active Directory domain.
You plan to deploy System Center 2012 Configuration Manager. The hierarchy will have a
Central Administration site and five primary sites.
You need to ensure that you can target user groups for software distribution. The solution
must minimize network traffic.
Which Configuration Manager discovery method should you use?
A.
Active Directory User Discovery on the primary sites
B.
Active Directory User Discovery on the primary sites and Active Directory Group
Discovery on every site
C.
Active Directory User Discovery on the Central Administration site and Active Directory
Group Discovery on the primary sites
D.
Active Directory User Discovery and Active Directory Group Discovery on the Central
Administration site
Explanation:
Active Directory User Discovery on the primary sites and Active Directory GroupDiscovery on every site Personal comment:
From my point of view, the correct answer would be Active Directory User Discovery and
Active Directory
Group Discovery on the primary sites
The remaining possible correct answers might be:
Active Directory User Discovery on the primary sites and Active Directory Group Discovery
on every site or Active Directory User Discovery and Active Directory Group Discovery on
the Central Administration site Update:
It seems that more recent exams contain the answer “Active Directory User Discovery and
Active Directory
Group Discovery on the primary sites”
http://technet.microsoft.com/en-us/library/gg712681.aspx#BKMK_ChooseCAS
Determine Whether to Install a Central Administration Site
Install a central administration site if you plan to install multiple primary sites. Use a central
administration site to configure hierarchy-wide settings and to monitor all sites and objects in
the hierarchy. This site type does not manage clients directly but it does coordinate intersite
data replication, which includes the configuration of sites and clients throughout the
hierarchy.
Use the following information to help you plan for a central administration site: You can
manage all clients in the hierarchy and perform site management tasks for any primary site
when you use a Configuration Manager console that is connected to the central
administration site.
You can configure discovery operations throughout the hierarchy from the central
administration site by assigning discovery methods to run at individual sites.
http://technet.microsoft.com/en-us/library/gg712308.aspx
Planning for Discovery in Configuration Manager System Center 2012 Configuration
Manager discovery identifies computer and user resources that you can manage by using
Configuration Manager. It can also discover the network infrastructure in your environment.
Discovery Methods in Configuration Manager Before you enable discovery methods for
Configuration Manager, ensure you understand what each method can discover. Because
discovery can generate a large volume of network traffic, and the resultant DDRs can result
in a significant use of CPU resources during processing, plan to use only those discovery
methods that you require to meet your goals. You could use only one or two discovery
methods to be successful, and you can always enable additional methods in a controlled
manner to extend the level of discovery in your environment. Active Directory User
Discovery Discovers user accounts from the specified locations in Active Directory Domain
Services. Active Directory Group Discovery Discovers local, global, and universal security
groups, the membership within these groups, and the membership within distribution groups
from the specified locations in Active directory Domain Services. Distribution groups are not
discovered as group resources. About Discovery Data Records Discovery data records
(DDRs) are files created by a discovery method that contain information about a resource
you can manage in Configuration Manager. DDRs contain information about computers,
users and in some cases, network infrastructure. They are processed at primary sites or at
central administration sites. After the resource information in the DDR is entered into the
database, the DDR is deleted and the information replicates as global data to all sites in the
hierarchy. The site at which a DDR is processed depends on the information it contains:
DDRs for newly discovered resources that are not in the database are processed at the toplevel site of the hierarchy. The top-level site creates a new resource record in the database
and assigns it a unique identifier. DDRs transfer by file-based replication until they reach the
top-level site. DDRs for previously discovered objects are processed at primary sites. Child
primary sites do not transfer DDRs to the central administration site when the DDR containsinformation about a resource that is already in the database. Secondary site do not process
discovery data records and always transfer them by filebased replication to their parent
primary site. DDR files are identified by the .ddr extension, and have a typical size of about 1
KB. Decide Which Discovery Methods to Use Discover Users When you want to discover
information about users, you can use Active Directory User Discovery. Similar to Active
Directory System Discovery, this method discovers users from Active Directory and includes
basic information in addition to extended Active Directory information. You can use this
information to build complex queries and collections similar to those for computers. Discover
Group Information When you want to discover information about groups and group
memberships, use Active Directory Group Discovery. This discovery method creates
resource records for security groups. You can use this method to search a specific Active
Directory group to identify the members of that group in addition to any nested groups within
that group. You can also use this method to search an Active Directory location for groups,
and recursively search each child container of that location in Active Directory Domain
Services. This discovery method can also search the membership of distribution groups.
