Lead2pass New Microsoft 70-246 brian dumps are designed to help you to out in a short time. You can get Lead2pass 70-246 brain dumps to pass your exam. To be a Microsoft professional makes you a better future.
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.
You have a distributed application named App1.
App1 has the following service level objectives (SLOs):
– At least 99.9 percent uptime
– No more than 85 percent average CPU utilization
You need to add the SLOs that monitor the required information to Service Level Tracking.
Which SLO or SLOs should you add? (Each correct answer presents part of the solution. Choose all that apply.)
A. Monitor state SLO – Availability
B. Monitor state SLO – Security
C. Collection rule SLO
D. Monitor state SLO – Performance
E. Monitor state SLO – Configuration
Your company has a private cloud that is managed by using a System Center 2012 infrastructure. The network contains a Microsoft SharePoint Server 2010 server farm.
The server farm is hosted on 20 virtual machines.
You deploy a custom solution to the SharePoint server farm.
The solution requires that a new Web.config file be deployed to all of the front-end servers.
You need to identify which front-end servers have an outdated version of the Web.config file. What should you do?
A. From Operations Manager, create a monitor.
B. From Service Manager, create a Virtual Machine Manager (VMM) connector.
C. From Virtual Machine Manager (VMM), deploy a service template.
D. From Configuration Manager, deploy a Desired Configuration Management baseline.
Desired configuration management in Configuration Manager 2007 allows you to assess the compliance of computers with regard to a number of configurations, such as whether the correct Microsoft Windows operating system versions are installed and configured appropriately, whether all required applications are installed and configured correctly, whether optional applications are configured appropriately, and whether prohibited applications are installed. Additionally, you can check for compliance with software updates and security settings. http://technet.microsoft.com/en-us/library/bb680553.aspx
By Gol: Typical Microsft question. Should you create a baseline first or just monitor.
For me identify = Operations Manager
Your company has a private cloud that is managed by using a System Center 2012 Virtual Machine Manager (VMM) infrastructure. The infrastructure contains several Hyper-V hosts.
You configure VMM to use an update server and to synchronize the updates by using a Windows Server Update Services (WSUS) server.
You attempt to verify compliance with the Sample Baseline for Security Updates.
You view the console as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can verify compliance for the Hyper-v hosts.
What should you modify?
A. the update classifications of the update server
B. the Assignment Scope of the baseline
C. the default configuration provider
D. the Network settings of the All Hosts host group
Your company has a private cloud that is managed by us.ng a System Center 2012 infrastructure. You have a web application named App1 that is hosted in another datacenter.
The datacenter is not part of the private cloud.
You need to ensure that Service Manager incidents are generated automatically when App1 is unavailable.
What should you create?
A. a Service Level Tracking object
B. an event subscription
C. a channel
D. a synthetic transaction
To monitor the application that runs on these traditional platforms we leverage custom MP’s, synthetic transactions to be able to test websites, and HTTP probes to test web services ensuring that the outside-in functionality of the application is available.
http://blogs.technet.com/b/server-cloud/archive/2012/03/29/using-system-center-2012-to- monitor-theinfrastructure-amp-application-layers-for-private-public-and-traditional- environments.aspx
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure. The network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. The private cloud contains two servers.
The servers are configured as shown in the following table.
The network segments are separated by a firewall. All of the TCP ports from i to 1024 are allowed on the firewall.
You need to ensure that Server2 can send security events to Server1.
What should you do?
A. From the firewall, allow TCP 51909 from Network2 to Network 1.
B. From the firewall, allow TCP 5723 from Network1 to Network2.
C. From the firewall, allow TCP 51909 from Network1 to Network2.
D. From the firewall, allow TCP 5723 from Network2 to Network1.
E. Deploy an SMTP smart host.
F. Deploy an Operations Manager gateway server.
ACS Forwarders Separated from the ACS Collector by a Firewall Because of the limited communication between an ACS forwarder and an ACS collector you only need to open the inbound TCP port 51909 on a firewall to enable an ACS forwarder, separated from your network by a firewall, to reach the ACS collector.
Your company has a private cloud that contains a System Center 2012 Service Manager instance. Service Manager has the Self-Service Portal installed.
You create a service offering that contains a single request offering. The service offering provides logged-on users with the ability to add their user account automatically to a group named ServiceGroup1. The company’s security policy requires that an administrator named Admin1 must approve all requests for group membership change.
You need to configure the infrastructure to meet the requirements of the company’s security policy.
What should you modify?
A. the service offering
B. the service request template
C. the request offering
D. the Service Offering Category list
I am brand new to SCSM/SCOrch and am fumbling my way through it. I have finally gotten a runbook successfully created, service request offering completed, and published it to the portal. I filled it out and submitted it on the portal a couple hours ago and it still sits “In progress”. I cannot for the life of me figure out how in the world to approve the request. I assume once I approve it the rest will be completed automatically.
