Chapter 2- Plan Desktop & Device Deployment Flashcards

1
Q

What is a a Mandatory Profile?

A

A special type of roaming profile and are copied to a network location. They are always Read only, meaning they cannot be altered by the user.
They are commonly used to provide enforced environment settings for users who perform specific tasks and are set when the user signs in to a Windows computer. You can create a Mandatory profile by renaming the NTUSER.DAT file in a roaming profile to NTuser.man

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The USMT is part of which toolkit?

A

The User State Migration Tool is part of the Windows 10 Assessment and Deployment Toolkit ( ADK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which 3 command line tools does the USMT contain?

A

ScanState.exe- Used to scan and copy user profile data to a migration store for the purpose of copying the profile to new computers.

LoadState.exe- Used to locate and copy user profile data from a migration store to new Windows computers.

UsmtUtils.exe- Use this tool to check a migration store for corruption, manage migration stores, and manage encryption during the migration process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What requirements does a Windows 10 machine need to support Hyper -V?

A

Windows 10 Professional or Enterprise, 64 bit edition
a processor that supports Second Level Address Translation (SLAT)
4GB RAM
BIOS or UEFI-level hardware virtual support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which 3 USMT modifiable .xml files are also included?

A

MigApp.xml- This file includes instructions to migrate supplification settings.

MigDocs.xml- This file is used to specify the files and folders that will be migrated by USMT.

MigUser.xml- This file includes instructions to migrate user files based on name extensions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When prepared to perform a migration process with USMT you need to perform which 8 steps?

A
  1. Install the Windows ADK on a technician computer.
  2. Use ScanState.exe to generate Config.xml, if required.
  3. Modify Config.xml, MigApp.xml, MigDocs.xml, MigUser.xml to customize the migration environment, if necessary.
  4. Copy the USMT files to the network share or removable drive.
  5. Create a folder on a network share or removable drive to collect files and settings.
  6. On a sorce computer, run ScanState.exe from the network share or removable drive to collect files and settings.
  7. Install Windows 10 on destination computers that will be part of the migration.
  8. On the destination computers, run LoadState.exe from the network drive or removable drive to apply the files and settings in the migration store.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where can you enable Hyper-V?

A

From Programs in Control Panel and click Turn Windows Features On and Off.
In the windows features dialog box, expand Hyper-V and select all of the check boxes underthe Hyper-V node.
Also from PowerShell with the following cmdlet:
Enable-WindowsOptionalFeature -FeatureName Microsoft-Hyper-V -A11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you create a virtual machine?

A
  1. In Hyper-V, from the action menu, click new and then click Virtual Machine.
  2. Click Next to start.
  3. Specify the name and the location of the new virtual machine.
  4. Choose the generation option that best suit your needs and click next.
    Gen1 supports the same virtual hardware that the previous version of Hyper-V did. It can be used on W7 and Server 2008 among others.
    Gen2 supports Secure Boot, SCSI boot and PXE boot using a standard network adapter. Guest OS’s must run at least Windows Server 2012 or a 64bit version of Windows 8 or later.
  5. Enter the amount of memory required and choose whether to use dynamic memory for the machine, click Next.
  6. On the configure network page click next. You’ll only see options here if you’ve previously created Network Switch Settings.
  7. Verify the VHD option is selected and that the settings are correct, click next.
  8. You can now opt to install an os now or leave it til later.
  9. Click finish but leave Hyper-V manager open.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The first time you enable BitLocker you need to create what?

A

A start up key that is used to encrypt and decrypt the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can the BL startup key be stored?

A

USB drive or TPM chip.
If you opt for the USB drive, you’ll have to insert it everytime you use the computer and you’ll have to enter the key.
If a compatible TPM chip is used the key retrieval is automatic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you do if you lose the BL startup key?

A

Using a 48-digit number that can be stored in numerous ways including on a USB drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 methods for protecting data using BitLocker?

A

TPM+startup PIN+startup key - The most secure but requires 3 authentication tasks. The encryption key is stored on the TPM chip, but an administrator needs to type a PIN and insert the startup key ( available on the USB drive)

TPM+startup key - The encryption key is stored on the TPM chip. In addition the administrator needs to insert a USB flash drive that contains a startup key.

TPM+startup PIN - The encryption key is stored on the TPM chip, and an administrator needs to enter a PIN.

Startup key only - An administrator needs to insert a USB flash drive with a startup key on it. The computer doesn’t need to have a TPM chip. The BIOS needs to support access to the USB flash drive prior to the OS loading.

TPM only - The encryption key is stored on the TPM chip, and no administrator logon is required. TPM requires that the boot environment has not been modified or comprimised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly