[Free] 2018(May) EnsurePass Testking Microsoft 70-981 Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-981
100% Free Download! 100% Pass Guaranteed!

Recertification for MCSE: Private Cloud

Question No: 151 – (Topic 8)

Your company has a private cloud that is managed by using a System Center 2012 infrastructure.

The network contains 50 virtual machines that run Windows 7. Each virtual machine has an application named Appl.exe installed. A new version of Appl.exe is released.

You need to identify which virtual machines have the outdated version of App1.exe installed.

What should you do?

  1. From Operations Manager, create a monitor.

  2. From Configuration Manager, deploy a Desired Configuration Management baseline.

  3. From Service Manager, create a Virtual Machine Manager (VMM) connector.

  4. From Virtual Machine Manager (VMM), deploy a service template.

Answer: B Explanation:

Desired configuration management in Configuration Manager 2007 allows you to assess the compliance of computers with regard to a number of configurations, such as whether the correct Microsoft Windows operating system versions are installed and configured appropriately, whether all required applications are installed and configured correctly, whether optional applications are configured appropriately, and whether prohibited applications are installed.

Additionally, you can check for compliance with software updates and security settings. http://technet.microsoft.com/en-us/library/bb680553.aspx

Question No: 152 – (Topic 8)

The network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.

The private cloud contains two servers.

The servers are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

The network segments are separated by a firewall.

All of the TCP ports from 1 to 1024 are allowed on the firewall.

You need to ensure that Server1 can send security events to Server2. What should you do?

  1. From the firewall, allow TCP 51909 from Network1 to Network2.

  2. From the firewall, allow TCP 5723 from Network1 to Network2.

  3. Deploy an Operations Manager gateway server.

  4. Deploy an SMTP smart host.

Answer: A Explanation:

ACS Forwarders Separated from the ACS Collector by a Firewall Because of the limited communication between an ACS forwarder and an ACS collector you only need to open the inbound TCP port 51909 on a firewall to enable an ACS forwarder, separated from your network by a firewall, to reach the ACS collector.

http://technet.microsoft.com/en-us/library/bb309575.aspx

Question No: 153 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1.

You have a server named Server2 that is a member of a workgroup. All servers run Windows Server 2012 R2.

Server1 has System Center 2012 R2 Operations Manager installed. DC1 is configured as an enterprise certification authority (CA). Server1 and DC1 are located on the internal network. Server2 is located on a perimeter network.

You need to monitor Server2 by using Operations Manager.

Which three actions should you perform? Each correct answer presents part of the solution.

  1. Request and install a certificate on Server2, and then import the certificate to Server1.

  2. Run the Discovery Wizard on Server1.

  3. Open port UDP 161 and UDP 162 on the firewall between the internal network and the

    perimeter network.

  4. Open port TCP 5723 on the firewall between the internal network and the perimeter network.

  5. Manually install the Microsoft Monitoring Agent on Server2.

  6. Request and install a certificate on Server1, and then import the certificate to Server2.

Answer: A,D,E

Question No: 154 – (Topic 8)

Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.

The Operations Manager management server role is installed on a server named Server1. You deploy a server named Server2, and then join Server2 to the domain.

You log on to Server2 and install the Operations Manager agent. You specify Server1 as the management server.

You notice that Server1 did not discover Server2.

You need to add Server2 as an agent-managed device. What should you do from the Operations Manager console?

  1. Modify the Global Management Server Settings – Security settings.

  2. Create a new discovery rule.

  3. Import the Windows Servers Base Operating System Management Pack.

  4. Run the Discovery Wizard – Computer and Device Management Wizard.

Answer: A Explanation:

System Center Operations Manager 2012: Discovery http://onetechday.wordpress.com/2012/04/28/system-center-operations-manager-2012- discovery/

Windows Servers Base Operating System Management Pack: http://www.microsoft.com/en-us/download/details.aspx?id=20630 outdated MP for Windows 2000, Windows NT, Windows Server 2003, Windows XP Most likely not the

solution, although possible.

Solution should be:We did a manual Agent install http://technet.microsoft.com/en-us/library/hh212853.aspx

To configure manual agent installation settings for management group 1.Log on to the Operations console with an account that is a member of the Operations Manager Administrators role.

  1. Click Administration.

  2. In the Administration workspace, expand Administration, and then click Settings.

  3. In the Settings pane, expand Type: Server, right-click Security, and then click Properties.

  4. In the Global Management Server Settings – Security dialog box, on the General tab, do one of the following:

    To maintain a higher level of security, click Reject new manual agent installations, and then click OK.

    To configure for manual agent installation, click Review new manual agent installations in pending management view, and then click OK.

    Optionally, select Auto-approve new manually installed agents.

    Question No: 155 – (Topic 8)

    Your company has a private cloud that is managed by using a System Center 2012 infrastructure.