Can anyone help? Please?
For approval you need to add a Review Activity to the Service Request Template at the Activity tab.
Marcel Zehner wrote a good blog post about this:
News in SCSM12 (Beta) #2 ?Service Requests
Hope this helps.
Your company has a datacenter in Los Angeles. The datacenter contains a private cloud that is managed by using a System Center 2012 infrastructure. The infrastructure has the System Center 2012 Service Manager Self-Service Portal installed.
You create a new service offering. You need to ensure that only three users named Admin1, Admin2, and Admin3 can access the service offering.
What should you do?
A. Add the service offering and the request offering to a Service Manager group, and then create a Run As Account.
B. Add the Admin1, Admin2, and Admin3 configuration items to a Service Manager group, and then create a Run As Account.
C. Add the service offering and the request offering to a Service Manager group, and then create a User Role.
D. Add the Admin1, Admin2, and Admin3 configuration items to a Service Manager group, and then create a User Role.
With Role based security scoping in SCSM there is the possibility to configure a controlled environment for different service roles. A SCSM role profile is a configuration set to define access to objects, views in the console, operations they can perform and members of the role (AD User/Group). SCSM components of a User role are:
The security scope: Is the security boundary in SCSM. Boundaries can be set on Group/queue, Class, Property & relationships.
UI filter scope: This filter is for defining what an operator can see in the SCSM console. Limiting the options visible in the console improves the usability. UI filters can be set on console tasks, templates and views.
User role profile: SCSM includes some predefined user profiles who include a set of allowed operations with a class/property/relationship scope over objects.
User Assignment: The members of the user role in SCSM. This can be set for users or groups.
(Always recommended to use groups)
Your company has a private cloud that is managed by using a System Center 2012 infrastructure. The network contains a Virtual Machine Manager (VMM) infrastructure and an Operations Manager infrastructure.
You create and deploy a three-tier service to VMM.
You plan to view service diagrams in Operations Manager.
You need to identify which management packs must be imported to Operations Manager for the planned diagrams. The solution must minimize the number of imported management packs. Which management packs should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. the Windows Server Operating System management pack
B. the Internet Information Services 7 Monitoring management pack
C. the File Services management pack
D. the Microsoft SQL Server Monitoring Management Pack
E. the Monitoring Pack for Active Directory (AD)
F. the Windows Server DNS 2003/2008/2008 R2 Monitoring Management Pack
Information on three-tier service in VMM:
Three tiers are Web tier, Middle tier, and SQL tier.
A) The Windows Server Operating System management pack provides the fundamental monitoring basics for computers running the Windows 2000 Server and Windows Server 2003, 2003 R2, 2008 and 2008 R2 Operating System
B) The Internet Information Services Management Pack provides proactive and reactive monitoring of your Internet Information Services (IIS) environment. C) The File Services management pack retrieves events and other health information generated by the services that make up the File Services role.
D) The Monitoring pack for SQL Server provides the capabilities for Operations Manager 2007 R2 and Operations Manager 2012 to discover SQL Server 2005, 2008, 2008 R2, and SQL Server 2012. It monitors SQL Server components such as database engine instances, databases, and SQL Server agents.
E) The Monitoring Pack for Active Directory (AD) provides both proactive and reactive monitoring of your Active Directory deployment.
F) This management Pack monitors DNS infrastructure health, availability and performance on Microsoft Windows server 2003/2008/2008 R2.
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure. The network contains two network segments that are separated by a firewall.
You have a management server named Server1.
You create a discovery rule and configure the rule to discover SNMP devices.
You discover that only the devices on the network segment that contains Server1 are discovered. You need to ensure that the devices supporting SNMP on both network segments are discovered.
Which firewall port or ports should you allow on the firewall?
A. UDP 161
B. TCP 161 and UDP 22
C. UDP 5723 and UDP 5724
D. TCP 162
SNMP uses the default UDP port 161 for general SNMP messages and UDP port 162 for SNMP trap messages.
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure. The network contains an Active Directory forest named adatum.com. Operations Manager monitors a server named Operations1.
Operations1 has a computer account in an organizational unit (OU) name ServerOU1.
You create a group named GP1 as shown in the exhibit. (Click the Exhibit button.)
You create a rule named OMRule1 that generates an alert when an error is added to the Application log.
You target OMRule1 to GP1.
You discover that alerts fail to be generated when errors are added to the Application log on Operations1.
You need to ensure that an alert is generated when an error is added to the Application log on Operations1.
What should you modify?
A. the target of OMRulel1
B. the dynamic membership of GP1
C. the category of OMRule1
D. the explicit membership of GP1
Lead2pass Microsoft 70-246 practice question and answer PDF set is developed using the latest Microsoft exam content published by Microsoft. Every Microsoft 70-246 exam question is verified and detailed descriptions are given to understand the answer fully. Microsoft’s comprehensive and relevant answers along with examples help the user grasp the concepts thoroughly.