C07.Configuring Applications Flashcards

1
Q
  1. You are the network administrator for your organization. Your organization has started using App-V. You notice that laptop users are still able to access App-V applications even when they are not connected to the network. You want to stop this from happening. What do you do?

A. Disable the Disconnected Operation Mode.
B. Enable Terminal Services.
C. Enable Remote Desktop Services.
D. Discontinue laptops from using App-V.

A

A. Disable the Disconnected Operation Mode.

  1. A. The disconnected operation mode allows App-V Desktop Clients to run applications even when the client cannot connect to the App-V Management Server. This allows laptops to continue to access App-V applications even when not connected to the network or Internet. To stop that from happening, you must disable the disconnected operation mode.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. You are the network administrator for your organization. You are asked by your manager to modify the associations of a few file extensions that are associated with Internet Explorer. How can you accomplish this task?

A. In Control Panel, open Default Programs and then click Set Associations. Set the proper file extensions.
B. In Internet Explorer, set extensions on the Extension tab.
C. In Control Panel, open System and then click Set Associations. Set the proper file extensions.
D. In Internet Explorer, set extensions on the Advanced tab.

A

A. In Control Panel, open Default Programs and then click Set Associations. Set the proper file extensions.

  1. A. The Default Programs icon in Control Panel allows you to set file extension associations to the various programs in Windows 10.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. You are the network administrator for a large organization. You are in charge of implementing
    company policies. One company policy states that you have to prevent Internet Explorer from saving any data during a user’s browsing session. How do you accomplish this?

A. Set the Internet Security settings to Disabled.
B. Run the browsers in InPrivate sessions.
C. Disable InPrivate sessions.
D. Private sessions should be enabled.

A

B. Run the browsers in InPrivate sessions.

  1. B. An InPrivate session prevents the browsing history from being recorded and does not allow temporary Internet files to be retained. Cookies, usernames, passwords, and form data will not remain in IE11 and Edge following the closing of the InPrivate session, nor will there be any footprints or data pertaining to the InPrivate browsing session.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. You are the network administrator for a large organization. A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user has the rights to access the internal site due to the fact that all users and computers are part of a domain and the internal website uses Integrated Windows Authentication. How do you make sure that the user is automatically authenticated when they connect?

A. Change the user’s local permissions to Administrator.
B. The Local sites URL should be added to the Local Intranet zone.
C. The Local sites security credentials should be added to the trusted sites zone.
D. The Internet security level should be lowered to lowest.

A

B. The Local sites URL should be added to the Local Intranet zone.

  1. B. Because all users and computers are part of the domain and the internal website uses Integrated Windows Authentication, once you add the URL to the Local Intranet zone properties, Windows Authentication will take over.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. You are the network administrator for your organization. Your organization has deployed Azure RemoteApp collections by configuring a custom template image. This image is going to contain Microsoft Office 365 ProPlus. Your organization needs to guarantee that multiple employees can run Office 365 ProPlus from the image all at the same time. What do you need to include in your configuration file?

A.
B.
C.
D.

A

B.

  1. B. Shared computer activation (SharedComputerLicensing) allows an administrator to set up Office 365 ProPlus on a single computer for multiple users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Your company has decided to start using AppLocker GPOs to control application access. Jeff, Stormwind’s IT Manager, would like to test the AppLocker policy before implementing it. How can Jeff test the AppLocker policy?

A. In the Group Policy Manager, run the Group Policy Results Wizard.
B. In the Group Policy Manager, run the Group Policy Modeling Wizard.
C. In the Group Policy Manager, enforce the new AppLocker policy in Audit-Only mode.
D. In the Group Policy Manager, run the Group Policy Test Wizard.

A

C. In the Group Policy Manager, enforce the new AppLocker policy in Audit-Only mode.

  1. C. Administrators can test AppLocker policies before implementing them by using the audit-only mode.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. You are the administrator of an organization who has decided to use Microsoft Azure Active Directory cloud-based services. You have set up a corporate subscription for Microsoft Office 365. Each employee gets a mailbox stored in Office 365 and also an email for the corporate network. After buying out another company, you need to add a third email address to each user. How can you do this?

A. In Active Directory Sites And Services, edit the email attribute for each employee.
B. In Active Directory Domains And Trusts, edit the email attribute for each employee.
C. Use the Set-Mailbox cmdlet from the Azure Active Directory Module for PowerShell.
D. Use the Set-Mailbox cmdlet from the Active Directory Module for PowerShell.

A

C. Use the Set-Mailbox cmdlet from the Azure Active Directory Module for PowerShell.

  1. C. The Azure Active Directory Module for PowerShell Set-Mailbox cmdlet allows you to manipulate an Office 365 mailbox.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. You are the network administrator for a large organization. You have installed Hyper-V on a server called ServerA, and you have set up four new VM servers. You want to run Power- Shell commands for the VM servers from ServerA. How do you do this?

A. Use the Invoke-Command cmdlet and specify the VMName parameter.
B. Use the WinRM command -PowerShell.
C. Use the PSCommands–enabled command.
D. Just run the PowerShell commands with the -Name parameter.

A

A. Use the Invoke-Command cmdlet and specify the VMName parameter.

  1. A. Administrators can use PowerShell Direct to run PowerShell commands on a VM from the Hyper-V host. To do this, you need to run Invoke-Command and specify which VM you’re connecting to (i.e., the VMName parameter).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. You are the network administrator for a large organization. You have deployed software package to all of the Windows computers in your domain. You want to set up a GPO so that some employees have no access to the application. How do you accomplish this?

A. Set up a restriction server and place all of your restricted employees onto that server.
B. Configure BitLocker.
C. Configure AppLocker.
D. Configure each Windows 10 system to use user policies.

A

C. Configure AppLocker.

  1. C. AppLocker is a feature included with Windows (Windows 7 and higher) that allows administrators to lock out certain applications from running.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. You are the administrator of a large organization. Your company has developed an application for your employees. You need to deploy the internally developed application to all employees while minimizing the costs. What’s the best way to do that?

A. Install the application one system at a time.
B. Enable application sideloading.
C. Purchase System Center and deploy the application.
D. Run the Add-Application PowerShell cmdlet.

A

B. Enable application sideloading.

  1. B. Applications that are developed by a company and are not signed by the Windows Store can be installed by the process of sideloading. Sideloading allows a company to load applications into the Windows Store for deployment throughout the company.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly