Module 11

Ace your homework & exams now with Quizwiz!

41. Iba uses the offline files feature for two users, Abed and Jessica, working on the same project to enable the sharing of data when they go offline. Abed makes changes on a synchronized file at home. Meanwhile, Jessica makes changes to the original file in the shared folder. What will happen when Abed returns to the office and tries to sync the file that he edited? a. Abed's changes will overwrite the changes made by Jessica. b. Jessica's changes will overwrite the changes made by Abed. c. Abed or Jessica will have to manually resolve the sync conflict. d. Abed's version will be saved as a new file in the shared folder.

Abed or Jessica will have to manually resolve the sync conflict.

15. Which utility should be used to review any synchronization errors that might occur using the offline files feature in Windows 10? a. File History b. Work Folders c. Sync Center d. OneDrive

c. Sync Center

43. Nanxi wants to switch from using roaming profiles in the organization. After evaluating various alternatives, she decides to proceed with UE-V because it offers several advanced functionalities that are not offered by roaming profiles. Which of the following is an example of such functionality? a. Certificates can be synchronized to user profiles by storing them in Active Directory. b. Settings are synchronized at sign-in or sign-out rather than while the user is signed in. c. Synchronization is based on templates for fine-grained control of specific application settings. d. Synchronization can be performed across multiple operating devices using the same operating system.

c. Synchronization is based on templates for fine-grained control of specific application settings.

9. In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers? a. The Local Resources tab b. The Display tab c. The General tab d. The Experience tab

d. The Experience tab

27. Marlon is facing an issue on his Windows 10 laptop while working from home, so he contacts Jerusha from the IT helpdesk to resolve the issue. After evaluating the issue, Jerusha realizes that she needs to use the Registry Editor to edit the registry on Marlon's computer to resolve the issue. Which of the following is true of the Remote Registry service on Marlon's computer in this scenario? a. The Remote Registry service is enabled by default whenever Marlon restarts his computer. b. Jerusha needs to configure the firewall specifically to allow the Remote Registry service to access port 80. c. Jerusha does not need the Remote Registry service to edit the registry on Marlon's computer using RegistryEditor. d. The Remote Registry service on Marlon's computer is started when Jerusha connects to his computer.

d. The Remote Registry service on Marlon's computer is started when Jerusha connects to his computer.

7. Remote Desktop listens on which TCP port number? a. 3389 b. 3450 c. 3398 d. 3938

a. 3389

20. Which of the following best describes Extensible Authentication Protocol (EAP)? a. A framework that allows multiple authentication methods to be integrated with the sign-in process b. One of the easiest protocols to use for a VPN, typically based on a user name and password c. The Microsoft implementation of the WS-Management protocol for remote management d. A Windows 10 feature that synchronizes files from a shared folder to a Windows 10 computer

a. A framework that allows multiple authentication methods to be integrated with the sign-in process

22. You are using Remote Desktop Connection as the RDP client to resolve an issue on a user's system. You want to configure the RD Gateway settings. Which tab should you use to make the desired change? a. Advanced b. Experience c. Local Resources d. Display

a. Advanced

28. Rizwan enables WP remoting and tries to access a remote computer using it. He begins the session by running the Enter-PSSession -ComputerName RemoteComputer command. Which of the following additional steps does Rizwan need to perform if the computer is in a workgroup-based network? a. He should configure TrustedHosts on the client. b. He should register Windows PowerShell with WinRM. c. He should restart the WinRM service to force settings to take effect. d. He should enable the Remote Registry service.

a. He should configure TrustedHosts on the client.

