Mar 2016 updated: Examcollection Microsoft 70-243 exam 69-85

70-243 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

Get it now →

Product Description:
Exam Number/Code: 70-243
Exam name: Administering and Deploying System Center 2012 Configuration Manager
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Free Certification Real IT 70-243 Exam pdf Collection

Realistic of 70-243 test questions materials and software for Microsoft certification for consumer, Real Success Guaranteed with Updated 70-243 pdf dumps vce Materials. 100% PASS Today!

2016 Mar 70-243 Study Guide Questions:

Q69. Your network contains a System Center 2012 Configuration Manager environment. 

You plan to create a Build and Capture task sequence to build a reference image of Windows 7. 

You need to identify which Application must exist in Configuration Manager before you can create the Build and Capture task sequence. 

Which Applications should you identify? (Choose all that Apply.) 

A. Microsoft Deployment Toolkit (MDT) 

B. Configuration Manager client 

C. System Preparation tool (Sysprep) 

D. User State Migration Tool (USMT) 

Answer: A,C 

Explanation: A: Before you deploy an operating system image in Configuration Manager, consider the following factors to plan the deployment: Operating system image size Cache size of the Configuration Manager client Capturing the user and computer state Windows User State Migration Tool (USMT) package Task sequence deployment 

C: The System Preparation (Sysprep) tool is a technology that you can use with other deployment tools to install Windows operating systems onto new hardware. Sysprep prepares a computer for disk imaging or delivery to a customer by configuring the computer to create a new computer security identifier (SID) when the computer is restarted. In addition, Sysprep cleans up user and computer-specific settings and data that must not be copied to a destination computer. 

Reference: Planning for Capturing Operating System Images in Configuration Manager 

https://technet.microsoft.com/en-us/library/gg712328.aspx 


Q70. .... 

Your network contains a single Active Directory domain. 

The functional level of the domain is Server 2003. The domain contains the following server: 

Ten servers that run Windows Server 2003 Twenty servers that run Windows Server 2008 One server that has Microsoft Exchange Server 2007 installed One server that has System Center 2012 Configuration Manager installed 

Users have mobile devices that run Windows Mobile 6.5 and Windows Phone. 

You need to ensure that you can manage the settings of the mobile devices and perform remote device wipes by using Configuration Manager. 

What should you do? 

A. Upgrade the Exchange server to Exchange Server 2010. Configure an Exchange connector. 

B. Change the functional level of the domain to windows 2008. Upgrade the Exchange server to Exchange Server 2010. 

C. Upgrade all Windows 2003 domain controllers to Windows 2008. 

D. Upgrade all of the domain controllers to Windows 2008 R2. Configure an Exchange connector. 

Answer: A 

Explanation: Need to upgrade to Exchange Server 2010 and configure an Exchange connector. 

Reference: Supported Configurations for Configuration Manager - Configuration Manager System 

http://technet.microsoft.com/en-us/library/gg682077.aspx#BKMK_SupConfigMobileClientReq 


Q71. Your company has 2,000 desktop computers and 450 portable computers. The desktop computers run Windows 7 Enterprise (x64) and the portable computers run Windows 7 Professional (x86). The network contains a System Center 2012 Configuration Manager environment. You create a configuration baseline that is targeted to all of the computers. 

You discover that you fail to receive compliance information for the configuration baseline from the portable computers. 

You receive compliance information for the configuration baseline from the desktop computers. 

You receive compliance information for other configuration baselines from all of the computers. 

You need to ensure that you receive compliance information for the configuration baseline from all of the computers. 

What should you do? 

A. Configure the configuration item to be evaluated on all Windows 7 operating systems. 

B. Create custom client settings for the portable computers and enable Compliance Settings. 

C. Create a collection containing the portable computers and assign the configuration baseline to the collection. 

D. Add the configuration item to a new configuration baseline. 

Answer: A 

Explanation: 

Question says: this and only this new baseline isn't working on portable devices. 

Reason: Maybe this baseline wasn't deployed to those PCs. 

The client/agent on all computers seems to be OK. 

What is it? 

-A Configuration Manager client downloads its client policy on a schedule that you 

configure as a client setting. However, there might be occasions when you want to initiate 

ad-hoc policy retrieval from the client— for example, in a troubleshooting scenario or when 

you are testing. 

Use the following procedures to initiate ad-hoc policy retrieval from the client outside its 

scheduled polling interval, either by using the Actions tab on the Configuration Manager 

client or by running a script on the computer. You must be logged on to the client computer 

with local administrative rights to perform these procedures. 

