CpS 201 Chapters 11-12

¡Supera tus tareas y exámenes ahora con Quizwiz!

Group Policy Preferences

For domain-joined computers, what is the simplest way to configure VPN connections automatically?

Remote Assistance

A user working from a different location from yours is experiencing an issue with an application on their system. To diagnose and resolve the issue, you need to be able to see the application while it is in use on the user's system. Which of the following options should you use to resolve this issue?

A device that is likely to function in kiosk mode

Ablorde, a system administrator, wants to use the self-deploying autopilot deployment mode to deploy Windows 10 to a computer. Which of the following devices is most likely to benefit from this approach?

Windows SIM

After a customized image is created, which of the following is used to place the image on a distribution share?

Quick Assist

An application on Welma's computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer. Which of the following remote assistance tools are Ezekiel and Welma most likely using?

It defines source files that are to be captured as part of the image.

Ariela prepares a workstation for imaging and shuts it down. She boots the computer using Windows PE to continue the imaging process. To capture the image using DISM, she needs to use the following command: DISM /Capture-Image /ImageFile:imagefile.wim /CaptureDir:path /Name:imagename. In this command, what does /CaptureDir:path signify?

User State Migration Tool

Brian is performing an upgrade of computers in the organization from Windows 8.1 Pro to Windows 10. Along with the OS upgrade, he wants to migrate user profile data. Which of the following ADK tools can Brian use for this purpose?

Remote Access

By installing which server role can Windows Server 2019 be configured as a remote access server?

The encryption key will be needed to deploy the package.

Chao is creating a provisioning package. When given the option to encrypt the package, he considers proceeding with encryption. However, his colleague advises against encryption mentioning that it would make the package more difficult to deploy. Which of the following justifies the colleague's advice?

Disable VPN from being used as a default gateway.

Chao is using a VPN client to access work files via a remote access server. However, her VPN connection to access work files has also made Internet access slow. Which of the following is the best solution to optimizing the Internet connection?

The clients have Windows 8.1 installed.

Chieh wants to implement DirectAccess to allow clients to automatically connect to VPN. An alternative option is Always On VPN, but she decides against using it. Which of the following justifies Chieh's decision?

Microsoft-Windows-International-Core-WinPE | UILanguage

Darwish wants to perform an unattended installation of Windows 10. He wants to set the default language for the newly installed OS in the answer file during the windowsPE configuration pass. Which of the following answer file settings should he update or include?

Deployment Tools

Dervin wants to use the image installation method to install Windows 10. To accomplish this task, he creates a Windows 10 image. In order to configure the image, which of the following ADL tools should he use?

It ensures that the system is never vulnerable to the exploits fixed by the update.

Frida is performing an unattended installation of Windows 10. She uses the answer file to ensure that certain security update packages are applied to the Windows 10 image during the offlineServicing configuration pass. What is the advantage of performing this action during this particular stage?

She should manually enter the Work Folders URL.

Frida opens the Work Folders client on her personal laptop to access her work files. Her laptop is not domain joined. The administrator has not enabled automatic discovery. What should Frida do in this scenario?

Windows Assessment Toolkit

Generaze Research purchases three new laptops for the data science team. To save costs, the company purchases laptops that are a couple of generations old. Moses, the system administrator, upgrades the computers to Windows 10 Pro. Before handing the laptops to the team members, he wants to simulate user activity and perform load testing on the laptops to ensure that they will be able to withstand the resource intensive operations performed by the data scientists. Which of the following ADK tools should Moses use in this scenario?

He wants to store user profile information on a file server so that it is accessible from any computer.

Guocheng, the IT administrator at Curio Technologies, is evaluating alternatives to using roaming profiles in the organization. He considers configuring folder redirection using Group Policy. Which of the following justifies Guocheng's decision?

Removable media installation

Haley is tasked with purchasing and setting up Windows 10 computers in Kraper Technologies. These computers will be used by 75 new hires. The company already has 20 available computers with Windows 10 installed, so Haley needs to purchase and set up the remaining computers. Which of the following installation methods is least suitable to Haley's requirements?

The hard drive of the computers will be wiped before installation.

