70-246 - Monitoring and Operating a Private Cloud with System Center 2012

Go back to Microsoft

Exam FAQ

How much does the 70-246 exam cost? What is the best way to study for the 70-246 exam?

Example Questions

Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. The network includes servers that run Windows Server 2008 R2 Hyper-V and are managed by servers running System Center 2012 ­ Virtual Machine Manager (VMM). You need to configure VMM to enable the deployment of multi-tiered applications. Which two objects should you create in the VMM library for a multi-tiered application? You work as a Network Administrator at ABC.com. The network includes a System Center 2012 infrastructure. System Center 2012 ­ Service Manager is used in the company for the tracking and resolution of technical support tickets. Users use the Service Manager Self-Service Portal to create incidents to report technical issues. A server hosting a line-of-business application develops a fault. You discover that users have created many incidents reporting the same problem. What is the quickest way to resolve all the incidents? To view Application Performance Monitoring event details, you must install the Operations Manager web console. Which of the following is NOT a valid requirement for installing web console? After you deploy your first site using Configuration Manager, you can configure settings that apply across the hierarchy and settings that are specific to individual sites Which of these settings can you configure for a specific site? Daily recovery point size refers to the total size of changes made to protected data during a single day. It is roughly equivalent to the size of an incremental backup. Retention range refers to the number of days for which you want to store recovery points of protected data on disk. Complete the missing terms below: For files, DPM can store a maximum of ___ recovery points for each volume included in a protection group, and it can create a maximum of ___ scheduled recovery points for each protection group each day. Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. You have a Windows Server 2008 R2 VM running Internet Information Services (IIS) that hosts a web based application. The VM is hosted at your ISP and is not part of your private cloud. You want to monitor the web application from your System Center 2012 infrastructure. You want incidents to be generated by System Center 2012 ­ Service Manager when the web application is offline. How should you configure the System Center 2012 infrastructure? You work as a Network Administrator at ABC.com. The network includes a System Center 2012 infrastructure. A private cloud is hosted in a datacenter and managed by System Center 2012. System Center 2012 ­ Operations Manager (SCOM) is used to monitor all servers and virtual machines in the cloud and on the corporate LAN. You host a distributed application for a customer named CustomerApp1. The SLA (Service Level Agreement) for CustomerApp1 provides 99% uptime for the application. You need a solution to measure the uptime of CustomerApp1. What should you include in your solution? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. System Center 2012 ­ Operations Manager (SCOM) is used to monitor all network devices. You need to provide a user named Mia with the ability to create, edit, and delete monitoring configurations (tasks, rules, monitors, and views) in the SCOM console. Mia also needs to be able to create and delete management packs. Company security policy states that all users should have the minimum permissions necessary to perform their required functions. Which SCOM user role should you assign Mia to? This question refers to Content Management Package Access Accounts enable you to set NTFS permissions to specify the users and user groups that can access package content on distribution points. If you create or modify the account after the package is created, you must do what? Data Protection Manager (DPM) provides protection for which of the following items: Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. System Center 2012 ­ Operations Manager (SCOM) is used to monitor all network devices. You are configuring management packs for Operations Manager. You plan to create a management pack containing a group. You want the group to reference views and overrides contained in other management packs. Which of the following statements are true? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. The network infrastructure and private cloud is monitored by System Center 2012 ­ Operations Manager (SCOM). Messaging Administrators deploy Microsoft Exchange Server 2010 throughout the company. You want to use SCOM to monitor the Exchange servers. You will import the Exchange Server 2010 Management Pack into SCOM. You want to configure SCOM to send SMS notifications related to the Exchange Servers to the Messaging Administrators. What should you do first? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. System Center 2012 ­ Operations Manager (SCOM) is used to monitor all network devices. You create an unsealed management pack named NewMP and an override for NewMP. Another unsealed management pack named OldMP contains a group. You need to apply the NewMP override to the OldMP group. Which two of the following options would enable you to achieve this? (Choose two possible answers). Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. The network includes servers that run Windows Server 2008 R2 Hyper-V and are managed by servers running System Center 2012 ­ Virtual Machine Manager (VMM). You are configuring a hardware profile in VMM. The hardware profile will be used to create virtual machines configured for Windows Network Load Balancing. In the Network Adapter Properties, you configure the network adapter to be connected to a logical network and to use a Static IP address from the Static IP Pool. You now need to configure the MAC address options. Which two of the following options should you configure? (Choose two). You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services domain. The network includes two Windows Server 2008 domain controllers named ABC-DC1 and ABC- DC2. You deploy System Center 2012 ­ Operations Manager (SCOM) to monitor network servers. The SCOM agent is installed automatically on ABC-DC1 and ABC-DC2 using a push install from SCOM. You install a third Windows Server 2008 domain controller named ABC-DC3 and manually install the SCOM agent on the new domain controller. The SCOM console displays an alert with the following error for ABC-DC3: "The script `AD Database and Log' failed to create object `McActiveDir.ActiveDirectory'. The error returned was: `ActiveX component can't create object' (0x1AD)" There are no errors for ABC-DC1 and ABC-DC2. How can you resolve the error? You work as a Network Administrator at ABC.com. The network includes a System Center 2012 infrastructure. System Center 2012 ­ Orchestrator (SCO) is deployed as part of the System Center 2012 infrastructure to automate tasks within the network. You have created a complex runbook in SCO. You want to test the runbook using RunBook Tester and debug each activity in the runbook. What should you do before running the Runbook Tester? Complete the missing word(s) below: When a site server fails, information about packages and applications contained in the content library is restored to the site database as part of the restore process, but the content library files are not restored as part of the process. If you do not have a file system backup to restore the content library, you can create a ___ file from another site that contains the packages and applications that you need, and then extract the content file on the recovered site server. Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. System Center 2012 ­ Operations Manager (SCOM) is used to monitor all network devices. You need to provide a user named Clive with the ability to enumerate monitors, enumerate monitoring objects and review application monitoring alerts in the SCOM console. Company security policy states that all users should have the minimum permissions necessary to perform their required functions. Which SCOM user role should you assign Clive to? The Network Access Account is used by client computers when they cannot use their local computer account to access content on distribution points. For example, this applies to workgroup clients and computers from untrusted domains. This account might also be used during operating system deployment when the computer installing the operating system does not yet have a computer account on the domain. Which of the following is FALSE The Content Status node in the Monitoring workspace provides information about content packages. From the Configuration Manager console, you can review information such as the package name, type, how many distribution points have been targeted, the compliance rate, when the package was created, package ID, and source version. You will also find information about: You work in the Cloud Services department at ABC.com. The company has a private cloud hosted on a System Center 2012 infrastructure. The infrastructure includes a System Center 2012 - Configuration Manager site server and a System Center 2012 - Service Manager management server. The two System Center components are installed on separate servers. A baseline named Corp-Servers contains several configuration items. You want to configure incident management to automatically generate desired configuration management­based incidents for each Service Manager configuration item that is reported as noncompliant against the values defined in the baseline. You configure a connector to import information into Service Manager. What should you do next? A child primary site that uses a remote installation of SQL Server cannot support more clients than is supported by the version of SQL Server that is in use at the central administration site, which can limit the total number of clients the hierarchy supports. The version of SQL Server that is used by a secondary site does not affect the number of clients that the primary site supports. For a typical DPM deployment there is a recommended RAID configuration. This configuration provides an effective compromise between capacity, cost, reliability, and performance. What RAID configuration is this? Because discovery can generate a large volume of network traffic, and the resultant DDRs can result in a significant use of CPU resources during processing, plan to use only those discovery methods that you require to meet your goals. Which discovery method allows you to find printers and routers? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The company has a System Center 2012 infrastructure that includes the following servers: ABC-SRV1 runs System Center 2012 ­ Configuration Manager (SCCM). ABC-SRV2 runs System Center 2012 ­ Service Manager (SCSM). ABC-SRV3 runs System Center 2012 ­ Operations Manager (SCOM). ABC-SRV4 runs System Center 2012 ­ Virtual Machine Manager (SCVMM). The private cloud hosts a virtual desktop infrastructure (VDI) that consists of 100 virtual machines (VMs) running Windows 7 Enterprise. A corporate custom application is deployed to each Windows 7 VM. The vendor of the application releases an important security update for the application. You need to ensure that all Windows 7 VMs have the new version of the application installed. How can you check that each VM has the new version of the application? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. The network infrastructure and private cloud is monitored by System Center 2012 ­ Operations Manager (SCOM). The network contains a number of application servers that run applications used by company employees. All application servers in the network have computer accounts in an Active Directory organizational unit (OU) named AppServersOU. You want SCOM to generate an alert when an error is added to the Application Event logs on the application servers. You create a dynamic group named AppServsGroup in SCOM using the following query: ( Object is Windows Computer AND ( Organizational Unit Equals Computers ) AND True ) You create a rule named AppServsRule targeted to AppServsGroup in SCOM to generate an alert when an error is added to the Application Event logs. You discover that the alerts are not generated as expected when errors are added to the event logs on the application servers. What is the most likely cause of the failure? Your role of Network Administrator at ABC.com includes the management of the network infrastructure and the System Center 2012 infrastructure. The network includes a subnet named Subnet1. You use System Center 2012 ­ Operations Manager (SCOM) to manage all the network devices on Subnet1. All network devices on Subnet1 use SNMP. You add a second subnet to the network named Subnet2. All network devices on Subnet2 also use SNMP. A firewall separates the two subnets. How can you ensure that the SCOM device discovery process can discover all the network devices on Subnet2? Your role of Network Administrator at ABC.com includes the management of the network infrastructure and the System Center 2012 infrastructure. All servers on the network run Windows Server 2008 R2. The network includes a subnet named Subnet1. You add a second subnet to the network named Subnet2. A firewall separates the two subnets. The firewall is configured to block traffic on port numbers above 1024. All other network traffic is allowed through the firewall. A server on Subnet1 running the Audit Collection Services (ACS) Forwarder role needs to send events to server on Subnet2 running the Audit Collection Services (ACS) Collector role. How can you enable the ACS traffic? The storage pool is a set of disks on which the DPM server stores the replicas and recovery points for the protected data. Planning the storage pool involves calculating capacity requirements and planning the configuration of the disks. Which of the following can you NOT use for the storage pool: You work as a Network Administrator at ABC.com. The network includes a System Center 2012 infrastructure. A private cloud is hosted on Windows Server 2008 R2 Hyper-V servers and managed by System Center 2012. The Hyper-V servers are backed up by servers running System Center 2012 - Data Protection Manager (DPM). The DPM servers currently store backups on local disks. To increase the storage capacity on a DPM server, you install a tape drive. After adding the tape drive to the DPM server, you open the DPM Administrator Console and discover the tape drive is not listed. You confirm that the tape drive is listed in Windows Device Management and the correct driver is installed. In the DPM Administrator Console, you click Management on the navigation bar. What should you do next? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. You use System Center 2012 ­ Operations Manager (SCOM) to manage all network devices. The SCOM management server has the IP address 192.168.1.52. You add a second subnet to the network. The network address of the second subnet is 192.168.2.0/24. Network communications are controlled by a firewall separating the two subnets. The network ports used by SNMP are blocked on the firewall. You install a new switch on the second subnet. The IP address of the switch is 192.168.2.7. You need to discover the new switch from the SCOM management server. You open the Computer and Device Management Wizard in SCOM. Which options should you configure in the Add a Device window? Application management in SystemCenter2012 ConfigurationManager provides Configuration Manager administrative users and the users of Configuration Manager client devices with tools to manage applications in the enterprise. Complete the missing term below: A new client program,___, provides a user-friendly interface that allows the user of a client computer to perform typical tasks to help manage software installed by Configuration Manager on their devices This question refers to Content Management in Configuration Manager. If you want to choose how to manage the content on a per-package basis what should you do? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. System Center 2012 ­ Operations Manager (SCOM) is used to monitor the servers in the private cloud. An SCOM monitor targets all the servers in the private cloud. You want to create an override for the monitor to target only the servers that have a specific application installed. A registry value is used to identify the servers with the application installed. Which two of the following should you create to use with the override? (Choose two). You work as a Network Administrator at ABC.com. The network includes a System Center 2012 infrastructure. System Center 2012 ­ Service Manager (SCSM) with the Self-Service Portal and System Center 2012 ­ Virtual Machine Manager (SCVMM) with its Self-Service Portal are deployed as part of the System Center 2012 infrastructure. Members of a group named UserVMs are able to create VMs using the SCVMM Self-Service Portal. You create a service offering to enable users to add their user accounts to the UserVMs group. A single request offering is contained in the service offering. You learn that all membership requests for the UserVMs group must first be approved before a user is added to the group. What should you do? You work as a Network Administrator at ABC.com. The network includes a System Center 2012 infrastructure. System Center 2012 ­ Service Manager (SCSM) with the Self-Service Portal is deployed as part of the System Center 2012 infrastructure. You need to create a service offering and restrict access to the service offering to the Finance Manager and the Finance Director. Which two of the following actions should you perform to restrict access to the service offering? (Choose two). Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. System Center 2012 ­ Operations Manager (SCOM) is used to monitor all network devices. You need to provide network technicians with the ability to view critical alerts generated by network servers and to determine whether an alert was generated by a monitor in SCOM or a rule. You create a group named Technicians in Active Directory and configure a dashboard in SCOM. How can you configure the dashboard to provide the required information? System Center 2012 Configuration Manager System Requirements. How many secondary sites can a primary site support? Before you install site system roles, you should identify the site types that can or cannot support specific site system roles, and how many instances of each site system role you can install at a site or across a hierarchy. Which of the following site roles can you install multiple instances of on a primary site? Which term is described below: A feature in Operations Manager that allows the collection of client application crash data to a single location on a management server, resulting in data that can then be analyzed by your company for patterns. When companies first deploy Configuration Manager in a production environment, they often run multiple site system roles on the site server and have additional site system servers for distribution points. Then they install additional site system servers and add new site system roles, according to their business requirements and network infrastructure. Which additional role validates Configuration Manager Network Access Protection (NAP) policies? Complete the missing word below: Heartbeat Discovery is enabled when you install a Configuration Manager primary site and does not have to be enabled. Keep Heartbeat Discovery enabled as this method ensures that the ___ for devices are up-to-date. You work as a Network Administrator at ABC.com. The network includes a System Center 2012 infrastructure. System Center 2012 ­ Service Manager is used in the company for the tracking and resolution of technical support tickets. The manager of the Technical Support department wants to receive an email every time a high- priority incident ticket is updated. What should you configure in the Service Manager Console? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. System Center 2012 ­ Operations Manager (SCOM) is used to monitor all network devices. You open the Operations Manager console and go to the Network Devices view. The console shows that a network switch is in a critical state. You need a historical view of the switch to determine how long it has had problems. You also want see which computers are connected to the switch. How can you view the required information? Application management in System Center 2012 Configuration Manager provides Configuration Manager administrative users and the users of Configuration Manager client devices with tools to manage applications in the enterprise. Complete the missing term below: Users can install software directly from the ___ self-service website. Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. The network includes servers that run Windows Server 2008 R2 Hyper-V and are managed by servers running System Center 2012 ­ Virtual Machine Manager (VMM). The network infrastructure is monitored by System Center 2012 ­ Operations Manager (SCOM). You plan to create a distributed application as a service using the three-tier application template in VMM. You want to configure SCOM to display diagrams and monitor the distributed application. The VMs used in the distributed application will run Windows Server 2008 R2. You import the Windows Server Operating System management pack into SCOM to monitor the VM operating systems. Which of the following management packs should you import to monitor the front-end and back- end tiers of the three-tier application? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. The network includes two subnets named Subnet1 and Subnet2. The switches on Subnet1 all run SNMPv1 and have the community string "Subnet1". The switches on Subnet2 all run SNMPv2c and have the community string "Subnet2". You want to use System Center 2012 ­ Operations Manager (SCOM) to manage all the network switches. How can you ensure that the SCOM device discovery process can discover all the switches in both subnets? What should you do if you want to avoid any alerts or errors that might occur when a monitored object, such as a computer or distributed application, is taken offline for maintenance? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. You are hosting a line-of-business web application in the cloud. You have configured a distributed application for the web application. An SLA for the web application specifies an average CPU utilization of no more than 70%. You are configuring a Service Level Objective (SLO) to monitor the CPU utilization of the distributed application. Which options should you select when creating the SLO? Your role of Systems Administrator at ABC.com includes the management of the company's private cloud. The private cloud is hosted on an internal System Center 2012 infrastructure. A Windows Server 2008 VM running Internet Information Services (IIS) hosts a .NET web based application. The application stores data in a Microsoft SQL Server 2008 database. You use System Center 2012 ­ Operations Manager (SCOM) to monitor the availability of the web application from an SCOM Watcher Node. You now want to configure SCOM to monitor the SQL Server database used by the web application. You want to monitor the following: Success of the database connection or query. Time to connect to database. Time to complete the query. Time to fetch results of query. How should you configure the required monitoring?

Study Guides