-The reporting services aren’t correctly configured 

Answer: All answers doesn't make much sense 

But: Configure the configuration item to be evaluated on all Windows 7 operating systems 

Indicates that this wasn't the case. 


Q72. Your network contains a System Center 2012 Configuration Manager environment. 

Your company deploys a custom Application to 2,000 client computers by using Configuration Manager. 

The Application is not listed in Add Remove Programs. 

You discover that information about the Application fails to appear in the inventory queries and inventory reports. 

You verify that information about other Applications appear in the inventory reports. 

You need to ensure that Configuration Manager data includes installation information about the custom Application. 

What should you do? 

A. Add a file name to Software Metering. 

B. Add a WMI class to the Hardware Inventory Classes file. 

C. Add a file name to the Hardware Inventory configuration. 

D. Enable a default WMI Cass in the Hardware Inventory Classes list. 

E. Select Collect NOIDMIF files in Hardware Inventory. 

F. Add a file name to the Software Inventory configuration. 

G. Modify the Enable hardware inventory on Cents setting. 

H. Add a WMI class to the Sms_def.mof file. 

Answer: F 

Explanation: 

Introduction to Software Inventory in Configuration Manager Use software inventory in System Center 2012 Configuration Manager to collect information about files that are contained on client devices in your organization. Additionally, software inventory can collect files from client devices and store these on the site server. Software inventory is collected when the Enable software inventory on clients setting is enabled in client settings. 

Note: 

Reference: Introduction to Software Inventory in Configuration Manager 

http://technet.microsoft.com/en-us/library/gg682049.aspx 


Q73. You network has System Center Configuration Manager 2007 R3 deployed. The Active Directory schema is extended for System Center Configuration Manager 2007 R3. 

You plan to deploy System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) to a new server. 

You need to ensure that System Center 2012 R2 Configuration Manager SP1 can publish information to Active Directory. 

Which container’s permissions should you modify? 

A. System\Policies 

B. System\IP Security 

C. System\System Management 

D. System\WMIPolicy 

Answer: C 

Explanation: The Publishing Status shown in the Active Directory Forests list view is a status summary of all sites in the hierarchy. The status will show 'Failed' if any sites in the hierarchy failed to publish to the forest. To view published site information, open Active Directory Users and Computers, connect to a domain controller in the forest, and go to View-> Advanced Features. Site and management point information is published under the System-> System Management node. 

Reference: Active Directory Forest Discovery and Publishing in Configuration Manager 2012 Beta 2 

http://blogs.technet.com/b/configmgrteam/archive/2011/03/30/active-directory-forest-discovery-and-publishing-in-configuration-manager-2012-beta-2.aspx 


70-243 answers

Renovate 70-243 dumps:

Q74. DRAG DROP 

Your network contains a System Center 2012 Configuration Manager environment. Three users named User1, User2, and User3 will perform the following tasks: 

User1 will review software metering data and inventory reports. 

User2 will deploy Applications and create alerts. 

User3 will create configuration items. 

You need to identify which security role must be assigned to which user. 

What should you identify? 

To answer, drag the appropriate security role to the correct user in the answer area. Each security role may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 


Answer: 



Q75. Your network contains a System Center 2012 Configuration Manager environment. 

Your company deploys 1,000 client computers. 

You discover that information about printers fails to appear in any inventory queries or reports. 

Information about other hardware devices appears in the inventory queries and reports. 

You need to ensure that Configuration Manager data includes information about the printers. 

What should you do? 

A. Add a WMI class to the Hardware inventory Classes list. 

B. Enable a default WMI class in the Hardware Inventory Classes list. 

C. Add a file name to the Software Inventory configuration. 

D. Add a file name to the Hardware inventory configuration. 

E. Add a file name to Software Metering. 

F. Select Collect NOIDMIF files in Hardware Inventory. 

G. Add a WMI class to the Sms_def.mof file. 

H. Modify the Enable software inventory on clients setting. 

I. Modify the Enable hardware inventory on clients setting. 

Answer: B 

Explanation: 

How to Extend Hardware Inventory in Configuration Manager 

System Center 2012 Configuration Manager hardware inventory reads information about devices by using Windows Management Instrumentation (WMI). WMI is the Microsoft implementation of web-based Enterprise Management (WBEM), which is an industry standard for accessing management information in an enterprise environment. 

