desk_spill_large

Software Packaging and Deployment Engineers are in a strange world that bounces along other traditional fields within IT like a kid jumping on rocks across a stream.  They have to maintain a working knowledge of everything from desktop installation and support, to server administration, to Active Directory and Group Policy, to networking, to security settings and permissions, to System Center Configuration Manager, to AdminStudio and InstallShield Editor.

In addition, a seasoned SPD Engineer would have a decent level of exposure to scripting with Batch, VBScript and PowerShell, as well as have extensive familiarity with tools such as msiexec.exe, sc, dism, reg, net, icacls, Sysinternals’ utilities, and robocopy.  In fact, an intermediate-level engineer would be expected to be very familiar with at least 50% of these.

Of these ten (10) sample questions, you must achieve a 100% score to pass.  Good luck!

Test Questions 1 – 10

  1. You are deploying a software installation package to 20,000 computers over one evening with the intended goal of having all of them completed successfully before 8:00 AM the next business day.  The package is designed to check for a previous version of the software and remove it prior to installing the newest version. One of the desktop computers reported an exit code of 1605.  What does this indicate?
    1. The installation package is corrupted
    2. The source binaries could not be located
    3. The uninstall process could not find the older version installed
    4. There was a network connectivity failure
  2. While attempting to troubleshoot issues reported for a laptop located in an office across town, you try to run some diagnostics from a Command console.  The command you attempt is:

    REG FLAGS \\LT001\HKLM\System\CurrentControlSet\Services\BITS\Security.

    However, you receive an error that the remote computer could not be contacted.  You are able to ping the remote computer.  You can also browse the C$ share successfully.  What is the most likely cause?

    1. UAC is enabled at the highest setting
    2. Remote Desktop services are disabled
    3. The Remote Registry Service is disabled and/or stopped
    4. The BITS service is disabled and/or stopped
  3. You are attempting to run a Windows Installer package from the command line to install a third-party application silently.  You would like to specify the licensing information in the command line parameters without using a Transform.  One key is named “companyname” and the other “sitecode”.  Which of the following statements applies these correctly?
    1. msiexec /i appinst.msi sitecode=123,companyname=contoso /qn
    2. msiexec /i appinst.msi SITECODE=123 COMPANYNAME=Contoso /qb!
    3. msiexec /i appinst.msi TRANSFORMS=SITECODE:123,COMPANYNAME:Contoso /quiet
    4. msiexec /i appinst.msi SITECODE=123 COMPANYNAME=Contoso /qn
  4. You have deployed a Windows Installer package file to 500 computers.  The package installed a product from a vendor which included some features you did not want deployed.  The vendor does not support enabling or disabling these features during installation, so you must resort to customizing the installation yourself.  You open the original .MSI package in InstallShield Editor or Orca and make some changes.  Rather than saving the modifications to a separate Transform file, you save them back to the .MSI itself.  You run the following command to uninstall the first existing deployment on a test computer…

    msiexec /x appinst.msi /qn

    What is the most likely outcome?

    1. The attempt will fail
    2. The attempt will succeed but return a non-zero exit code
    3. The attempt will succeed with a zero exit code
  5. You are writing a script to combine several installations from multiple vendors into a single unit for deploying a complex, in-house suite of tools which serve a common purpose.  One of the items requires .NET Framework 3.5 to be installed.  Another requires that the Remote Registry service is configured to start automatically and that it is running prior to installing the item.

    You have verified that your IT staff has published a shared SxS point on the network for the version of Windows 8.1 which are being targeted.  In addition, they have deployed the SxS location to all clients using Group Policy.  Which of the following Batch Script code blocks will insure success:

    bat1

  6. You are going to be assigned to a customer at a remote location for up to two weeks in a different country.  The task will involve updating their aging script-based installation packages which they maintain on an internal server.  The packages are deployed to their client devices as part of their imaging process using MDT 2013 and WDS from within their Windows Server 2012 R2 Active Directory environment.

