Lesson 4 "Understanding Cloud Services"

¡Supera tus tareas y exámenes ahora con Quizwiz!

The ____________ provides a blackbox approach when users access services on the Internet. (Page 121)

Cloud

____________ provide communications between users over the cloud. (Page 122)

Communications services

OneDrive is considered a productivity service. (True or False)

False. OneDrive is considered a storage service.

The public cloud offers a more secure environment than the corporate network. (True or False) (Page 121)

False. The public cloud does not offer a more secure environment than the corporate network.

____________ provides the infrastructure that the cloud runs on such as servers, switches, routers, and other equipment. (Page 122)

Infrastructure as a Service (IaaS)

____________ is a cloud-computing platform used for building, deploying, and managing applications and services through a global network of Microsoft-managed datacenters. (Page 137)

Microsoft Azure

____________ is a software component that is used to orchestrate protection for virtual machines that are located on on-premises Hyper-V host servers located in the VMM cloud. (Page 141)

Microsoft Azure Site Recovery

____________ is a cloud-based management solution that allows you to manage your computers when the users are not inside your corporate network. (Page 122)

Microsoft Intune

____________ are used to quickly organize and manage your computers and users for Microsoft Intune. (Page 129)

Microsoft Intune Groups

____________ allows you to buy, develop, test, deploy, and manage software applications so that the application can be accessed by the user. (Page 122)

Platform as a Service (PaaS)

Microsoft Intune ____________ are used to apply settings that apply to domain-joined computers in any domain. (Page 131)

Policies

The ____________ is a web-based service that is hosted outside of your organization and allows users to access services and documents over the Internet. (Page 121)

Public cloud

When a phone is stolen, it is best to wipe the phone. (True or False) (Page 135)

True

When deploying software using Microsoft Intune, it is best to deploy to groups. (True or False) (Page 129)

True

Which of the following can be used to deploy and manage servers running Windows Server 2012 R2 on the Microsoft Azure? (Choose all that apply) (Page 137) a. Microsoft Azure virtual machine (VM) tools b. Virtual Machine Monitor (VMM) c. Virtual Machine Manager (VMM) d. App Controller

a. Microsoft Azure virtual machine (VM) tools c. Virtual Machine Manager (VMM) d. App Controller

Which cloud service is provided by Microsoft Office 365? (Page 122) a. Productivity services b. Storage services c. Communication services d. Search services

a. Productivity services

On which operating system can you install the Microsoft Intune? (Choose all that apply) (Page 125) a. Windows XP Professional (SP3) b. Windows Vista Business Edition c. Windows 10 Professional (physical computer) d. Windows 8/8.1 Consumer (virtual client)

a. Windows XP Professional (SP3) b. Windows Vista Business Edition c. Windows 10 Professional (physical computer)

Which type of membership should you be used to add devices automatically to groups in Microsoft Intune? (Page 130) a. Direct b. Criteria c. Dynamic d. Auto

b. Criteria

Which type of group is created manually in the Microsoft Intune Administration console? (Page 131) a. dynamic query-based group b. direct-based group c. security group d. dynamic group

b. Direct-based group

You have a phone that is being managed by Microsoft Intune and the phone is stolen. What should you do? (Page 135) a. Change the password b. Wipe the phone c. Ping the phone d. Run an inventory report for the phone

b. Wipe the phone

Which configuration allows you to see devices that are managed by Microsoft Intune to appear in Configuration Manager? (Page 124) a. Microsoft Intune Stand-Alone Cloud Configuration b. Microsoft Intune Cloud + On-Premise Configuration c. Microsoft Intune + Configuration Manager d. Microsoft Intune with System Center Plug-in

c. Microsoft Intune + Configuration Manager

Which administrator role in Microsoft Intune can create and delete all other types of accounts? (Page 129) a. Microsoft Intune Service administrator role b. Microsoft Intune User Management Administrator role c. Microsoft Intune Tenant Administrator d. Microsoft Intune SuperAdmin Role

c. Microsoft Intune Tenant Administrator

Which of the following represent security and management tasks that can be handled with Microsoft Intune? (Choose all that apply) (Page 123) a. Track hardware and software inventory b. Provide remote assistance c. Protect computers from malware. d. Manage the deployment of software updates.

c. Protect computers from malware. d. Manage the deployment of software updates.

When using Microsoft Azure, which of the following is a popular open source cache for your Azure applications? (Page 140) a. Service Bus b. Managed Cache c. Redis Cache d. Stream Analytics

c. Redis Cache


Conjuntos de estudio relacionados

Organizational Behavior Final Exam

View Set

Practice Management/Electronic Health Records Chapter 2

View Set

NYS Life, accident, and health insurance Exam

View Set

Latitude and Climate Zones, Longitude and Time Zones

View Set