24. An application on Welma's computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer. Which of the following remote assistance tools are Ezekiel and Welma most likely using? a. Quick Assist b. Remote Assistance c. Remote Desktop d. MMC Snap-Ins

a. Quick Assist

3. By installing which server role can Windows Server 2019 be configured as a remote access server? a. Remote Access b. Remote Server Administration c. Remote Assistance d. Network Policy and Access Services

a. Remote Access

18. Which tab in Remote Desktop Connection allows you to configure server authentication settings and Remote Desktop Gateway (RD Gateway) settings? a. The Advanced tab b. The Display tab c. The General tab d. The Experience tab

a. The Advanced tab

11. In Remote Desktop Connection, which tab controls which resources in the local computer are available for the session? a. The Local Resources tab b. The Display tab c. The General tab d. The Experience tab

a. The Local Resources tab

39. Chieh wants to implement DirectAccess to allow clients to automatically connect to VPN. An alternative option is Always On VPN, but she decides against using it. Which of the following justifies Chieh's decision? a. The clients have Windows 8.1 installed. b. DirectAccess uses a device tunnel. c. The client connectivity for DirectAccess is based on IPv6. d. Chieh does not want to use GPOs.

a. The clients have Windows 8.1 installed.

35. Ming is automating VPN deployment in her organization. She decides to use Windows Configuration Designer to enable the VPN deployment. She deploys the VPN connectivity profiles to the client computers as provisioning packages. Which of the following is true of this scenario? a. The provisioning packages need to be deployed via Microsoft Intune. b. Users need to know Windows PowerShell scripting to install the provisioning packages. c. This method cannot be used for computers that are not domain joined. d. Users can click on the provisioning package to run it as an executable file.

a. The provisioning packages need to be deployed via Microsoft Intune.

44. Jin, a system administrator, implements Work Folders at his organization, Nelconnect. He decides to enable automatic discovery of the Work Folders URL to support devices that are not domain joined. Darwish is working from home and opens the Work Folders client to access his work files. If Darwish's email is [email protected], what address will the Work Folders client attempt to connect to? a. https://workfolders.nelconnect.com b. https://www.workfolders.com c. https://darwish.nelconnect.com d. https://darwish.workfolders.nelconnect.com

a. https://workfolders.nelconnect.com

12. You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer? a. /admin b. /public c. /shadow d. /control

b. /public

23. Maya launches Remote Desktop Connection from a command prompt by running mstsc.exe. She wants to connect to a remote computer to resolve an issue. Based on the issue description that she received in the ticketing tool, she suspects that the computer may be compromised. Which of the following commands should Maya run in this scenario? a. /admin b. /restrictedAdmin c. /public d. /noConsentPrompt

b. /restrictedAdmin

32. Odilon, an IT administrator, configures all computers with a VPN client to allow access to the remote access server while working from home. The VPN clients are configured to use the L2TP protocol with IPSec for authentication and data encryption. The authentication is based on the use of a pre-shared key. Which of the following is true of this scenario? a. This authentication method is more secure than using certificates or Kerberos. b. All clients have the same password to access the remote access server. c. The pre-shared key does not need to be configured on the remote access server. d. The pre-shared key is more complicated to implement than certificates or Kerberos.

b. All clients have the same password to access the remote access server.

16. What is the preferred method to configure clients to use Work Folders? a. Configure user object in Active Directory b. Automatic discovery c. Manually enter the Work Folders URL d. Configure through the System and Security applet

b. Automatic discovery

36. Yunha and Zachariah are discussing the authentication protocol that they should be using in their VPN settings. Yunha says that they should be using CHAP, but Zachariah disagrees. Which of the following is a possible reason for Zachariah's disagreement? a. CHAP transmits unencrypted credentials during authentication. b. CHAP has serious security flaws that make it easy to obtain the credentials. c. CHAP can only be used with IKEv2. d. CHAP allows multiple authentication methods to be integrated with the sign-in process.

b. CHAP has serious security flaws that make it easy to obtain the credentials.

