You need to ensure that you collect inventory data from the remote computers

Your network contains a System Center 2012 Configuration Manager environment as shown
in the exhibit. (Click the Exhibit button.)

The network contains six servers. The servers are configured as shown in the following table.

A corporate security policy states that remote computers are forbidden to communicate
directly with servers on the internal network.
You need to ensure that you collect inventory data from the remote computers.
What should you do?

Your network contains a System Center 2012 Configuration Manager environment as shown
in the exhibit. (Click the Exhibit button.)

The network contains six servers. The servers are configured as shown in the following table.

A corporate security policy states that remote computers are forbidden to communicate
directly with servers on the internal network.
You need to ensure that you collect inventory data from the remote computers.
What should you do?

A.
Install Windows Server Update Serves (WSUS) on Server3.

B.
Configure the Exchange connector on Server3.

C.
Install a management point on Server2.

D.
Install a PXE-enabled protected distribution point on Servers.

E.
Install a software update point on Server3.

F.
Install Network Load Balancing (NLB) on Server6.

G.
Install an enrollment proxy point on Server6.

H.
Install the Windows Cluster service on Server3.

I.
Install a protected distribution point on Server1.

J.
Configure IIS to support only HTTPS on Servers.
K.
Install a management point on Server5.
L.
Install the Windows Cluster service on Server6.
M.
Configure IIS to support only HTTP on Servers.
N.
Install Network Load Balancing (NLB) on Server3.
O.
Install a PXE-enabled protected distribution point on Server4.

Explanation:
http://technet.microsoft.com/en-us/library/gg712701.aspx
Planning for Communications in Configuration Manager
Planning for Communications Across Forests in Configuration Manager
When your Configuration Manager design spans multiple Active Directory domains and
forests, use the additional information in the following table to help you plan for the following
types of communication:

Communication in a site that spans forests: Does not require a two-way forest trust.
To support clients primary sites support the installation of each site system role on
computers in other forests.
Note: Two exceptions are the out of band service point and the Application Catalog web
service point. Each must be installed in the same forest as the site server. When the site
system role accepts connections from the Internet, as a security best practice, install these
site system roles in an untrusted forest (for example, in a perimeter network) so that the
forest boundary provides protection for the site server. When you specify a computer to be a
site system server, you must specify the Site System Installation Account. This account must
have local administrative credentials to connect to, and then install site system roles on the
specified computer. When you install a site system role in an untrusted forest, you must
select the site system option Require the site server to initiate connections to this site
system. This configuration enables the site server to establish connections to the site system
server to transfer data. This prevents the site system server that is in the untrusted location
from initiating contact with the site server that is inside your trusted network. These
connections use the Site System Installation Account that you use to install the site system
server. The management point and enrollment point site system roles connect to the site
database. By default, when these site system roles are installed, Configuration Manager
configures the computer account of the new site system server as the connection account
and adds the account to the appropriate SQL Server database role. When you install these
site system roles in an untrusted domain, you must configure the site system role connection
account to enable the site system role to obtain information from the database. If you
configure a domain user account for these connection accounts, ensure that the account has
appropriate access to the SQL Server database at that site:
* Management point: Management Point Database Connection Account
* Enrollment point: Enrollment Point Connection Account
Consider the following additional information when you plan for site system roles in other
forests:
* If you run a Windows Firewall, configure the applicable firewall profiles to pass
communications between the site database server and computers that are installed with
remote site system roles.
* When the Internet-based management point trusts the forest that contains the user
accounts, user policies are supported. When no trust exists, only computer policies are
supported.
Further information:
The Management Point will collect all Client data and forward it to the Primary Site Server.



Leave a Reply 9

Your email address will not be published. Required fields are marked *


john

john

a corporate security policy states that remote computers are forbidden to communicate directly with servers on the internet network

john

john

which one is correct answer ?

rahul

rahul

can I know the correct answer for this question please

per

per

Yes, K is the correct answer.

Kim

Kim

K, is the correct answer as a management point provides policy and service location information to clients and receives configuration data from the clients(The clients are fobidden to communicate directly with the internal servers, so the optional servers for installing a role on can only be on Server 5 and 6 as they are in the perimeter network)

Eliseo56

Eliseo56

>New 70-243 Exam Questions and Answers Updated Recently (6/Mar/2017):P.S. These New 70-243 Exam Questions Were Just Updated From The Real 70-243 Exam, You Can Get The Newest 70-243 Dumps In PDF And VCE From — http://www.passleader.com/70-243.html (185q VCE and PDF)<

Good Luck!

Eliseo56

Eliseo56

New 70-243 Exam Questions Updated Recently (6/Mar/2017):

NEW QUESTION 167
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment. Configuration Manager has Asset Intelligence enabled. You do not have an Asset Intelligence synchronization point. In the Configuration Manager Console, you discover that a number of Inventoried Software entries are listed in an uncategorized state. You need to change the state of the items that are listed as uncategorized. What are two possible ways to achieve the goal? Each correct answer presents a complete solution.