This can identify the group relationships of both users and computers. When you discover a
group, you can also discover limited information about its members. This does not replace
Active Directory System or User Discovery and is usually insufficient to build complex
queries and collections or serve as the bases of a client push installation. Decide Where to
Run Discovery When you plan to use discovery in Configuration Manager, you must
consider where to run each discovery method. After Configuration Manager adds discovery
data to a database, it is quickly shared between all sites in the hierarchy. Because there is
no benefit to discovering the same information at multiple sites in your hierarchy, consider
configuring a single instance of each discovery method that you use to run at a single site
instead of running multiple instances of a single method at different sites.Further information:
Best Practices for Discovery
Run Active Directory System Discovery and Active Directory User Discovery before you run
Active Directory
Group Discovery
When Active Directory Group Discovery identifies a previously undiscovered user or
computer as a member of a group, it attempts to discover basic details for the user or
computer. Because Active Directory Group Discovery is not optimized for this type of
discovery, this process can cause Active Directory Group Discovery to run slow. Additionally,
Active Directory Group Discovery identifies only the basic details about users and computers
is discovers, and does not create a complete user or computer discovery record. When you
run Active Directory System Discovery and Active Directory User Discovery, the additional
Active Directory attributes for each object type are available, and as a result, Active Directory
Group Discovery runs more efficiently. When you configure Active Directory Group
Discovery, only specify groups that you use with Configuration Manager To help control the
use of resources by Active Directory Group Discovery, specify only those groups that you
use with Configuration Manager. This is because Active Directory Group Discoveryrecursively searches each group it discovers for users, computers, and nested groups. The
search of each nested group can expand the scope of Active Directory Group Discovery and
reduce performance. Additionally, when you configure delta discovery for Active Directory
Group Discovery, the discovery method monitors each group for changes. This further
reduces performance when the method must search unnecessary groups. Run Active
Directory Discovery methods at primary site that has a network location that is closest to
your Active Directory domain controller To improve the performance of Active Directory
discovery, it is recommended to run discover at a primary site that has a fast network
connection to your domain controllers. If you run the same Active Directory discovery
method at multiple sites, it is recommended to configure each discovery method to avoid
overlap. Unlike past versions of Configuration Manager, discovery data is shared between
sites. Therefore, it is not necessary to discovery the same information at multiple sites.
http://configmgrblog.com/2011/12/29/discovery-methods-in-configuration-manager-2012/
Discovery Methods in Configuration Manager 2012 Active Directory User Discovery can be
configured on Central Administration Sites and Primary Sites. Active Directory Group
Discovery can be configured on Central Administration Sites and Primary Sites.
It is definitely wrong. The only discovery method supported on CAS is AD Forest Discovery:
https://technet.microsoft.com/en-us/library/gg712308.aspx (scroll down to “Decide where to run discovery”). I would say B is correct but it looks like the available answers are not complete.
The answer is B
New 70-243 Exam Questions (6/Mar/2017 Update):
NEW QUESTION 167
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment. Configuration Manager has Asset Intelligence enabled. You do not have an Asset Intelligence synchronization point. In the Configuration Manager Console, you discover that a number of Inventoried Software entries are listed in an uncategorized state. You need to change the state of the items that are listed as uncategorized. What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
A. Assign a validated family to each entry.
B. Click Request Catalog Update for each entry.
C. Click ResolveConflict for each entry.
D. Assign a user-defined label for each entry.
E. Assign a user-defined family to each entry.
Answer: BE
Explanation:
B: To request a catalog update for uncategorized software titles:
– In the Configuration Manager console, clickAssets and Compliance.
– In the Assets and Compliance workspace, click Asset Intelligence, and then click Inventoried Software.
– Select a product name or select multiple product names, to be submitted to System Center Online for categorization. Onlyuncategorized inventoried software titles can be submitted to System Center Online for categorization.
– On Home tab, in the Product group, click Request Catalog Update.
Etc.
E: The Asset Intelligence validation state of uncategorized represents that a catalog item has not been defined by System Center Online researchers, the item has not been submitted to System Center Online for categorization, and the administrator has not assigned a user-defined categorization value.
