What should you do?

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table. Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.

A corporate security policy states that remote computers are forbidden to communicate directly with servers on the internal network. You need to ensure that you collect inventory data from the remote computers. What should you do?

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.

Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table. Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.

A corporate security policy states that remote computers are forbidden to communicate directly with servers on the internal network. You need to ensure that you collect inventory data from the remote computers. What should you do?

A.
Install Windows Server Update Serves (WSUS) on Server3.

B.
Configure the Exchange connector on Server3.

C.
Install a management point on Server2.

D.
Install a PXE-enabled protected distribution point on Server6.

E.
Install a software update point on Server3.

F.
Install Network Load Balancing (NLB) on Server6.

G.
Install an enrollment proxy point on Server6.

H.
Install the Windows Cluster service on Server3.

I.
Install a protected distribution point on Server1.

J.
Configure IIS to support only HTTPS on Servers.
K.
Install a management point on Server5.
L.
Install the Windows Cluster service on Server6.
M.
Configure IIS to support only HTTP on Server5.
N.
Install Network Load Balancing (NLB) on Server3.
O.
Install a PXE-enabled protected distribution point on Server4.



Leave a Reply 37

Your email address will not be published. Required fields are marked *


sykmen

sykmen

Correct is K

Ionut D. Loghin

Ionut D. Loghin

The correct answer is K as for you to ensure that you collect inventory data from the remote computers you need a management point on Server 5 (that is on the external network) so that the client can communicate with the MP and retrieve that inventory data.

Google

Google

The time to read or visit the content or web-sites we have linked to below.

Google

Google

Here is an excellent Blog You may Come across Exciting that we encourage you to visit.

how to create an app

how to create an app

always a large fan of linking to bloggers that I adore but really don’t get quite a bit of link really like from

注管理システム

注管理システム

one of our visitors lately advised the following website

how to make your own app

how to make your own app

we came across a cool web site that you just may well love. Take a appear in the event you want

travel

travel

here are some hyperlinks to internet sites that we link to because we believe they are really worth visiting

Lubitski

Lubitski

we came across a cool web page that you simply might delight in. Take a look in the event you want

Free Games

Free Games

Here are a number of the web-sites we recommend for our visitors

Google

Google

The details mentioned in the article are some of the top readily available.

SEO services in Lahore

SEO services in Lahore

below youll discover the link to some web sites that we believe you should visit

mypsychicadvice

mypsychicadvice

we prefer to honor quite a few other web web-sites around the net, even if they arent linked to us, by linking to them. Underneath are some webpages really worth checking out

hawaii volcano lava rock

hawaii volcano lava rock

just beneath, are numerous entirely not related internet sites to ours, however, they are surely really worth going over

surviving military deployments in afghanistan

surviving military deployments in afghanistan

Here is a good Blog You might Locate Exciting that we Encourage You

Cash for cars melbourne

Cash for cars melbourne

we prefer to honor quite a few other world wide web web pages on the net, even when they arent linked to us, by linking to them. Beneath are some webpages worth checking out

受注管理システム

受注管理システム

check below, are some absolutely unrelated sites to ours, nevertheless, they’re most trustworthy sources that we use

app maker free

app maker free

the time to read or go to the subject material or web-sites we’ve linked to below the

SATTA MATKA RESULT

SATTA MATKA RESULT

The data mentioned in the article are several of the best accessible

bellows valve

bellows valve

we came across a cool web-site which you could possibly appreciate. Take a appear should you want

Stop valve

Stop valve

one of our guests just lately advised the following website

apuestas mundial

apuestas mundial

Every once in a whilst we pick blogs that we read. Listed beneath are the most recent sites that we pick out

offshore

offshore

below youll find the link to some web sites that we think you must visit

dl-chloramphenicol

dl-chloramphenicol

very couple of internet sites that take place to be comprehensive beneath, from our point of view are undoubtedly effectively really worth checking out

agie charmilles

agie charmilles

Wonderful story, reckoned we could combine several unrelated data, nonetheless seriously really worth taking a search, whoa did one discover about Mid East has got a lot more problerms as well

プラセンタ

プラセンタ

we came across a cool web site that you may possibly get pleasure from. Take a appear in case you want

プラセンタ

プラセンタ

the time to study or visit the subject material or internet sites we have linked to beneath the

インフルエンザ

インフルエンザ

although sites we backlink to below are considerably not related to ours, we feel they are really really worth a go by, so have a look

インフルエンザ

インフルエンザ

Every once in a when we choose blogs that we read. Listed below would be the most up-to-date internet sites that we choose

what does the brain do

what does the brain do

just beneath, are various completely not associated websites to ours, even so, they are surely worth going over

phone case wood

phone case wood

Every the moment inside a when we choose blogs that we study. Listed below are the most recent web sites that we choose

Garments factory

Garments factory

always a significant fan of linking to bloggers that I like but do not get a lot of link enjoy from

Leila

Leila

Hello, passed 70-243 exam today 923/1000… the 185q dump is 95% valid:

QUESTION 167
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
Configuration Manager has Asset Intelligence enabled.
You do not have an Asset Intelligence synchronization point.
In the Configuration Manager Console, you discover that a number of Inventoried Software entries are listed in an uncategorized state.
You need to change the state of the items that are listed as uncategorized.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.

