Monitoring and Operating a Private Cloud with System Center 2012
Question No: 41 – (Topic 4)
You need to recommend a solution to resolve the security issue for the servers.
What should you include in the recommendation? (More than one answer choice may achieve the goal. Select the BEST answer.)
A Microsoft Baseline Security Analyzer (MBSA) scan
A Configuration Manager Desired Configuration Management scan
A System Center 2012 – Virtual Machine Manager (VMM) compliance scan
A Microsoft Security Compliance Manager scan
Question No: 42 – (Topic 4)
You need to recommend a solution for the application servers. The solution must meet the technical requirements.
What should you create?
A protection group that contains all of the application servers
A protection group that contains all of the Hyper-V hosts
A separate protection group for each application owner
A separate protection group for each application server
Question No: 43 – (Topic 4)
You deploy a new virtual machine named VM29 for App1. You view VM29 from the Operations Manager console.
You discover that VM29 is not visible when viewing the health of App1. You need to ensure that VM29 is visible when viewing the health of App1. What should you do?
Edit the application monitoring rules.
Run a network devices discovery rule.
Run an Active Directory server discovery rule.
Edit the distributed application design.
Question No: 44 – (Topic 4)
You need to install the new version of App1.
What should you do first? (More than one answer choice may achieve the goal. Select the BEST answer.)
Add the new version of App1 to a copy of the existing service template.
From Configuration Manager, create a new deployment type for the new version of App1.
Add the new version of App1 to a new blank service template.
From a Group Policy, deploy the new version of App1.
Question No: 45 HOTSPOT – (Topic 4)
You need to recommend a solution to meet the availability requirement for the support technicians. The solution must minimize administrative effort.
Which tasks should you recommend performing in Orchestrator, Service Manager and Operations Manager? (To answer, select the appropriate task for each product in the answer area.)
Question No: 46 HOTSPOT – (Topic 4)
You are evaluating the implementation of an Operations Manager discovery rule to support the planned changes for the third-party monitoring solution.
You need to recommend which configurations are required for the discovery rule.
Which configurations should you recommend? (To answer, select the appropriate configurations in the answer area.)
One of the requirement in this case study is: quot;The System Center 2012 solution must monitor all of the devices monitored by the third-party solution and must discover new devices.quot;.
Therefore, Recursive discovery is the good answer.
http://kevingreeneitblog.blogspot.ca/2012/07/scom-2012-network-monitoring-explicit.html Recursive discovery will then try to discover any other network devices it knows about through its Address Routing Protocol (ARP) table, its IP address table, or the topology Management Information Block (MIB) to grow the network map and present all applicable devices to you for monitoring.
The question is for the discovery rule for the third party device:
quot;You are evaluating the implementation of an Operations Manager discovery rule to support the planned changes for the third-party monitoring solutionquot;
quot;The network contains a third-party network management device that supports SNMPv3quot;. For SNMP v3 you need the unique user identity and credentials SNMP
The erratum indicates the following:
The network contains a third-party network management device that supports SNMPv3.
The network contains network devices that support ICMP and SNMP and other devices that support SNMP only.
Since all devices support SNMP, I think the answer is only SNMP.
When you choose the ICMP and SNMP option, it uses both SNMP Gets and ICMP pings and I#39;m pretty sure that devices that do not support ICMP could not be discovered using that option.
Question No: 47 – (Topic 4)
You need to recommend a solution to apply patches to the SQL Server servers. The solution must not affect user access to App1.
What should you include in the recommendation?
From System Center 2012 – Virtual Machine Manager (VMM), schedule a compliance scan.
From Configuration Manager, schedule a deployment package for software updates.
From System Center 2012 – Virtual Machine Manager (VMM), create a servicing window.
From Configuration Manager, schedule an application deployment.
Answer: B Explanation:
Deployment package. A deployment package is like any other package in SCCM, except that it contains only
the software update binary files. The client downloads only the required updates. As a result, deployment
packages can contain a mix of updates from multiple OSs. In SCCM 2012 SP1, a client can fall back to
Windows Update if the requested update isn#39;t available in a deployment package. You should create a new
deployment package twice a year.
Sevice windows can be used if the VM was created from a Service Template.. It doesnt state this so I would
say A is correct
Topic 5, Contoso Ltd Overview
Contoso, Ltd. is a manufacturing company that has 3,000 users.
Contoso has a data center in Toronto and 20 offices across Canada. The offices connect to each other by using a WAN link. Each office connects directly to the Internet.
Active Directory Environment
The network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012. All servers run Windows Server 2008 R2.
Each office contains three domain controllers. Each office is configured as an Active Directory site.
System Center 2012 Infrastructure
Contoso has a System Center 2012 infrastructure that contains 11 servers. The servers are configured as shown in the following table.