In previous versions of Configuration Manager, you could extend hardware inventory by modifying the file sms_def.mof on the site server. 

In System Center 2012 Configuration Manager, you no longer edit the sms_def.mof file as you did in Configuration Manager 2007. Instead, you can enable and disable WMI classes, and add new classes to collect by hardware inventory by using client settings. 

Configuration Manager provides the following methods to extend hardware inventory: 

Enable or disable existing inventory classes - You can enable or disable the default inventory classes used by Configuration Manager or you can create custom client settings that allow you to collect different hardware inventory classes from specified collections of clients. 

Add a new inventory class - You can add a new inventory class from the WMI namespace of another device. 

Import and export hardware inventory classes - You can import and export Managed Object Format (MOF) files that contain inventory classes from the Configuration Manager console. 

Create NOIDMIF Files - Use NOIDMIF files to collect information about client devices that cannot be inventoried by Configuration Manager. 

Create IDMIF Files - Use IDMIF files to collect information about assets in your organization that are not associated with a Configuration Manager client, for example, projectors, photocopiers and network printers. 

Note: 

Reference: How to Extend Hardware Inventory in Configuration Manager 

http://technet.microsoft.com/en-us/library/gg712290.aspx 


Q76. Your network contains a System Center 2012 Configuration Manager environment as shown in the exhibit. (Click the Exhibit button.) 


(The exhibit shows that: Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network.) 

The network contains six servers. The servers are configured as shown in the following table. 


You need to ensure that mobile device information is available in the hardware inventory. 

What should you do first? 

A. Install a management point on Server5. 

B. Configure IIS to support only HTTPS on Server5. 

C. Install a management point on Server2. 

D. Install Network Load Balancing (NLB) on Server3. 

E. Install an enrollment proxy point on Server6. 

F. Configure IIS to support only HTTP on Server3. 

G. Configure the Exchange connector on Server3. 

H. Install Network Load Balancing (NLB) on Server6. 

I. Install a PXE-enabled protected distribution point on Server5. 

J. Install the Windows Cluster service on Server3. 

K. Install a PXE-enabled protected distribution point on Server4. 

L. Install the Windows Cluster service on Server6. 

M. Install Windows Server Update Services (WSUS) on Server3. 

N. Install a protected distribution point on Server1. 

O. Install a software update point on Server3. 

Answer: G 

Explanation: *** 

http://technet.microsoft.com/en-us/library/gg682022.aspx Determine How to Manage Mobile Devices in Configuration Manager The following table lists these four mobile device management methods and provides information about the management functions that each method supports: 


Reference: Determine How to Manage Mobile Devices in Configuration Manager http://technet.microsoft.com/en-us/library/gg682022.aspx 


Q77. DRAG DROP 

Your network contains a System Center 2012 Configuration Manager environment. 

You create a collection named All Managed Servers. 

You need to inventory the environment variables of the All Managed Servers collection. 

What should you do? 

To answer, move the four appropriate actions from the list of actions to the answer area 

and arrange. 

Answer: 


Q78. You have Windows 8.1 images that are rebuilt quarterly and imported to System Center 2012 R2 Configuration Manager Service Pack 1 (SP1). 

The Microsoft Deployment Toolkit (MDT) 2013 is integrated with Configuration Manager. 

You need to reduce the network security risks when the images are deployed by using Operating System Deployment (OSD). 

Which two tasks should you perform? Each correct answer presents a complete solution. 

A. Before the Apply Operating System Image task sequence step, add a step to install Deployment Imaging Servicing and Management (DISM). 

B. Before the Apply Operating System Image task sequence step, add a step to install the Windows Assessment and Deployment Kit (Windows ADK). 

C. After the Apply Operating System Image task sequence step, add a step to install software updates offline. 

D. After the installation of the final application, add an Install Software Updates task sequence step. 

E. After the Apply Operating System Image task sequence step, add a Run Command Line step that runs wuauclt.exe /detectnow. 

Answer: C,D 

Explanation: 

C: To do the updates offline to reduce network security risks. 

D: Install software updates to minimize network security risks Note: Configuration Manager 2012: Offline Servicing for Operating System Images In Configuration Manager 2012 there is a new feature for applying updates to operating system images while they are in the Configuration Manager library. This means any operating system image you see in the Operating Systems > Operating Systems Images node from the Software Library wunderbar can be updated with Component Based Servicing (CBS) updates. By updating an image in the Software Library instead of performing a new build and capture of the operating system image you will gain a few distinct advantages. You will be able to reduce the risk of vulnerabilities during operating system deployments and reduce the overall operating system deployment to the end user. You will also reduce the administrative effort to maintain your operating system images. 