6. For domain-joined computers, what is the simplest way to configure VPN connections automatically? a. Manually b. Group Policy Preferences c. CMAK d. Windows PowerShell

b. Group Policy Preferences

30. Your organization issues certificates to users for authentication to resources. Because roaming profiles are not implemented, you implement credential roaming to synchronize the certificates to the profile on multiple computers. In this scenario, where are the user certificates stored? a. In Group Policy b. In Active Directory c. On a file server d. In the user profile

b. In Active Directory

25. Jonaed, an IT support specialist, is using Quick Assist to resolve an issue that a user is facing with an application on their Windows 10 computer. Jonaed is trying to resolve the issue from his laptop over the Internet. Which of the following is true of this scenario? a. Jonaed will not be able to resolve the issue because Quick Assist does not work over the Internet. b. Jonaed's laptop and the user's computer will not communicate directly with each other. c. Jonaed will need to set up a special firewall configuration for Quick Assist to work. d. Jonaed's laptop will not be able to display the user's screen even if the user allows it.

b. Jonaed's laptop and the user's computer will not communicate directly with each other.

4. Which VPN protocol uses IPSec to provide data encryption? a. PPTP b. L2TP c. SSTP d. PPP

b. L2TP

40. Nicole, a digital marketer, uses her Windows 10 laptop to create content. She often travels and works remotely, so all of her work files are synced to a shared folder on a file server using offline files. Offline files is enabled on her laptop as well on the file server. Nicole creates a new file at work and edits it. What action does Nicole need to take to ensure that the same file is available to her when she reaches home? a. No action is required because the file will be made offline automatically. b. Nicole should manually select the file and make it available offline. c. Nicole should copy the file to her laptop. d. Nicole should disable offline files on her laptop.

b. Nicole should manually select the file and make it available offline.

21. A user working from a different location from yours is experiencing an issue with an application on their system. To diagnose and resolve the issue, you need to be able to see the application while it is in use on the user's system. Which of the following options should you use to resolve this issue? a. Remote Desktop b. Remote Assistance c. Group Policy d. Windows PowerShell remoting

b. Remote Assistance

45. Frida opens the Work Folders client on her personal laptop to access her work files. Her laptop is not domain joined. The administrator has not enabled automatic discovery. What should Frida do in this scenario? a. She should enter her email address. b. She should manually enter the Work Folders URL. c. She should enter the address of her company's website. d. She should use Group Policy to configure the Work Folders URL.

b. She should manually enter the Work Folders URL.

10. In Remote Desktop Connection, which tab allows you to select the screen resolution and color depth for the remote session? a. The Local Resources tab b. The Display tab c. The General tab d. The Experience tab

b. The Display tab

33. Jared is configuring a VPN connection on his Windows 10 laptop. He opens the Settings window to configure the connection. What information should Jared include under the label VPN provider? a. The FQDN or IP address of the remote access server b. The software that creates and controls the VPN connection c. The name of the VPN connection d. The type of VPN such as PPTP or SSTP

b. The software that creates and controls the VPN connection

13. You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow you to connect to an existing session and view what another user is doing? a. /admin b. /public c. /shadow d. /control

c. /shadow

26. You are using an MMC snap-in to troubleshoot an issue on a user's computer. The MMC snap-in is using the WinRM service to communicate between the user's computer and your computer. Which of the following is true of the security used by WinRM if the port used is 5985? a. WinRM is configured to use secure sockets layer (SSL) to secure communication. b. WinRM is configured to use transport layer security (TLS) to secure communication. c. Authentication to WinRM is protected by Kerberos. d. Data sent over the network using WinRM is encrypted.

c. Authentication to WinRM is protected by Kerberos.

1. Which of the following is considered the oldest technology for remote access? a. Virtual private network b. DirectAccess c. Dial-up networking d. TCP/IP

c. Dial-up networking

37. Chao is using a VPN client to access work files via a remote access server. However, her VPN connection to access work files has also made Internet access slow. Which of the following is the best solution to optimizing the Internet connection? a. Disable the VPN connection. b. Change the VPN protocol from PEAP-MS-CHAP v2 to PAP. c. Disable VPN from being used as a default gateway. d. Use IPv4 instead of IPv6.

c. Disable VPN from being used as a default gateway.