Howard's organization purchased laptops with Windows 10 Home preinstalled, and he is tasked with upgrading these computers to Windows 10 Pro. Along with the OEM installation of Windows 10, he notices that several additional software is installed by the vendor. He performs a clean installation on these computers. Which of the following is true in this scenario?

Abed or Jessica will have to manually resolve the sync conflict.

Iba uses the offline files feature for two users, Abed and Jessica, working on the same project to enable the sharing of data when they go offline. Abed makes changes on a synchronized file at home. Meanwhile, Jessica makes changes to the original file in the shared folder. What will happen when Abed returns to the office and tries to sync the file that he edited?

unattended.xml

If you do not specify an answer file, then which of the following will Sysprep search for to use as an answer file?

The Experience tab

In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?

The Display tab

In Remote Desktop Connection, which tab allows you to select the screen resolution and color depth for the remote session?

The Local Resources tab

In Remote Desktop Connection, which tab controls which resources in the local computer are available for the session?

Generalization

In a corporate environment, a common use for Sysprep is preparing workstations for imaging. What is this process known as?

The software that creates and controls the VPN connection

Jared is configuring a VPN connection on his Windows 10 laptop. He opens the Settings window to configure the connection. What information should Jared include under the label VPN provider?

Creating a configuration set

Jin is performing an unattended installation of Windows 10 on 40 computers. The computers need to be configured differently depending on the users who will be using these systems. Certain users will need access to specific drivers and hardware, while others may need access to different sets of hardware and drivers. Which of the following would help Jin in this scenario?

https://workfolders.nelconnect.com

Jin, a system administrator, implements Work Folders at his organization, Nelconnect. He decides to enable automatic discovery of the Work Folders URL to support devices that are not domain joined. Darwish is working from home and opens the Work Folders client to access his work files. If Darwish's email is [email protected], what address will the Work Folders client attempt to connect to?

Jonaed's laptop and the user's computer will not communicate directly with each other.

Jonaed, an IT support specialist, is using Quick Assist to resolve an issue that a user is facing with an application on their Windows 10 computer. Jonaed is trying to resolve the issue from his laptop over the Internet. Which of the following is true of this scenario?

She wanted to identify why some older applications were not compatible with Windows 10.

Kathryn, the IT administrator at Alpha Systems, recently upgraded five computers from Windows 7 with Service Pack 1 to Windows 10. After the upgrade, she ran Standard User Analyzer. Which of the following is the most likely reason for Kathryn choosing to run Standard User Analyzer?

The Remote Registry service on Marlon's computer is started when Jerusha connects to his computer.

Marlon is facing an issue on his Windows 10 laptop while working from home, so he contacts Jerusha from the IT helpdesk to resolve the issue. After evaluating the issue, Jerusha realizes that she needs to use the Registry Editor to edit the registry on Marlon's computer to resolve the issue. Which of the following is true of the Remote Registry service on Marlon's computer in this scenario?

/restrictedAdmin

Maya launches Remote Desktop Connection from a command prompt by running mstsc.exe. She wants to connect to a remote computer to resolve an issue. Based on the issue description that she received in the ticketing tool, she suspects that the computer may be compromised. Which of the following commands should Maya run in this scenario?

The provisioning packages need to be deployed via Microsoft Intune.

Ming is automating VPN deployment in her organization. She decides to use Windows Configuration Designer to enable the VPN deployment. She deploys the VPN connectivity profiles to the client computers as provisioning packages. Which of the following is true of this scenario?

Synchronization is based on templates for fine-grained control of specific application settings.

Nanxi wants to switch from using roaming profiles in the organization. After evaluating various alternatives, she decides to proceed with UE-V because it offers several advanced functionalities that are not offered by roaming profiles. Which of the following is an example of such functionality?

The VDH file can be used to boot a virtual machine with Hyper-V.

Nicole decides to use the DISM utility to create an image of a Windows 10 system for deployment. She creates the image in the VHD file format. Which of the following is true of this scenario?

Nicole should manually select the file and make it available offline.

Nicole, a digital marketer, uses her Windows 10 laptop to create content. She often travels and works remotely, so all of her work files are synced to a shared folder on a file server using offline files. Offline files is enabled on her laptop as well on the file server. Nicole creates a new file at work and edits it. What action does Nicole need to take to ensure that the same file is available to her when she reaches home?