Task Sequence Steps in Configuration Manager The following task sequence steps can be added to a System Center 2012 Configuration Manager task sequence: 

Install Software Updates Use the Install Software Updates task sequence step to install software updates on the destination computer. The destination computer is not evaluated for applicable software updates until this task sequence step runs. At that time, the destination computer is evaluated for software updates like any other Configuration Manager-managed client. In particular, this step installs only the software updates that are targeted to collections of which the computer is currently a member. This task sequence step runs only in a standard operating system. It does not run in Windows PE. Further information: http://technet.microsoft.com/en-us/library/hh824821.aspx Deployment Image Servicing and Management (DISM) Technical Reference Deployment Image Servicing and Management (DISM) is a command-line tool that is used to mount and service Windows. images before deployment. You can use DISM image management commands to mount, and get information about, Windows image (.wim) files or virtual hard disks (VHD) and to capture, split, and otherwise manage .wim files. 

Reference: 

http://blogs.technet.com/b/inside_osd/archive/2011/04/18/configuration-manager-2012-offline-servicing-foroperating-system-images.aspx 

http://technet.microsoft.com/en-us/library/hh846237.aspx 

Incorrect: 

wuauclt.exe /detectnow 

The detectnow switch will force a relatively immediate query to the WSUS server to see if there are any updates that are needed. If there are, the yellow shield will appear in the system tray. This is usually pretty quick, within 20-30 seconds. 


70-243 test question

Real 70-243 book:

Q79. You have a System Center 2012 R2 Configuration Manager Service Pack 1 (SP1) deployment that contains 8,000 client computers. 

When a custom application named App1.exe is installed on a computer, a registry value of App1=TRUE is added to the registry. App1 is installed on approximately half of the computers. 

You need to recommend a solution for creating a collection named Collection1 that contains only computers on which App1.exe is installed. The solution must minimize administrative effort. 

What should you include in the recommendation? 

A. a collection that has a direct membership rule 

B. a configuration item 

C. the custom client device settings 

D. a software category 

Answer: A 

Explanation: Membership rule of the direct rule type let you choose the users or computers that you want to add as members to a collection. This rule gives you direct control over which resources are members of the collection. This membership does not change unless a resource is removed from Configuration Manager. Configuration Manager must have discovered the resources or you must have imported the resources before you can add them to a direct rule collection. Direct rule collections have a higher administrative overhead than query rule collections because you must make changes to this collection type manually. 

Reference: How to Create Collections in Configuration Manager 

https://technet.microsoft.com/en-us/library/gg712295.aspx 


Q80. Your company uses System Center 2012 Configuration Manager to monitor compliance. 

The company has a configuration baseline for each server that has the Web Server (IIS) server role installed. 

A new corporate policy specifies that the maximum TCP window size for all of the Web servers must be 131,072 bytes. 

You discover that the TCP window size is set in the following registry entry: 

HKEY_LOCAL_ MACHINE\System\CurrentControlSet\Services\HTTP\Parameters 

\MaxBytesPerSend 

You need to generate an error message for all of the Web servers that do NOT comply with the corporate policy. 

What should you do? 

A. Add a new configuration item that has a registry value setting type to the configuration baseline. 

B. Create a query-based collection that contains all of the Web servers, and then initiate an inventory collection. 

C. Create a query that returns a list of all the Web servers, and then search the query results for the registry value. 

D. Add a new configuration item that has an Internet Information Services (IIS) metabase setting type to the configuration baseline. 

Answer: A 

Explanation: 

Compliance is evaluated by defining a configuration baseline that contains the configuration items that you want to evaluate and settings and rules that describe the level of compliance you must have. 

Reference: Introduction to Compliance Settings in Configuration Manager 

http://technet.microsoft.com/en-us/library/gg682139.aspx 


Q81. DRAG DROP 

Your network contains a System Center 2012 Configuration Manager environment. 

Your company has a security policy that contains mandatory registry settings for all 

servers. 

You have a collection named Servers that contains all of the servers. 

You need to identify which servers do not comply with the security policy. 

What should you do? 