    You discover that several users create incidents for the same issue by using the Self- Service Portal.

    Over 100 incidents are created.

    You need to ensure that all of the incidents can be resolved as quickly as possible. What should you do?

    1. create a service level objective (SLO).

    2. Create a queue.

    3. Select the Link to New Parent Incident task.

    4. Select the Escalate or Transfer the Incidents task.

Answer: C Explanation:

http://wwwco1vip.microsoft.com/downloads/en/details.aspx?FamilyID=01f0792d-f246- 4549-a200-53001865495b

How to Create a Parent Incident from an Incident Form

In SystemCenter2012-ServiceManager, one way a help desk analyst can create a parent incident is when an existing incident is already opened.

You can create a parent incident using the following steps. A parent incident serves as a container for several incidents.

The following procedure is performed on an incident that is neither a parent incident nor a child incident.

Afterward, a new parent incident is created and the existing incident is converted to a child incident.

To create a parent incident from an incident form

1.

In the Service Manager console, open the Work Items workspace, and in the Work Items pane, expand Incidents.

2.

Select any Incident Management view that contains active incidents, and then select an incident.

3.

In the Tasks pane, click Edit to open the incident.

4.

In the Tasks pane, click Link to New Parent Incident to open the Link to New Parent Incident dialog box.

5.

In the Link to New Parent Incident dialog box, select a template to create the new parent incident with, and then click OK.

For example, select Networking Issue Incident Template, and then click OK. 6.

In the Title box, type a new description or modify the description that is inserted by the template.

For example, type Network Outage in Bldg 773.

7.

In the Affected user box, select the user who reported this incident. For example, select Joe Andreshak.

8.

In the Alternate Contact Method box, enter additional contact information for the affected user (optional).

9.

The Child Incidents tab appears in the form where you view the child incident that the new parent incident is grouped with and where you can add other child incidents.

10.

In the parent incident form, click OK to close it.

11.

In the original incident form, click OK to close it.

Question No: 156 – (Topic 8)

Your company has a datacenter in Los Angeles.

The datacenter contains a private cloud that is managed by using a System Center 2012 infrastructure.

The infrastructure has the System Center 2012 Service Manager Self-Service Portal installed.

You create a new service offering.

You need to ensure that only three users named Admin1, Admin2, and Admin3 can access the service offering.

What should you do?

  1. Add the service offering and the request offering to a Service Manager group, and then create a Run As Account.

  2. Add the Admin1, Admin2, and Admin3 configuration items to a Service Manager group, and then create a Run As Account.

  3. Add the service offering and the request offering to a Service Manager group, and then create a User Role.

  4. Add the Admin1, Admin2, and Admin3 configuration items to a Service Manager group, and then create a User Role.

Answer: D Explanation:

With Role based security scoping in SCSM there is the possibility to configure a controlled environment for different service roles.

A SCSM role profile is a configuration set to define access to objects, views in the console, operations they can perform and members of the role (AD User/Group).

SCSM components of a User role are:

The security scope: Is the security boundary in SCSM.

Boundaries can be set on Group/queue, Class, Property amp; relationships.

UI filter scope: This filter is for defining what an operator can see in the SCSM console. Limiting the options visible in the console improves the usability.

UI filters can be set on console tasks, templates and views.

User role profile: SCSM includes some predefined user profiles who include a set of allowed operations with a class/property/relationship scope over objects.

User Assignment: The members of the user role in SCSM. This can be set for users or groups.

(Always recommended to use groups) http://scug.be/scsm/2010/03/21/service-manager-role-based-security-scoping

Question No: 157 – (Topic 8)

Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.

The network contains three devices.

The devices are configured as shown in the following table.

You need to ensure that Operations Manager can discover all of the devices. What should you do?

  1. From the Operations Manager console, create one group and set the group to Dynamic Members.

  2. From the Operations Manager console, create two Run As Accounts.

  3. From the Operations Manager Shell, run the Set-SCOMUserRole cmdlet.

  4. From the Operations Manager Shell, run the Enable-SCOMDiscovery cmdlet.

Answer: B Explanation:

Each SNMPv3 device would need its own run as account.

As there are no SNMPv3 devices in the list only v1/v2 we need just one run as account per different community string.

As there are two diffrent community strings used for the 3 devices we need two run as accounts.

http://technet.microsoft.com/en-us/library/hh212920.aspx

Question No: 158 – (Topic 8)

Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.

From Operations Manager, you create a group named Group1. You add multiple servers to Group1.

You have an Active Directory group named Group2.

You configure a dashboard for the users in Group2 to manage the client computers in Group1.

You need to ensure that the users in Group2 can achieve the following tasks:

->View open critical alerts generated by Group1.

->Identify whether a monitor generated an alert.

Which object should you add to the dashboard?

