You deploy System Center 2012 Operations Manager. You create two unsealed management packs named MP1 and MP2. You create an override for MP1. You create a group in MP2. You need to apply the override for MP1 to the group in MP2. What should you do before you apply the override?
A. Create a new class in MP2.
B. Seal MP1.
C. Seal MP2.
D. Create a new class in MP1.
When you create a group, you save it to an unsealed management pack. However, an element in an unsealed management pack, such as a group, cannot reference an element in a different unsealed management pack, such as an override or a view. If you are going to use a group to target an override or scope a view, you must either save the group to the same unsealed management pack as the override or view, or you must seal the management pack that contains the group. If you save the group to the same unsealed management pack as the override or view, you can only use that group for overrides and views that are also contained in that unsealed management pack. If you seal the management pack that contains the group, you can reference that group from other unsealed management packs. However, you cannot easily change any group settings in the sealed management pack or add new groups to the sealed management pack. http://www.code4ward.net/main/Blog/tabid/70/EntryId/130/Implications-when-using-groups-from-a-sealed-MPfor-overrides.aspx
Your company has a private cloud that is managed by using a System Center 2012 infrastructure. You deploy an application visualization solution. You deploy a server named Server1, and then you install the Remote Desktop Services server role. Server1 is monitored by using Operations Manager. You deploy a virtualized application named App1 to Server1. You need to set the state of Server1 to critical if CPU utilization by App1 exceeds 80 percent for five minutes. What should you create?
A. a rule
B. a monitor
C. a service level objective (SLO)
D. an event subscription
E. a synthetic transaction
You can configure a service level objective (SLO) to define the availability and performance goals for an application. In the following procedure, you create a new service level (LOB Application 1) against a distributed application, define a Monitor SLO that is based on availability (99.9% uptime), and define a Collection Rule SLO that is based on a performance rule (80% average processor time). http://technet.microsoft.com/en-us/library/dd441412.aspx Very similar to question 35 on exam A:
Server name changed from RDServer1 to Server1
Application name changed from VirtualApp1 to just App1 Threshold and duration time changed.
Your company has a private cloud that contains a System Center 2012 Orchestrator infrastructure. You are creating a runbook named runbook1. You need to ensure that the workflow starts when a file is added to a folder. From which category should you add an activity? To answer, select the appropriate category in the answer area.
You deploy a new virtual machine named VM29 for App1. You view VM29 from the Operations Manager console. You discover that VM29 is not visible when viewing the health of App1. You need to ensure that VM29 is visible when viewing the health of App1. What should you do?
A. Edit the distributed application design.
B. Run a network devices discovery rule.
C. Edit the application monitoring rules.
D. Run an Active Directory server discovery rule.
Your company has a private cloud that contains two Active Directory forests named contoso.com and adatum.com. The contoso.com network and the adatum.com network are separated by a firewall. No trusts exist between the forests. You deploy System Center 2012 Operations Manager to contoso.com. You install agents on 100 servers in both forests. You need to ensure that you can monitor all 100 servers. The solution must minimize the traffic between the two networks. What should you install? (Each correct answer presents part of the solution. Choose all that apply.)
A. a server certificate on the gateway server in adatum.com
B. client certificates on all of the servers in adatum.com
C. a gateway server in contoso.com
D. client certificates on all of the servers in contoso.com
E. a server certificate on the gateway server in contoso.com
F. a server certificate on the management server in contoso.com
G. a gateway server in adatum.com
Scenario: A Citrix Engineer needs to implement a patch file for an App Controller. The engineer has already downloaded the patch from the Citrix website.
What should the engineer do to implement the patch?
A. Copy the patch to the App Controller file system.
B. Import the patch from the App Controller Console menu.
C. Install the patch using the Import function in the Release Management section of the App Controller.
D. Apply the patch using the Upgrade function in the Release Management section of the App Controller.
The current XenMobile license expired and a Citrix Engineer is unable to log in to the Device Manager console to replace the license file.
Which action should the engineer take to regain access to the Device Manager console?
A. Re-run the install to add the new license file.
B. Reboot the server and then log on to the console.
C. Log on to the Citrix portal to renew the license file.
D. Copy the new license file in the appropriate directory on the server.
Scenario: An Automated Action set to trigger on the event “Device noncompliance of B/W app policy” is configured to notify the user with the following message:
“This application is not approved for your mobile device. Please remove it or access to your email will be denied.”
Which type of Access policy should a Citrix Engineer create to support implementation of the Automated Action?
C. Required list
D. Suggested list
A Citrix Engineer needs to load balance enrollment requests from Apple iOS devices.
The engineer should implement an SSL Offload virtual server using __________ protocol and port __________. (Choose the correct set of options to complete the sentence.)
A. SSL; 443
B. TCP; 443
C. SSL; 8443
D. TCP; 8443
Exam Code: M2150-225
Exam Name: IBM Tivoli Internet Security Systems Sales Mastery Test v2
IBM Security positions its products as being “ahead of the threat-How is this achieved?
A. By relying on regular signature updates.
B. By not disclosing vulnerabilities until a patch is available for products.
C. By not relying on signature updates and utilizing heuristics.
D. By taking feeds from the global Managed Security Services operation and providing updates
in real time.