All clients have the same password to access the remote access server.

Odilon, an IT administrator, configures all computers with a VPN client to allow access to the remote access server while working from home. The VPN clients are configured to use the L2TP protocol with IPSec for authentication and data encryption. The authentication is based on the use of a pre-shared key. Which of the following is true of this scenario?

3389

Remote Desktop listens on which TCP port number?

He should configure TrustedHosts on the client.

Rizwan enables WP remoting and tries to access a remote computer using it. He begins the session by running the Enter-PSSession -ComputerName RemoteComputer command. Which of the following additional steps does Rizwan need to perform if the computer is in a workgroup-based network?

Only user tunnel is available for Windows 10 Pro computers.

Ruzwana configures Always On VPN for the Windows 10 client computers in her organization. The client computers have a mix of Windows 10 Enterprise and Windows 10 Pro licenses. Which of the following is true of this scenario?

A provisioning package

Ruzwana is a system administrator at an organization that has over 1000 employees. Each of the employees brings their own devices to work. She wants to find an efficient method that will allow her to make the various devices meet organizational standards. In addition, she would like to deploy various universal applications such as the VPN client, meeting software, and productivity software to these systems. Which of the following options should Ruzwana use to achieve the desired outcome in this scenario?

Universal Naming Convention (UNC)

The path to the distribution share should always be referred to by which path to ensure that it can be accessed over the network during unattended installations?

The users are given unique folders for file storage.

Trisha, an IT admin, implements Work Folders to enable data synchronization for users in the sales team in her organization. Which of the following is true of this scenario?

Umama needs to create settings location templates for custom apps and non-Microsoft apps.

Umama wants to enable User Experience Virtualization (UE-V) by configuring Group Policy settings. Two important settings that she needs to configure are the setting storage location and settings template catalog location. Which of the following is true of this scenario?

She should apply the image to a computer, make modifications, and capture the image again.

Wemimo created a Windows 10 image 12 months ago and continued to use the same image for new deployments during this period. All updates to the OS, drivers, and applications were performed on the deployed workstations directly. She now wants to update the image so that it contains the latest updates for future deployments. What is the optimal approach that Wemimo should take in this scenario?

On a network file share

Wes is using USMT to migrate user profiles to newly purchased Windows 10 computers in the organization. To begin the migration, he executes the ScanState.exe process on the source computers to collect user profile information. Where is this information most likely to be stored?

User State Migration Tool (USMT)

What does Microsoft provide for moving user profiles to Windows 10?

Automatic discovery

What is the preferred method to configure clients to use Work Folders?

Network Level Authentication

What is used to prevent users from connecting to Remote Desktop until the connection is authenticated?

Data synchronization

What type of technology allows users to work with files whether they are connected to a network or not by copying files locally to mobile computers?

IKEv2

When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?

computer SID

When a generalized image is applied to a computer, that computer generates all of the system-specific data that is required, including the computer name and what other item?

L2TP

Which VPN protocol uses IPSec to provide data encryption?

Image-based

Which installation method is the fastest type of installation and provides the highest level of customization?

Remote Assistance

Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

Offline updates

Which of the following are software packages containing device drivers or security updates that are applied to an image during the offlineServicing configuration pass of the installation?

An XML file that contains settings used during the Windows installation process

Which of the following best defines an answer file?

A framework that allows multiple authentication methods to be integrated with the sign-in process

Which of the following best describes Extensible Authentication Protocol (EAP)?

Deployment Image Servicing and Management (DISM)

Which of the following can be used to capture and apply images used for installing Windows 10 as well as mount and modify images that are offline?

oobeSystem

Which of the following configuration passes is applied during the portion of the installation where users are asked for information after the second reboot?

offlineServicing

Which of the following configuration passes is used to apply packages to a Windows 10 image after it is copied to the computer hard drive, but before it is running?

Sysprep

Which of the following does Windows 10 include to prepare workstations for imaging, in a process known as generalization?

Removable media

Which of the following installation methods is the least suitable method for a large volume of computers?

Distribution share

Which of the following installation methods requires computers to be booted into Windows PE from removable storage and then run the Windows 10 installation from a server?

Clean

Which of the following installations of Windows 10 is performed on a computer that does not have existing data or applications?