8. What is used to prevent users from connecting to Remote Desktop until the connection is authenticated? a. Windows Firewall b. Remote Desktop Authentication c. Network Level Authentication d. IPSec Authentication

c. Network Level Authentication

19. With L2TP, which of the following is not something on which the authentication for IPSec can be based? a. A pre-shared key b. Certificates c. PPTP d. Kerberos

c. PPTP

14. You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow someone else to control your session if that person is viewing it with you? a. /admin b. /public c. /shadow d. /control

d. /control

34. You decide to automate VPN deployment in your organization. You want to create an executable file that users can click on whenever they want to create a VPN connection. Which of the following deployment methods should you use? a. Windows Configuration Designer b. Windows PowerShell c. Group Policy Preferences d. Connection Manager Administration Kit

d. Connection Manager Administration Kit

2. What type of technology allows users to work with files whether they are connected to a network or not by copying files locally to mobile computers? a. DirectAccess b. DSL c. VPN d. Data synchronization

d. Data synchronization

29. Guocheng, the IT administrator at Curio Technologies, is evaluating alternatives to using roaming profiles in the organization. He considers configuring folder redirection using Group Policy. Which of the following justifies Guocheng's decision? a. He wants to use an Azure AD account to synchronize profile settings to multiple computers. b. He wants user profile settings to be synchronized while the user is signed in rather than at sign-in or sign-out. c. He wants user certificates issued by the organization to be stored in Active Directory. d. He wants to store user profile information on a file server so that it is accessible from any computer.

d. He wants to store user profile information on a file server so that it is accessible from any computer.

5. When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect? a. PPTP b. L2TP c. SSTP d. IKEv2

d. IKEv2

38. Ruzwana configures Always On VPN for the Windows 10 client computers in her organization. The client computers have a mix of Windows 10 Enterprise and Windows 10 Pro licenses. Which of the following is true of this scenario? a. User authentication is through using cached credentials on Windows 10 Enterprise computers. b. Group Policy Objects cannot be employed on Windows 10 Enterprise computers. c. Windows 10 Pro computers must be domain joined to implement device tunnel. d. Only user tunnel is available for Windows 10 Pro computers.

d. Only user tunnel is available for Windows 10 Pro computers.

17. Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer? a. Remote Control b. Remote Access c. Remote Desktop d. Remote Assistance

d. Remote Assistance

42. Trisha, an IT admin, implements Work Folders to enable data synchronization for users in the sales team in her organization. Which of the following is true of this scenario? a. The Work Folders client is not available for Windows 7 devices. b. The Work Folders client cannot be run on an iOS or Android phone. c. The folder for each user is stored on their individual computers. d. The users are given unique folders for file storage.

d. The users are given unique folders for file storage.

31. Umama wants to enable User Experience Virtualization (UE-V) by configuring Group Policy settings. Two important settings that she needs to configure are the setting storage location and settings template catalog location. Which of the following is true of this scenario? a. Umama needs to create settings location templates for all apps for which she wants to synchronize settings. b. Umama will not be able to synchronize settings for Microsoft Office and Windows. c. Umama needs to configure Azure AD account to synchronize profile settings to multiple computers. d. Umama needs to create settings location templates for custom apps and non-Microsoft apps.

d. Umama needs to create settings location templates for custom apps and non-Microsoft apps.


Related study sets

HRM300T - Week 5 Apply Assignment

View Set

ECON 2105 - Exam 2 Chapters 19-22, and Sample Quiz

View Set

Risk Management Framework (RMF) Steps 1-6 Process Overview

View Set

PSYC 205: Child Development Unit 1 EXAM 1 Practice

View Set

Hesi Final Study Questions: Med Surg II

View Set

Examining Social Life Practice - Sociology

View Set