Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.
Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table. Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.
A corporate security policy states that remote computers are forbidden to communicate directly with servers on the internal network. You need to ensure that you collect inventory data from the remote computers. What should you do?
A.
Install Windows Server Update Serves (WSUS) on Server3.
B.
Configure the Exchange connector on Server3.
C.
Install a management point on Server2.
D.
Install a PXE-enabled protected distribution point on Server6.
E.
Install a software update point on Server3.
F.
Install Network Load Balancing (NLB) on Server6.
G.
Install an enrollment proxy point on Server6.
H.
Install the Windows Cluster service on Server3.
I.
Install a protected distribution point on Server1.
J.
Configure IIS to support only HTTPS on Servers.
K.
Install a management point on Server5.
L.
Install the Windows Cluster service on Server6.
M.
Configure IIS to support only HTTP on Server5.
N.
Install Network Load Balancing (NLB) on Server3.
O.
Install a PXE-enabled protected distribution point on Server4.
K
K
K
Correct is K
K
The correct answer is K as for you to ensure that you collect inventory data from the remote computers you need a management point on Server 5 (that is on the external network) so that the client can communicate with the MP and retrieve that inventory data.
The time to read or visit the content or web-sites we have linked to below.
Here is an excellent Blog You may Come across Exciting that we encourage you to visit.
always a large fan of linking to bloggers that I adore but really don’t get quite a bit of link really like from
one of our visitors lately advised the following website
we came across a cool web site that you just may well love. Take a appear in the event you want
here are some hyperlinks to internet sites that we link to because we believe they are really worth visiting
we came across a cool web page that you simply might delight in. Take a look in the event you want
Here are a number of the web-sites we recommend for our visitors
The details mentioned in the article are some of the top readily available.
below youll discover the link to some web sites that we believe you should visit
we prefer to honor quite a few other web web-sites around the net, even if they arent linked to us, by linking to them. Underneath are some webpages really worth checking out
just beneath, are numerous entirely not related internet sites to ours, however, they are surely really worth going over
Here is a good Blog You might Locate Exciting that we Encourage You
we prefer to honor quite a few other world wide web web pages on the net, even when they arent linked to us, by linking to them. Beneath are some webpages worth checking out
check below, are some absolutely unrelated sites to ours, nevertheless, they’re most trustworthy sources that we use
the time to read or go to the subject material or web-sites we’ve linked to below the
The data mentioned in the article are several of the best accessible
we came across a cool web-site which you could possibly appreciate. Take a appear should you want
one of our guests just lately advised the following website
Every once in a whilst we pick blogs that we read. Listed beneath are the most recent sites that we pick out
below youll find the link to some web sites that we think you must visit
very couple of internet sites that take place to be comprehensive beneath, from our point of view are undoubtedly effectively really worth checking out
Wonderful story, reckoned we could combine several unrelated data, nonetheless seriously really worth taking a search, whoa did one discover about Mid East has got a lot more problerms as well
we came across a cool web site that you may possibly get pleasure from. Take a appear in case you want
the time to study or visit the subject material or internet sites we have linked to beneath the
although sites we backlink to below are considerably not related to ours, we feel they are really really worth a go by, so have a look
Every once in a when we choose blogs that we read. Listed below would be the most up-to-date internet sites that we choose
just beneath, are various completely not associated websites to ours, even so, they are surely worth going over
Every the moment inside a when we choose blogs that we study. Listed below are the most recent web sites that we choose
always a significant fan of linking to bloggers that I like but do not get a lot of link enjoy from
Hello, passed 70-243 exam today 923/1000… the 185q dump is 95% valid:
QUESTION 167
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
Configuration Manager has Asset Intelligence enabled.
You do not have an Asset Intelligence synchronization point.
In the Configuration Manager Console, you discover that a number of Inventoried Software entries are listed in an uncategorized state.
You need to change the state of the items that are listed as uncategorized.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
A. Assign a validated family to each entry.
B. Click Request Catalog Update for each entry.
C. Click ResolveConflict for each entry.
D. Assign a user-defined label for each entry.
E. Assign a user-defined family to each entry.
Answer: BE
QUESTION 168
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains a System Center 2012 Configuration Manager Service Pack 1(SP1) environment.