A. Assign a validated family to each entry.
B. Click Request Catalog Update for each entry.
C. Click ResolveConflict for each entry.
D. Assign a user-defined label for each entry.
E. Assign a user-defined family to each entry.

Answer: BE

QUESTION 168
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains a System Center 2012 Configuration Manager Service Pack 1(SP1) environment.
You discover that information about installed applications fails to appear in the report named Software registered in Add Remove Programs on a specific client computer.
You need to ensure that information about installed applications appears in the report.
What should you do?

A. Modify the Enable hardwareinventory on clients setting.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Modify the Enable software inventory on clients setting.
D. Add a file name to the Hardware Inventory configuration.
E. Add a WMI class to the HardwareInventory Classes list.
F. Add a file name to the Software Inventory configuration.
G. Add a file name to Software Metering.
H. Add a WMI class to the Sms_def.mof file.
I. Select Collect NOIDMIF files in Hardware Inventory.

Answer: C

QUESTION 169
You have a test network that contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You create an operating system deployment task sequence that deploys an image of Windows 8.1. You deploy the task sequence to the All Systems collection.
You discover that client computers in the test environment are not being re-imaged automatically.
You need to ensure that all of the client computers are re-imaged automatically.
What should you do?

A. Modify the deployment verification settings forthe site.
B. For the operating system deployment task sequence deployment, set the Make available to the following option toOnly media and PXE.
C. For the operating system deployment task sequence deployment, set the Make available to the following options toOnly Configuration Manager Clients.
D. Create a new operating system deployment task sequence deployment that uses a custom collection, and then set the purpose toRequired.

Answer: D

QUESTION 170
Your network contains three Active Directory forests named contoso.com, fabrikam.com, and litwareinc.com. All of the forests are untrusted.
In contoso.com, you have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
In each forest, you deploy a distribution point that will be used to perform PXE-based operating system deployments. Each distribution point has the same configuration.
You discover that the operating system deployments can only be performed in contoso.com.
You need to ensure that you can perform the operating system deployments in each forest.
The solution must minimize security changes to the Active Directory environment.
What should you do?

A. Establish a one-way trust relationship from contoso.com to fabrikam.com and from contoso.com to litwareinc.com.
B. Add a Network Access Account for fabrikam.com and litwareinc.com.
C. Establish a one-way trust relationship from fabrikam.com to contoso.com and from litwareinc.com to contoso.com.
D. Add a client push installation account for fabrikam.com and litwareinc.com.

Answer: B

QUESTION 171
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You plan to refresh all of the client computers that run Windows 7 to Windows 8.1 by using Configuration Manager.
You need to recommend a method to maintain the user state information after the refresh completes.
What should you include in the recommendation?

A. Create a task sequence that copies the C:\Users folder to the server that runs Microsoft SQL Server.
B. Createa WIM image of all the client computers before the refresh.
C. Create and configure a state migration point.
D. Create a task sequence to rundism.exeon the client computers before the refresh.

Answer: C

QUESTION 172
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You need to create a Configuration Manager solution to retrieve only the client computers that do not have Microsoft Office 2013 installed.
You create a query.
What should you include in the subquery?

A. Not in
B. Not like
C. < =
D. !=

Answer: A

QUESTION 173
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You discover that the last logon user details are not being updated for all of the client computers.
You need to ensure that the last logon user details are updated.
Which Configuration Manager discovery method should you use?

A. Active Directory User Discovery
B. Network Discovery
C. Heartbeat Discovery
D. Active Directory System Discovery

Answer: C

QUESTION 174
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site.
You have an administrator named Admin1.
You discover that Admin1 can create collections that contains servers, laptops, and desktop computers.
You create a collection named Collection1. Collection1 contains only desktop computers on the network.
You need to ensure that Admin1 can create only collections that contain desktop computers.
Which settings should you modify?

A. Security Scopes for Admin1
B. Membership Rules for Collection1
C. Security Roles for Admin1
D. Security for Collection1

Answer: A

QUESTION 175
……
I have uploaded all the real questions of 70-243 exam to my Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDQWF5bkZHdHZ2UEU
Welcome to download them freely!