Contoso has a private cloud named Cloud1. Cloud1 is managed by using VMM. The following applications run in Cloud 1:
->Microsoft Exchange Server 2010
->Microsoft SharePoint Server 2010
->A custom manufacturing application named App1
The Hyper-V hosts are managed by using VMM. TOR-H01 and TOR-H02 are nodes in a failover cluster.
The switches that are part of the network fabric are from various manufacturers and are managed by using SNMPv3.
An application named App1 is deployed from a VMM service template that consists of one front-end web server and one back-end database server. App1 processes credit card information.
The instance of App1 running in the data center uses two virtual machines named VM1 and VM2. TOR-H01 hosts VM1 and VM2.
App1 is managed by using a custom management pack named MP1. The management
pack used to monitor App1 contains a distributed application diagram named App1DAD.
The service level agreement (SLA) for App1 states that App1 must be available 99 percent of the time.
Contoso identifies the following issues:
->Currently, all Operations Manager alerts are sent by email only. Database administrators require alerts to be sent by text message. The cell phone numbers of the database administrators are already configured in Operations Manager.
->Administrators report that the processor performance counters for the Hyper-V hosts display values that are lower than the actual load on the hosts.
Requirements Business Goals
Contoso wants to minimize hardware and software costs, whenever possible.
Contoso plans to add a new web server to the App1 service template. Traffic to the new web server will be load balanced with the existing web server by using a hardware load balancer.
Contoso identifies the following technical requirements for the planned deployment:
->Automatically apply software updates issued by Microsoft to all of the Hyper-V hosts.
->Automatically assign incidents to administrators when a Configuration Manager service fails.
->Ensure that the Exchange Server administrators can request that new virtual machines be added to the Exchange Server organization by using Internet Explorer.
->Monitor the uptime of all the Hyper-V hosts and all the virtual machines by using Operations Manager and VMM. Performance and Resource Optimization (PRO)- enabled management packs will be used.
->Ensure that users have a self-service portal that provides them with the ability to back up individual virtual machines. Users must receive an email message confirming that the backup is complete.
->Ensure that database administrators are alerted by a text message when an error occurs on a server that they manage. The text messages should be delivered regardless of the current network conditions.
->Network administrators report that they currently use different tools to monitor the port status on the switches. The network administrators want to manage all of the switches by using Operations Manager.
Contoso identifies the following requirements for App1:
->Create an object in the App1 management pack to track the SLA.
->Ensure that multiple monitoring thresholds can be used for different instances of
->Ensure that App1 complies with the Payment Card Industry Data Security Standard (PCI DSS).
Question No: 48 DRAG DROP – (Topic 5)
You need to prepare the environment to support the planned changes for App1.
In which order should you perform the actions? (To answer, move all of the actions from the list of actions to the answer area and arrange them in the correct order.)
Box 1: Create an IP address pool.
Box 2: Install the provider for the hardware load balancer Box 3: Add a hardware load balancer
Box 4: Create a Virtual IP (VIP) template
Box 5: Copy and modify the App1 service template.
*(box 1) When you create a static IP address pool for a VM network, VMM can assign static IP addresses to Windows-based virtual machines (running on any supported hypervisor platform) that use the VM network. By using static IP address pools, IP address management for the virtual environment is brought within the scope of the VMM administrator.
(Box 2, Box 3) Prerequisite for adding a Hardware Load balancer include:
You must obtain the load balancer provider from the load balancer vendor, and install the provider on the VMM management server.
Setting the load balancer affinity enables you to provide some control over which load balancer will be used for a service. This is based on logical network information. VMM uses this information to determine the valid static IP address pools that are accessible from both the load balancer and the host group that the service tier will be deployed to.
By adding load balancers to VMM management and by creating associated virtual IP templates (VIP templates), users who create services can automatically provision load balancers when they create and deploy a service.
*(box 4) A VIP template contains load-balancer-related configuration settings for a specific type of network traffic. For example, you can create a template that specifies the load- balancing behavior for HTTPS traffic on a specific load balancer by manufacturer and model.
(box 5) A load balancer must be configured before you deploy a service. After a service is deployed, you cannot add a load balancer by updating the service.
Question No: 49 HOTSPOT – (Topic 5)
You need to recommend which configurations must be performed to meet the uptime monitoring requirements for the Hyper-V hosts and the virtual machines.
You install an Operations Manager agent on each Hyper-V host and each virtual machine.
On which server or servers should you perform each action? (To answer, select the appropriate server or servers for each action in the answer area.)
Question No: 50 – (Topic 5)
You need to identify the information that is required to discover each switch by using an explicit discovery.
Which information do you require for each switch? (Each correct answer presents part of the solution. Choose all that apply.)
The IP address
The MAC address
The management credentials
The SNMP community string
To create a network devices discovery rule, you need the following information:
->The IP address or FQDN of each device that you want to discover and monitor.
->It is SNMP v3 devices. So you need credentials to discover them.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|