A. Assign a validated family to each entry.
B. Click Request Catalog Update for each entry.
C. Click ResolveConflict for each entry.
D. Assign a user-defined label for each entry.
E. Assign a user-defined family to each entry.

Answer: BE
Explanation:
B: To request a catalog update for uncategorized software titles:
– In the Configuration Manager console, clickAssets and Compliance.
– In the Assets and Compliance workspace, click Asset Intelligence, and then click Inventoried Software.
– Select a product name or select multiple product names, to be submitted to System Center Online for categorization. Onlyuncategorized inventoried software titles can be submitted to System Center Online for categorization.
– On Home tab, in the Product group, click Request Catalog Update.
Etc.
E: The Asset Intelligence validation state of uncategorized represents that a catalog item has not been defined by System Center Online researchers, the item has not been submitted to System Center Online for categorization, and the administrator has not assigned a user-defined categorization value.
To modify the categorizations for software titles:
– In the Configuration Manager console, click Assets and Compliance.
– In the Assets and Compliance workspace, click Asset Intelligence, and then click Inventoried Software.
– Select a software title or select multiple software titles for which youwant to modify categorizations.
– On the Home tab, in the Properties group, click Properties.
– On the General tab, you can modify the following categorization information:Product Name: Specifies the name of the inventoried software title.Vendor: Specifiesthe name of the vendor that developed the inventoried software title.Category: Specifies the software category that is currently assigned to the inventoried software title.Family: Specifies the software family that is currently assigned to the inventoried software title.

NEW QUESTION 168
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains a System Center 2012 Configuration Manager Service Pack 1(SP1) environment. You discover that information about installed applications fails to appear in the report named Software registered in Add Remove Programs on a specific client computer. You need to ensure that information about installed applications appears in the report. What should you do?

A. Modify the Enable hardwareinventory on clients setting.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Modify the Enable software inventory on clients setting.
D. Add a file name to the Hardware Inventory configuration.
E. Add a WMI class to the HardwareInventory Classes list.
F. Add a file name to the Software Inventory configuration.
G. Add a file name to Software Metering.
H. Add a WMI class to the Sms_def.mof file.
I. Select Collect NOIDMIF files in Hardware Inventory.

Answer: C

NEW QUESTION 169
You have a test network that contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment. You create an operating system deployment task sequence that deploys an image of Windows 8.1. You deploy the task sequence to the All Systems collection. You discover that client computers in the test environment are not being re-imaged automatically. You need to ensure that all of the client computers are re-imaged automatically. What should you do?

A. Modify the deployment verification settings for the site.
B. For the operating system deployment task sequence deployment, set the Make available to the following option to Only media and PXE.
C. For the operating system deployment task sequence deployment, set the Make available to the following options to Only Configuration Manager Clients.
D. Create a new operating system deployment task sequence deployment that uses a custom collection, and then set the purpose to Required.

Answer: D

NEW QUESTION 170
……

NEW QUESTION 171
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. You plan to refresh all of the client computers that run Windows 7 to Windows 8.1 by using Configuration Manager. You need to recommend a method to maintain the user state information after the refresh completes. What should you include in the recommendation?

A. Create a task sequence that copies the C:\Users folder to the server that runs Microsoft SQL Server.
B. Createa WIM image of all the client computers before the refresh.
C. Create and configure a state migration point.
D. Create a task sequence to rundism.exeon the client computers before the refresh.

Answer: C

NEW QUESTION 172
……

NEW QUESTION 173
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. You discover that the last logon user details are not being updated for all of the client computers. You need to ensure that the last logon user details are updated. Which Configuration Manager discovery method should you use?

A. Active Directory User Discovery
B. Network Discovery
C. Heartbeat Discovery
D. Active Directory System Discovery

Answer: C

NEW QUESTION 174
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site. You have an administrator named Admin1. You discover that Admin1 can create collections that contains servers, laptops, and desktop computers. You create a collection named Collection1. Collection1 contains only desktop computers on the network. You need to ensure that Admin1 can create only collections that contain desktop computers. Which settings should you modify?

A. Security Scopes for Admin1
B. Membership Rules for Collection1
C. Security Roles for Admin1
D. Security for Collection1

Answer: A

NEW QUESTION 175
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment. The environment contains a primary site server named Server1 and a server named Server2 that runs Microsoft SQL Server 2012. Server2 contains the Configuration Manager database. Server2 fails. You install SQL Server 2012 on a new server. You name the server Server3. You need to restore the Configuration Manager database to Server3. What should you do?

A. Register the Service Principal Name (SPN) for the SQL Server service account of Server3. From Server1, run the Configuration Manager Setup Wizard.
B. From Server3, run Microsoft SQL Server Managements Studio, and then restore the backed up SQL Server database and log files.
C. Register the Service Principal Name (SPN) for the SQL Server Service account of Server3. From Server1, run the Site Repair Wizard.
D. From Server3, run Microsoft SQL Server Management Studio, and then attach the backed up SQL Server database and log files.

Answer: A

NEW QUESTION 176
……

You Can Get The Newest 70-243 Dumps In PDF And VCE From — http://www.passleader.com/70-243.html (185q VCE and PDF)

Good Luck!