To answer, move the four appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q82. Your network contains a System Center 2012 Configuration Manager environment that contains six servers configured as shown in the following table: 

Server5 and Server6 are in the perimeter network, while Server1, Server2, Server3, and Server4 are in the internal network. 

You plan to deploy servers to the perimeter network by using Configuration Manager. 

The operating system for each server will be installed over the network. 

The installations will begin automatically, as soon as each server starts for the first time. 

You need to recommend a solution to minimize the amount of network traffic between the perimeter network and the internal network during the installation of the operating systems. 

What should you do? 

A. Install a software update point on Server3. 

B. Configure IIS to support only HTTP on Server3. 

C. Install a PXE-enabled protected distribution point on Server5. 

D. Install a management point on Server5. 

E. Install Windows Server Update Services (WSUS) on Server3. 

F. Install Network Load Balancing (NLB) on Server6. 

G. Install the Windows Cluster service on Server6. 

H. Install a PXE-enabled protected distribution point on Server4. 

I. Install a management point on Server2. 

J. Install a protected distribution point on Server1. 

K. Install the Windows Cluster service on Server3. 

L. Install Network Load Balancing (NLB) on Server3. 

M. Configure the Exchange connector on Server3. 

N. Configure IIS to support only HTTPS on Server5. 

O. Install an enrollment proxy point on Server6. 

Answer: C 

Explanation: 

Methods Used to Deploy Operating Systems There are several methods that you can use to deploy operating systems to Configuration Manager client computers: 

* PXE initiated deployments: PXE-initiated deployments let client computers request a deployment over the network. In this method of deployment, the operating system image and a Windows PE boot image are sent to a distribution point that is configured to accept PXE boot requests. 

Note: 

A protected distribution point will limit deployment to a predefined boundary. (the perimeter network) With PXE enabled the servers will be installed when they boot. 

Reference: Introduction to Operating System Deployment in Configuration Manager 

http://technet.microsoft.com/en-us/library/gg682108.aspx 


Q83. Your network contains two Active Directory forests named contoso.com and litwareinc.com. 

You implement System Center 2012 Configuration Manager in the contoso.com forest. 

You deploy the Configuration Manager client to all of the client computers in contoso.com 

by using a logon script. 

You need to ensure that the Configuration Manager client is automatically deployed to all of 

the client computers in the litwareinc.com forest. 

What should you do? (Choose all that Apply.) 

A. Configure a Client Push Installation account. 

B. Enable Client Push installation. 

C. Enable Active Directory System Discovery. 

D. Configure an administrative user. 

E. Enable Active Directory Forest Discovery. 

Answer: A,B,E 

Explanation: 

E: In this scenario there are two forests. Active Directory Forest Discovery can discover Active Directory sites and subnets, and then create Configuration Manager boundaries for each site and subnet from the forests that you have configured for discovery. When Active Directory Forest Discovery identifies a supernet that is assigned to an Active Directory site, Configuration Manager converts the supernet into an IP address range boundary. 

DE: Use client push installation to install the System Center 2012 Configuration Manager client software on computers that Configuration Manager discovered. You can configure client push installation for a site, and client installation will automatically run on the computers that are discovered within the site's configured boundaries when those boundaries are configured as a boundary group. To configure the site to automatically use client push for discovered computers 

In the Configuration Manager console, click.Administration. 

In the.Administration.workspace, expand.Site Configuration, and then click.Sites. 

In the.Sites.list, select the site for which you want to configure automatic site-wide 

client push installation. 

On the.Home.tab, in the.Settings.group, click.Client Installation Settings, and then 

click.Client Push Installation. 

 (B)

 On the.General.tab of the.Client Push Installation Properties.dialog box, select.Enable automatic site-wide client push installation. Select the system types to which System.Center.2012 Configuration.Manager should push the client software by selecting.Servers,.Workstations, or.Configuration Manager site system servers. The default selection is.Servers.andWorkstations. Select whether you want automatic site-wide client push installation to install the System.Center.2012 Configuration.Manager client software on domain controllers. 

 (A)

 On the.Accounts.tab, specify one or more accounts for System.Center.2012 Configuration.Manager to use when connecting to the computer to install the client software. Click the.Create.icon, enter the.User name.and.Password, confirm the password, and then click.OK. You must specify at least one client push installation account, which must have local administrator rights on every computer on which you want to install the client. If you do not specify a client push installation account, System.Center.2012 Configuration.Manager tries to use the site system computer account, which will cause cross-domain client push to fail. 

