DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
Three users named User1, User2, and User3 will perform the following tasks:
User1 will review software metering data and inventory reports.
User2 will deploy applications and create alerts.
User3 will deploy applications and create distribution point groups.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer area. Each
security role may be used once, more than once, or not at all. Additionally, you may need to
drag the split bar between panes or scroll to view content.
What should you identify?
DRAG DROP
Your network contains a System Center 2012 Configuration Manager environment.
Three users named User1, User2, and User3 will perform the following tasks:
User1 will review software metering data and inventory reports.
User2 will deploy applications and create alerts.
User3 will deploy applications and create distribution point groups.
You need to identify which security role must be assigned to which user.
What should you identify?
To answer, drag the appropriate security role to the correct user in the answer area. Each
security role may be used once, more than once, or not at all. Additionally, you may need to
drag the split bar between panes or scroll to view content.
for software metering Asset Manager is required
Application Deployment Manager Role can be used for – User2 will deploy applications and create alerts.
User 3- I am not sure
http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-2012-configuration-manager.aspx