Your company has a private cloud that is managed by using a System Center 2012 infrastructure. The network contains a Microsoft SharePoint Server 2010 server farm. The server farm is hosted on 20 virtual machines. You deploy a custom solution to the SharePoint server farm. The solution requires that a new Web.config file be deployed to all of the front-end servers. You need to identify which front-end servers have an outdated version of the Web.config file. What should you do?
A. From Operations Manager, create a monitor.
B. From Service Manager, create a Virtual Machine Manager (VMM) connector.
C. From Virtual Machine Manager (VMM), deploy a service template.
D. From Configuration Manager, deploy a Desired Configuration Management baseline.
Desired configuration management in Configuration Manager 2007 allows you to assess the compliance of computers with regard to a number of configurations, such as whether the correct Microsoft Windows operating system versions are installed and configured appropriately, whether all required applications are installed and configured correctly, whether optional applications are configured appropriately, and whether prohibited applications are installed. Additionally, you can check for compliance with software updates and security settings. http://technet.microsoft.com/en-us/library/bb680553.aspx By Gol: Typical Microsft question. Should you create a baseline first or just monitor.
For me identify = Operations Manager
Your company has a private cloud that is managed by us.ng a System Center 2012 infrastructure. You have a web application named App1 that is hosted in another datacenter. The datacenter is not part of the private cloud. You need to ensure that Service Manager incidents are generated automatically when App1 is unavailable. What should you create?
A. a Service Level Tracking object
B. an event subscription
C. a channel
D. a synthetic transaction
To monitor the application that runs on these traditional platforms we leverage custom MP’s, synthetic transactions to be able to test websites, and HTTP probes to test web services ensuring that the outside-in functionality of the application is available. http://blogs.technet.com/b/server-cloud/archive/2012/03/29/using-system-center-2012-to- monitor-theinfrastructure-amp-application-layers-for-private-public-and-traditional- environments.aspx
Your company has a private cloud that contains a System Center 2012 Service Manager instance. Service Manager has the Self-Service Portal installed. You create a service offering that contains a single request offering. The service offering provides logged-on users with the ability to add their user account automatically to a group named ServiceGroup1. The company’s security policy requires that an administrator named Admin1 must approve all requests for group membership change. You need to configure the infrastructure to meet the requirements of the company’s security policy.
What should you modify?
A. the service offering
B. the service request template
C. the request offering
D. the Service Offering Category list
I am brand new to SCSM/SCOrch and am fumbling my way through it. I have finally gotten a runbook successfully created, service request offering completed, and published it to the portal. I filled it out and submitted it on the portal a couple hours ago and it still sits “In progress”. I cannot for the life of me figure out how in the world to approve the request. I assume once I approve it the rest will be completed automatically.
Can anyone help? Please?
For approval you need to add a Review Activity to the Service Request Template at the Activity tab.
Marcel Zehner wrote a good blog post about this:
News in SCSM12 (Beta) #2 ?Service Requests
Hope this helps.
Your company has a datacenter in Los Angeles. The datacenter contains a private cloud that is managed by using a System Center 2012 infrastructure. The infrastructure has the System Center 2012 Service Manager Self-Service Portal installed. You create a new service offering. You need to ensure that only three users named Admin1, Admin2, and Admin3 can access the service offering.
What should you do?
A. Add the service offering and the request offering to a Service Manager group, and then create
a Run As Account.
B. Add the Admin1, Admin2, and Admin3 configuration items to a Service Manager group, and then
create a Run As Account.
C. Add the service offering and the request offering to a Service Manager group, and then create
a User Role.
D. Add the Admin1, Admin2, and Admin3 configuration items to a Service Manager group, and then
create a User Role.
With Role based security scoping in SCSM there is the possibility to configure a controlled environment for different service roles. A SCSM role profile is a configuration set to define access to objects, views in the console, operations they can perform and members of the role (AD User/Group). SCSM components of a User role are:
The security scope: Is the security boundary in SCSM. Boundaries can be set on Group/queue, Class, Property & relationships.
UI filter scope: This filter is for defining what an operator can see in the SCSM console. Limiting the options visible in the console improves the usability. UI filters can be set on console tasks, templates and views.
User role profile: SCSM includes some predefined user profiles who include a set of allowed operations with a class/property/relationship scope over objects.
User Assignment: The members of the user role in SCSM. This can be set for users or groups.
(Always recommended to use groups)
Your company has a private cloud that is managed by using a System Center 2012 infrastructure. The network contains a Virtual Machine Manager (VMM) infrastructure and an Operations Manager infrastructure. You create and deploy a three-tier service to VMM. You plan to view service diagrams in Operations Manager. You need to identify which management packs must be imported to Operations Manager for the planned diagrams. The solution must minimize the number of imported management packs. Which management packs should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. the Windows Server Operating System management pack
B. the Internet Information Services 7 Monitoring management pack
C. the File Services management pack
D. the Microsoft SQL Server Monitoring Management Pack
E. the Monitoring Pack for Active Directory (AD)
F. the Windows Server DNS 2003/2008/2008 R2 Monitoring Management Pack
Information on three-tier service in VMM:
Three tiers are Web tier, Middle tier, and SQL tier.