Reference: How to Install Clients on Windows-Based Computers in Configuration Manager 

https://technet.microsoft.com/en-us/library/gg712298.aspx#BKMK_ClientPush 

Reference: Planning for Discovery in Configuration Manager 

..... .. 

https://technet.microsoft.com/en-us/library/gg712308.aspx 


Q84. Your network contains a single Active Directory domain. 

The domain contains a System Center Configuration Manager 2007 site and a System Center 2012 Configuration Manager site. 

You need to ensure that you can migrate objects from Configuration Manager 2007 to Configuration Manager 2012. 

What should you do? 

A. Assign the computer account of the Central Administration site server permission to the 

Configuration Manager 2007 site. 

Assign the computer account of the Central Administration site server permission to the Microsoft SQL Server database instance. 

B. Connect the Configuration Manager 2007 primary site as a child primary site of the Configuration Manager 2012 primary site. 

C. Extend the Active Directory schema and assign the Central Administration site server permissions to the System\System Management container. 

D. Connect the Configuration Manager 2012 primary site as a child primary site of the Configuration Manager 2007 primary site. 

Answer: A 

Explanation: 

To migrate from a supported source hierarchy, you must have access to each applicable Configuration Manager source site, and permissions within the System Center 2012 Configuration Manager destination site to configure and run migration operations. 

Reference: Prerequisites for Migration in System Center 2012 Configuration Manager 

http://technet.microsoft.com/en-us/library/gg712313.aspx 


Q85. You have Windows 7 images that are rebuilt quarterly and sported to System Center 2012 Configuration Manager. 

The Microsoft Deployment Toolkit (MDT) 2012 is integrated with Configuration Manager. 

You need to reduce the network security risks when the images are deployed by using Operating System Deployment (OSD). 

What should you do? (Choose all that Apply.) 

A. After the Apply Operating System Image task sequence step, add a step to install software updates offline. 

B. Before the Apply Operating System image task sequence step, add a step to install Deployment Imaging Servicing and Management (DISM). 

C. After the installation of the final Application, add an Install Software Updates task sequence step. 

D. After the Apply Operating System Image task sequence step, add a Run Command line step that runs wuauclt.exe /detectnow 

E. Before the Apply Operating System image task sequence step, add a step to install the Windows Automated Installation Kit (Windows AIK). 

Answer: A,C 

Explanation: 

A: To do the updates offline to reduce network security risks. 

C: Install software updates to minimize network security risks 

Note: Configuration Manager 2012: Offline Servicing for Operating System Images In Configuration Manager 2012 there is a new feature for applying updates to operating system images while they are in the Configuration Manager library. This means any operating system image you see in the Operating Systems > Operating Systems Images node from the Software Library wunderbar can be updated with Component Based Servicing (CBS) updates. By updating an image in the Software Library instead of performing a new build and capture of the operating system image you will gain a few distinct advantages. You will be able to reduce the risk of vulnerabilities during operating system deployments and reduce the overall operating system deployment to the end user. You will also reduce the administrative effort to maintain your operating system images. 

Task Sequence Steps in Configuration Manager The following task sequence steps can be added to a System Center 2012 Configuration Manager task sequence: 

Install Software Updates Use the Install Software Updates task sequence step to install software updates on the destination computer. The destination computer is not evaluated for applicable software updates until this task sequence step runs. At that time, the destination computer is evaluated for software updates like any other Configuration Manager-managed client. In particular, this step installs only the software updates that are targeted to collections of which the computer is currently a member. This task sequence step runs only in a standard operating system. It does not run in Windows PE. Further information: http://technet.microsoft.com/en-us/library/hh824821.aspx Deployment Image Servicing and Management (DISM) Technical Reference Deployment Image Servicing and Management (DISM) is a command-line tool that is used to mount and service Windows. images before deployment. You can use DISM image management commands to mount, and get information about, Windows image (.wim) files or virtual hard disks (VHD) and to capture, split, and otherwise manage .wim files. 

Reference: 

http://blogs.technet.com/b/inside_osd/archive/2011/04/18/configuration-manager-2012-offline-servicing-foroperating-system-images.aspx 

http://technet.microsoft.com/en-us/library/hh846237.aspx 

Incorrect: 

wuauclt.exe /detectnow 

The detectnow switch will force a relatively immediate query to the WSUS server to see if there are any updates that are needed. If there are, the yellow shield will appear in the system tray. This is usually pretty quick, within 20-30 seconds.