You discover that information about installed applications fails to appear in the report named Software registered in Add Remove Programs on a specific client computer.
You need to ensure that information about installed applications appears in the report.
What should you do?
A. Modify the Enable hardwareinventory on clients setting.
B. Enable a default WMI class in the Hardware Inventory Classes list.
C. Modify the Enable software inventory on clients setting.
D. Add a file name to the Hardware Inventory configuration.
E. Add a WMI class to the HardwareInventory Classes list.
F. Add a file name to the Software Inventory configuration.
G. Add a file name to Software Metering.
H. Add a WMI class to the Sms_def.mof file.
I. Select Collect NOIDMIF files in Hardware Inventory.
Answer: C
QUESTION 169
You have a test network that contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You create an operating system deployment task sequence that deploys an image of Windows 8.1. You deploy the task sequence to the All Systems collection.
You discover that client computers in the test environment are not being re-imaged automatically.
You need to ensure that all of the client computers are re-imaged automatically.
What should you do?
A. Modify the deployment verification settings forthe site.
B. For the operating system deployment task sequence deployment, set the Make available to the following option toOnly media and PXE.
C. For the operating system deployment task sequence deployment, set the Make available to the following options toOnly Configuration Manager Clients.
D. Create a new operating system deployment task sequence deployment that uses a custom collection, and then set the purpose toRequired.
Answer: D
QUESTION 170
Your network contains three Active Directory forests named contoso.com, fabrikam.com, and litwareinc.com. All of the forests are untrusted.
In contoso.com, you have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
In each forest, you deploy a distribution point that will be used to perform PXE-based operating system deployments. Each distribution point has the same configuration.
You discover that the operating system deployments can only be performed in contoso.com.
You need to ensure that you can perform the operating system deployments in each forest.
The solution must minimize security changes to the Active Directory environment.
What should you do?
A. Establish a one-way trust relationship from contoso.com to fabrikam.com and from contoso.com to litwareinc.com.
B. Add a Network Access Account for fabrikam.com and litwareinc.com.
C. Establish a one-way trust relationship from fabrikam.com to contoso.com and from litwareinc.com to contoso.com.
D. Add a client push installation account for fabrikam.com and litwareinc.com.
Answer: B
QUESTION 171
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You plan to refresh all of the client computers that run Windows 7 to Windows 8.1 by using Configuration Manager.
You need to recommend a method to maintain the user state information after the refresh completes.
What should you include in the recommendation?
A. Create a task sequence that copies the C:\Users folder to the server that runs Microsoft SQL Server.
B. Createa WIM image of all the client computers before the refresh.
C. Create and configure a state migration point.
D. Create a task sequence to rundism.exeon the client computers before the refresh.
Answer: C
QUESTION 172
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment.
You need to create a Configuration Manager solution to retrieve only the client computers that do not have Microsoft Office 2013 installed.
You create a query.
What should you include in the subquery?
A. Not in
B. Not like
C. < =
D. !=
Answer: A
QUESTION 173
Your network contains a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) environment.
You discover that the last logon user details are not being updated for all of the client computers.
You need to ensure that the last logon user details are updated.
Which Configuration Manager discovery method should you use?
A. Active Directory User Discovery
B. Network Discovery
C. Heartbeat Discovery
D. Active Directory System Discovery
Answer: C
QUESTION 174
You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) stand-alone primary site.
You have an administrator named Admin1.
You discover that Admin1 can create collections that contains servers, laptops, and desktop computers.
You create a collection named Collection1. Collection1 contains only desktop computers on the network.
You need to ensure that Admin1 can create only collections that contain desktop computers.
Which settings should you modify?
A. Security Scopes for Admin1
B. Membership Rules for Collection1
C. Security Roles for Admin1
D. Security for Collection1
Answer: A
QUESTION 175
……
I have uploaded all the real questions of 70-243 exam to my Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDQWF5bkZHdHZ2UEU
Welcome to download them freely!