A) The Windows Server Operating System management pack provides the fundamental monitoring basics for computers running the Windows 2000 Server and Windows Server 2003, 2003 R2, 2008 and 2008 R2 Operating System
B) The Internet Information Services Management Pack provides proactive and reactive monitoring of your Internet Information Services (IIS) environment. C) The File Services management pack retrieves events and other health information generated by the services that make up the File Services role.
D) The Monitoring pack for SQL Server provides the capabilities for Operations Manager 2007 R2 and Operations Manager 2012 to discover SQL Server 2005, 2008, 2008 R2, and SQL Server 2012. It monitors SQL Server components such as database engine instances, databases, and SQL Server agents.
E) The Monitoring Pack for Active Directory (AD) provides both proactive and reactive monitoring of your Active Directory deployment.
F) This management Pack monitors DNS infrastructure health, availability and performance on Microsoft Windows server 2003/2008/2008 R2.
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure. The network contains two network segments that are separated by a firewall. You have a management server named Server1. You create a discovery rule and configure the rule to discover SNMP devices. You discover that only the devices on the network segment that contains Server1 are discovered. You need to ensure that the devices supporting SNMP on both network segments are discovered. Which firewall port or ports should you allow on the firewall?
A. UDP 161
B. TCP 161 and UDP 22
C. UDP 5723 and UDP 5724
D. TCP 162
SNMP uses the default UDP port 161 for general SNMP messages and UDP port 162 for SNMP trap messages.
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure. The network contains a Microsoft Exchange Server 2010 organization. You plan to import the Exchange Server 2010 Management Pack. You need to configure Operations Manager to send Exchange-related notifications to Exchange Server administrators. What should you create first?
A. a channel
B. a User Role
C. an Exchange Server 2010 Send Connector
D. a monitor
E. an Exchange Server 2010 transport rule
Operations Manager also allows you to create custom roles based on the Operator, Read-Only Operator, Author, and Advanced Operator profiles. When you create the role, you can further narrow the scope of groups, tasks, and views that the role can access. For example, you can create a role entitled “Exchange Operator” and narrow the scope to only Exchange-related groups, views, and tasks. User accounts assigned to this role will only be able to run Operator-level actions on Exchange-related objects.
Notification Accounts and Groups Individuals in your company that will interact with Operations Manager frequently, such as an Exchange administrator who has been assigned to the Exchange Operator role, need a way to discover new alerts. This can be done by either watching the Operations console for new alerts or by Operations Manager informing them about the alert via supported communications channels. Operations Manager supports notifications through e-mail, instant messaging, Short Message Service, or pager messages. Notifications on what the role needs to know go out to recipients that you specify in Operations Manager. An Operations Manager recipient is merely an object that has a valid address to receive the notification, such as an SMTP address for e-mail notifications.
Therefore, it is logical to combine role assignment with notification group membership via an email- enabled security group. For example, create an Exchange Administrators security group and populate it with individuals that have the knowledge and permissions to fix things in Exchange. Assign this security group to a custom created Exchange Administrator role so they have access to the data and are e-mail-enabled. Then, create a recipient by using the SMTP address of the email- enabled security group.
References a channel here:
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure. The network contains an SMTP host named mail.contoso.com. You need to configure Operations Manager to use mail.contoso.com to send email notifications. What should you do?
A. Create a channel.
B. Configure the agent proxy setting.
C. Create a rule.
D. Create an internal connector subscription.
How to Enable an Email Notification Channel
To configure alert notifications for System Center 2012 ?Operations Manager, your first task is to enable a notification channel. This topic describes how to configure a channel that will send alert notifications to subscribers by using email.
Your company has a private cloud that is managed by using a System Center 2012 infrastructure. You deploy an application virtualization solution. You deploy a server named RDServer1, and then you install the Remote Desktop Services server role. RDServer1 is monitored by using Operations Manager. You deploy a virtualized application named VirtualApp1 to RDServer1. You need to set the state of RDServer1 to critical if CPU utilization by VirtualApp1 exceeds 70 percent for two minutes.
What should you create?
A. a service level objective (SLO)
B. an event subscription
C. an application profile
D. a monitor
E. a rule
You can configure a service level objective (SLO) to define the availability and performance goals for an application. In the following procedure, you create a new service level (LOB Application 1) against a distributed application, define a Monitor SLO that is based on availability (99.9% up-time), and define a Collection Rule SLO that is based on a performance rule (80% average processor time). http://technet.microsoft.com/en-us/library/d
Your company has a private cloud that is managed by using a System Center 2012 infrastructure. The Service Manager management server is installed on a server named Server1. The Configuration Manager site server is installed on a server named Server2. You create a baseline and several configuration items. You need to configure Service Manager to create incidents for each Service Manager configuration item that is non-complaint with the baseline. What should you create?
A. a task and a Desired Configuration Management Event Workflow
B. a channel and a subscription
C. a connector and a Desired Configuration Management Event Workflow
D. a subscription, a connector, and a task
A connector is required to bring data from Configuration Manager into Service Manager. From there, you create a Desired Configuration management Event Workflow. Using Connectors to Import Data into System Center 2012 – Service Manager http://technet.microsoft.com/en-us/library/hh524326.aspx
How to Configure Desired Configuration Management to Generate Incidents http://technet.microsoft.com/en-us/library/hh495577.aspx
If you want to pass Microsoft 70-246 successfully, donot missing to read latest lead2pass Microsoft 70-246 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.
|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|