  1. An alert view

  2. A state view

  3. An alert widget

  4. An event view

  5. A state widget

Answer: C Explanation:

Adding an alert widget to a dashboard

Step 1: In an empty dashboard cell, click on the quot;Click to add widgetquot; link. This opens the New Dashboard and Widget Wizard.

Step 2: Now you are presented with a selection of the available widgets. Select Alert Widgets and then click Next.

Step 3: Once you give your widget a name and a description, you can choose a group or object for which to display alerts.

The ability to select between quot;Groupsquot; and quot;Groups and objectsquot; allows you to change the scope of objects for which you will receive alerts.

If you only want to target a certain object within a group or class, the

quot;Groups and objectsquot; option allows you to do so, while the quot;Groupsquot; option enables you to view alerts for all objects within the group you choose.

Step 4: Next you can specify the criteria for the alerts you will receive. You may choose the Severity, Priority, and Resolution State of the alerts.

For example, I will receive alerts for warnings and information of all priority, and in either the new or closed state.

Step 5: Lastly, select the columns to display for each alert.

You can also decide how the alerts are sorted by default as well as how they are grouped. One great addition to the alert widget that is not present in the alert view is the addition of the quot;Is Monitor Alertquot; column.

This column allows you to see whether the alert was generated by monitor rather than a rule.

In my example, I will group alerts by quot;Is Monitor Alertquot; and sort by quot;Last Modifiedquot;. And there you have it.

We#39;ve configured a dashboard with a powerful alert widget.

It is a great way to quickly view the alerts you care about organized in the way you want. If you aren#39;t satisfied with your configuration or if your needs change, you can always click the button which gives you the option to reconfigure, personalize, or remove your widget.

Reconfiguring a widget opens a wizard with your previously chosen widget configuration and allows you to change all of options to keep up to date with your needs.

Here you can change everything from the groups or objects targeted, to the name of the widget.

Personalizing a widget allows you to change the display options for that widget.

Here you can change which columns are displayed and how your alerts are grouped and sorted.

This allows you to view the alerts within a context that is most appropriate to you, but without having to worry about the primary configuration details.

http://blogs.technet.com/b/momteam/archive/2011/10/17/operations-manager-2012- dashboards- thealertwidget.aspx

Question No: 159 – (Topic 8)

Your company has a private cloud that is managed by using a System Center 2012 infrastructure.

The network contains a Virtual Machine Manager (VMM) infrastructure and an Operations Manager infrastructure.

You create and deploy a three-tier service to VMM.

You plan to view service diagrams in Operations Manager.

You need to identify which management packs must be imported to Operations Manager for the planned diagrams.

The solution must minimize the number of imported management packs.

Which management packs should you identify? (Each correct answer presents part of the solution. Choose all that apply.)

  1. the Windows Server Operating System management pack

  2. the Internet Information Services 7 Monitoring management pack

  3. the File Services management pack

  4. the Microsoft SQL Server Monitoring Management Pack

  5. the Monitoring Pack for Active Directory (AD)

  6. the Windows Server DNS 2003/2008/2008 R2 Monitoring Management Pack

Answer: A,B,D Explanation:

Information on three-tier service in VMM: http://blogs.technet.com/b/m2/archive/2011/03/29/how-to-deploy-thepet-shop-application- as-a- service-invmm.aspx

Three tiers are Web tier, Middle tier, and SQL tier.

  1. The Windows Server Operating System management pack provides the fundamental monitoring basics for computers running the Windows 2000 Server and Windows Server 2003, 2003 R2, 2008 and 2008 R2 Operating System

  2. The Internet Information Services Management Pack provides proactive and reactive monitoring of your Internet Information Services (IIS) environment.

  3. The File Services management pack retrieves events and other health information generated by the services that make up the File Services role.

  4. The Monitoring pack for SQL Server provides the capabilities for Operations Manager 2007 R2 and Operations Manager 2012 to discover SQL Server 2005, 2008, 2008 R2, and SQL Server 2012.

    It monitors SQL Server components such as database engine instances, databases, and SQL Server agents.

  5. The Monitoring Pack for Active Directory (AD) provides both proactive and reactive monitoring of your Active Directory deployment.

  6. This management Pack monitors DNS infrastructure health, availability and performance on Microsoft Windows server 2003/2008/2008 R2.

Question No: 160 HOTSPOT – (Topic 8)

You have a System Center 2012 R2 deployment that contains the servers configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You deploy the Operations Manager agent to Server4. On Server1, you create a monitor and an alert view.

->You plan to create an automation workflow that will perform the following actions:

->Open an incident in Service Manager when Operations Manager raises an alert.

->After the incident is open, remediate the error that caused the alert.

->Resolve the alert.

->Close the incident.

You need to configure the System Center 2012 environment to support the implementation of the planned workflow.

On which server should you perform each action? To answer, select the appropriate options in the answer area.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

100% Ensurepass Free Download!
Download Free Demo:70-981 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass 70-981 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.