READ Free Dumps For Microsoft- 70-243
Question ID 6298 | Your network contains an Active Directory forest.
The forest contains a System Center 2012 Configuration Manager environment.
The environment contains one primary site.
You need to ensure that the members of a group named Group1 are allowed to deploy applications to
desktop computers.
The solution must minimize the number of permissions assigned to Group1.
What should you do?
|
Option A | Assign the Application Administrator security role to Group1. Create a new collection that contains all of
the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
|
Option B | Add the Applicaton Deployment Manager security role to Group1. Create a new collection that contains all
of the desktop computers. Add Group1 to the local Administrators group on each desktop computer.
|
Option C | Assign the Application Deployment Manager security role to Group1. Create a new collection that
contains all of the desktop computers. Scope Group1 to the new collection.
|
Option D | Assign the Application Administrator security role to Group1. Create a new collection that contains all of
the desktop computers. Scope Group1 to the new collection.
|
Correct Answer | C |
Explanation http://technet.microsoft.com/en-us/library/hh524341.aspx Glossary for Microsoft System Center 2012 Configuration Manager Application Administrator A security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role. Application Deployment Manager A security role that grants permissions to administrative users so that they can deploy and monitor applications. http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-administration-in-system-center-2012- configuration-manager.aspx Role-Based Administration in System Center 2012 Configuration Manager In Configuration Manager 2012, Security Roles are used to collectively group objects and permissions (operations) for assignment to an Administrator. Instead of an individual permission set on a single instance of object, the Security Role provides a single Role assignment to an administrator; reducing the overall complexity with permission management. An “object†in the Security Role is something that you want to manage access to and “permission†is the operational functions, such as Read, Modify and Delete.
Question ID 6299 | Your network contains a single Active Directory domain.
The domain contains a System Center Configuration Manger 2007 site and a System Center 2012
Configuration Manager site.
You need to ensure that you can migrate objects from Configuration Manger 2007 to Configuration
Manager 2012.
What should you do?
|
Option A | Assign the computer account of the Central Administration site server permission to the Configuration
Manger 2007 site.
|
Option B | . Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration Manager
2012 primary site.
|
Option C | Extend the Active Directory schema and assign the Central Administration site server permissions to the
System\System Management container
|
Option D | Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration Manager
2007 primary site.
|
Correct Answer | A |
Explanation Explanation/Reference: Answer: Assign the computer account of the Central Administration site server permission to the Configuration Manger 2007 site. Assign the computer account of the Central Administration site server permission to the Microsoft SQL Server database instance. Explanation: http://technet.microsoft.com/en-us/library/gg712991.aspx Determine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration Manager In Microsoft System Center 2012 Configuration Manager, the built-in migration functionality replaces in-place upgrades of existing Configuration Manager infrastructure by providing a process that transfers data from active Configuration Manager 2007 sites. The functionality provided by migration helps you maintain investments that you have made in configurations and deployments while you can take full advantage of core changes in the product introduced in System Center 2012 Configuration Manager. These changes include a simplified Configuration Manager hierarchy that uses fewer sites and resources, and the improved processing by use of native 64-bit code that runs on 64-bit hardware. Migration can transfer most data from Configuration Manager 2007. http://technet.microsoft.com/en-us/library/gg681981.aspx Planning for Migration to System Center 2012 Configuration Manager You must first install a System Center 2012 Configuration Manager hierarchy to be the destination hierarchy before you can migrate data from a supported source hierarchy. After you install the destination hierarchy, configure the management features and functions that you want to use in your destination hierarchy before you start to migrate data. http://technet.microsoft.com/en-us/library/gg712313.aspx Prerequisites for Migration in System Center 2012 Configuration Manager To migrate from a supported source hierarchy, you must have access to each applicable Configuration Manager source site, and permissions within the System Center 2012 Configuration Manager destination site to configure and run migration operations. Required Configurations for Migration .. Data Gathering To enable the destination site to gather data, you must configure the following two source site access accounts for use with each source site: * Source Site Account: This account is used to access the SMS Provider of the source site. * For a Configuration Manager 2007 SP2 source site, this account requires Read permission to all source site objects. * For a System Center 2012 Configuration Manager source site, this account requires Read permission to all source site objects, You grant this permission to the account by using role-based administration. * Source Site Database Account: This account is used to access the SQL Server database of the source site and requires Read and Execute permissions to the source site database. You can configure these accounts when you configure a new source hierarchy, data gathering for an additional source site, or when you reconfigure the credentials for a source site. These accounts can use a domain user account, or you can specify the computer account of the top-level site of the destination hierarchy. Security Note: If you use the Configuration Manager computer account for either access account, ensure that this account is a member of the security group Distributed COM Users in the domain where the source site resides. When gathering data, the following network protocols and ports are used: NetBIOS/SMB – 445 (TCP) RPC (WMI) - 135 (TCP) SQL Server - 1433 (TCP)