    You are told that you may not have access to the Internet during that time due to security policies, and that you will not be permitted to bring a laptop, tablet or smartphone into the customer facilities for security reasons.  You are permitted to bring a USB thumb drive however.  You will be assigned a domain-joined Windows 8.1 64-bit desktop computer to perform your work.

    You want to prepare for as many possibilities as you can by copying utilities to a USB thumb drive “just in case”.  Licensing is a concern, you can only bring items which would not violate your current license agreements.  Which of the following would you copy to your USB drive? (choose all that apply)

    1. Sysinternal’s PsTools
    2. Sysinternals’ ProcMon.exe, Procexp.exe and AutoRuns.exe
    3. Orca.exe
    4. Rob Van Der Woude’s WMI Code Generator
    5. A portable log file parser app (e.g. cmtrace.exe)
    6. A portable code editing app (e.g. “portable” notepad++)
    7. Robocopy.exe
  7. You are deploying an application with System Center Configuration Manager 2012 R2 to a large number of Windows 8.1 client devices on your network.  You’ve completed making the application, the deploying type, the detection methods and have distributed the content to all of the required Distribution Point servers in your environment.  The deployment is set for per-machine and targeting devices, not users.

    The Deployment is configured to begin “as soon as possible” (e.g. immediate).  None of the client computers have even attempted to run the Deployment after 12 hours of waiting.  The devices are always powered on and show no indication of having problems communicating with their Management Point server.  You go back through the Deployment configuration.  Which of the following might be a likely cause?

    1. The Deployment is set to “Available” instead of “Required”
    2. The Detection Method is set to “Managed”
    3. The Distribution Points are not part of a Distribution Server Group
    4. The clients are in the wrong Site
  8. You need to wrap a vendor-provided Windows Installer packaging with a few lines of script code to import a registry key and value, and relax permissions on a folder so users can save configuration settings without being stopped by UAC.  You are using only built-in cmdlet capabilities, no custom modules are to be used.  Which set of lines in the following script code will accomplish this requirement?

    ps1

  9. You are deploying a third-party service pack update to a group of computers using System Center Configuration Manager 2012 R2.  The service pack is a .MSI file.  After it is installed, a follow-up process must be run that connects to a central server share within the same network in order to update files on both the server and client.  You create a script wrapper to handle the follow-up task.

    The deployment will be executed under the local SYSTEM account context on each targeted computer.  It fails with and exit code of 530.  The vendor log file on each client shows “Access Denied” as the detailed error.  You confirm that the process uses only SMB connectivity to perform the necessary tasks.  What is the most likely cause?

    1. The process needs to be run using “Run as Administrator”
    2. The process needs to be invoked using “enable-tokens: true”
    3. The server share permissions do not include “Everyone”
    4. The server share permissions do not include “Domain Computers”
  10. You are trying to isolate which particular background process is causing a UAC prompt for an installed application.  Each time a non-administrator user launches the application, and clicks on “Options”, they are stopped by UAC.  You are at a remote user’s computer in another office performing your diagnostics.

    You have Internet access, and you are a member of a domain security group that allows you local administrator rights on any desktop or laptop computer in the same Active Directory domain.  You decide to try Sysinternal’s Process Monitor (procmon.exe).  You launch Process Monitor and want to capture a trace log of activity to inspect.

    Some of the following steps may not be required.  Select all that apply and place them in the proper order for accomplishing this task with the least amount of effort.

    1. Filter the ProcMon capture log for “FAILED” entries
    2. Filter the ProcMon capture log for “SUCCESS” entries
    3. Stop the ProcMon capture
    4. Close the application you intend to analyze
    5. Launch the application you intend to analyze
    6. Start the ProcMon capture
    7. Clear the ProcMon capture window

Summary

This is only a small sample of the beginner-intermediate exam I’m putting together for Software Packaging and Deployment candidates.  The total bank will be around 50-70 questions, with a selected test set of 30 randomized questions.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s