Windows PE

Which of the following is a limited and non-graphical version of Windows 10 that can be used for installing, troubleshooting, and repairing Windows 10?

Removable media

Which of the following is a suitable method for small organizations that only occasionally install Windows 10?

Dial-up networking

Which of the following is considered the oldest technology for remote access?

Windows AutoPilot

Which of the following is not a Windows 10 ADK tool?

A configuration set

Which of the following is the subset of files in a distribution share that are required for a particular answer file?

Installing, troubleshooting, or repairing Windows 10

Which of the following scenarios represents the best use of Windows PE?

The Advanced tab

Which tab in Remote Desktop Connection allows you to configure server authentication settings and Remote Desktop Gateway (RD Gateway) settings?

Sync Center

Which utility should be used to review any synchronization errors that might occur using the offline files feature in Windows 10?

PPTP

With L2TP, which of the following is not something on which the authentication for IPSec can be based?

Distribution share installation

Yemi needs to install Windows 10 on 25 custom-built computers in the organization. The computers do not have an OS installed. In addition to installing Windows 10, Yemi needs to install additional updates to the operating system and custom drivers for certain hardware and applications. Which of the following installation methods is best suited in this scenario?

You may need several images for different types of users.

You are installing Windows 10 on 250 computers in an organization for different sets of users. You decide to proceed with image-based installation. What should you keep in mind when proceeding with this method of installation?

Advanced

You are using Remote Desktop Connection as the RDP client to resolve an issue on a user's system. You want to configure the RD Gateway settings. Which tab should you use to make the desired change?

Authentication to WinRM is protected by Kerberos.

You are using an MMC snap-in to troubleshoot an issue on a user's computer. The MMC snap-in is using the WinRM service to communicate between the user's computer and your computer. Which of the following is true of the security used by WinRM if the port used is 5985?

/control

You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow someone else to control your session if that person is viewing it with you?

/shadow

You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow you to connect to an existing session and view what another user is doing?

/public

You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?

They should double-click the file Win10V1.ppkg.

You create a provisioning package for Windows 10 and share it with the users in your organization. The provisioning package is named Win10V1.ppkg. What should users do to initiate the installation of the package?

Eight

You create an image of Windows 10 to deploy to workstations in your organization. Different sets of users need different applications and settings, so you need to create multiple images. You run Sysprep on the source workstation with the Generalize option and create the first image with the required modification. You repeat the process beginning with Sysprep for the subsequent images. How many images will you be able generate before an error is generated?

Connection Manager Administration Kit

You decide to automate VPN deployment in your organization. You want to create an executable file that users can click on whenever they want to create a VPN connection. Which of the following deployment methods should you use?

DISM /apply-ffu /imagefile=imagefile.ffu /ApplyDrive:\\.\PhysicalDriveX

You have successfully created an FFU image using DISM. You now want to apply the image to a computer. What is the syntax for the command that you must use to accomplish this task?

Someone will need to start the remote computer from a boot image.

You want to use WDS in conjunction with Microsoft Deployment Toolkit to deploy Windows 10 to a computer over the network. You are not going to use Endpoint Configuration Manager. Which of the following is true in this scenario?

In Active Directory

Your organization issues certificates to users for authentication to resources. Because roaming profiles are not implemented, you implement credential roaming to synchronize the certificates to the profile on multiple computers. In this scenario, where are the user certificates stored?

CHAP has serious security flaws that make it easy to obtain the credentials.

Yunha and Zachariah are discussing the authentication protocol that they should be using in their VPN settings. Yunha says that they should be using CHAP, but Zachariah disagrees. Which of the following is a possible reason for Zachariah's disagreement?

/quiet

Zachary is creating a script to use Sysprep for deploying Windows 10 by imaging. Because he's using batch files, he wants to prevent Sysprep from displaying any dialog boxes. Which of the following command-line options should he use in his script?


Conjuntos de estudio relacionados

Cell Cycle Intro and DNA Replication + PCR and Genome Variation

View Set

Chapter 10- Essential Peripherals

View Set

HY 136 Cooke | Test 1 Study Guide Multiple Choice

View Set

T-38 Instruments/Nav Shooters Gouge

View Set