To modify the categorizations for software titles:
– In the Configuration Manager console, click Assets and Compliance.
– In the Assets and Compliance workspace, click Asset Intelligence, and then click Inventoried Software.
– Select a software title or select multiple software titles for which youwant to modify categorizations.
– On the Home tab, in the Properties group, click Properties.
– On the General tab, you can modify the following categorization information:Product Name: Specifies the name of the inventoried software title.Vendor: Specifiesthe name of the vendor that developed the inventoried software title.Category: Specifies the software category that is currently assigned to the inventoried software title.Family: Specifies the software family that is currently assigned to the inventoried software title.
NEW QUESTION 168
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains a System Center 2012 Configuration Manager Service Pack 1(SP1) environment. You discover that information about installed applications fails to appear in the report named Software registered in Add Remove Programs on a specific client computer. You need to ensure that information about installed applications appears in the report. What should you do?
A. Modify the Enable hardwareinventory on clients setting.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Modify the Enable software inventory on clients setting.
D. Add a file name to the Hardware Inventory configuration.
E. Add a WMI class to the HardwareInventory Classes list.
F. Add a file name to the Software Inventory configuration.
G. Add a file name to Software Metering.
H. Add a WMI class to the Sms_def.mof file.
I. Select Collect NOIDMIF files in Hardware Inventory.
Answer: C
NEW QUESTION 169
You have a test network that contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment. You create an operating system deployment task sequence that deploys an image of Windows 8.1. You deploy the task sequence to the All Systems collection. You discover that client computers in the test environment are not being re-imaged automatically. You need to ensure that all of the client computers are re-imaged automatically. What should you do?
A. Modify the deployment verification settings for the site.
B. For the operating system deployment task sequence deployment, set the Make available to the following option to Only media and PXE.
C. For the operating system deployment task sequence deployment, set the Make available to the following options to Only Configuration Manager Clients.
D. Create a new operating system deployment task sequence deployment that uses a custom collection, and then set the purpose to Required.
Answer: D
NEW QUESTION 170
……
NEW QUESTION 171
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. You plan to refresh all of the client computers that run Windows 7 to Windows 8.1 by using Configuration Manager. You need to recommend a method to maintain the user state information after the refresh completes. What should you include in the recommendation?
A. Create a task sequence that copies the C:\Users folder to the server that runs Microsoft SQL Server.
B. Createa WIM image of all the client computers before the refresh.
C. Create and configure a state migration point.
D. Create a task sequence to rundism.exeon the client computers before the refresh.
Answer: C
NEW QUESTION 172
……
NEW QUESTION 173
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. You discover that the last logon user details are not being updated for all of the client computers. You need to ensure that the last logon user details are updated. Which Configuration Manager discovery method should you use?
A. Active Directory User Discovery
B. Network Discovery
C. Heartbeat Discovery
D. Active Directory System Discovery
Answer: C
NEW QUESTION 174
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site. You have an administrator named Admin1. You discover that Admin1 can create collections that contains servers, laptops, and desktop computers. You create a collection named Collection1. Collection1 contains only desktop computers on the network. You need to ensure that Admin1 can create only collections that contain desktop computers. Which settings should you modify?
A. Security Scopes for Admin1
B. Membership Rules for Collection1
C. Security Roles for Admin1
D. Security for Collection1
Answer: A
NEW QUESTION 175
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server 2012. Server2 contains the Configuration Manager database. Server2 fails. You install SQL Server 2012 on a new server. You name the server Server3. You need to restore the Configuration Manager database to Server3. What should you do?
A. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Configuration Manager Setup Wizard.
B. From Server3, run Microsoft SQL Server Managements Studio, and then restore the backed up SQL Server database and log files.
C. Register the Service Principal Name (SPN) for the SQL Server Service account of Server3. From Server1, run the Site Repair Wizard.
D. From Server3, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.
Answer: A
NEW QUESTION 176
……
Get The Newest 70-243 Dumps In PDF And VCE From — http://www.passleader.com/70-243.html (185q VCE and PDF)
Good Luck!
P.S. part of that new 185Q 70-243 dumps FOR YOUR REFERENCE:
https://drive.google.com/open?id=0B-ob6L_QjGLpfmVaZDlXWUtVTTZVWWQ1Z3ZHdk1Gb0pBbWN4V2VOclZqcnFaUk5udTRUeGc
Best Regards!