Explore the Enterprise Desktop Flashcards

1
Q

What is modern endpoint management?

A

A new approach to managing Windows devices, similar to managing mobile devices, that simplifies deployment, improves security, and enhances user experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key benefits of modern endpoint management?

A

Simplified deployment and management, improved security, better user experience, lower costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of devices can be managed with a modern endpoint management platform?

A

Desktop PCs, HoloLens, Surface Hubs, company-owned devices, employee-owned devices, and mobile devices (iOS and Android).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Windows Autopilot simplify device provisioning?

A

It automates device setup, joining devices to Azure AD and enrolling them in Intune, and applying user and organizational settings without custom OS images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the benefit of using a modern endpoint management approach for updates?

A

It simplifies keeping Windows and Microsoft 365 apps up-to-date without the need for complex on-premises infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name three built-in security features of Microsoft 365 that contribute to intelligent security.

A

(Any three of these) Windows Hello, Windows Defender ATP, Windows Information Protection, Microsoft Entra Identity Protection, Conditional Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Microsoft Intelligent Security Graph?

A

A system that uses billions of signals and machine learning to provide security insights and help protect company data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do proactive insights improve device management?

A

They allow IT to discover and address device and app issues before they impact end users, increasing confidence in updates and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of an established device life cycle in an organization?

A

To ensure users have the right technologies to be productive, manage resources effectively, and prevent end-of-life devices from becoming a liability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the six phases of the enterprise desktop life cycle?

A

Planning, 2. Purchasing, 3. Deployment, 4. Operations, 5. Support, 6. Upgrade and Retire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What activities are typically included in the “Planning” phase of the device life cycle?

A

Defining a strategy for system management, including hardware and software standards, security policies, and deployment methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What key tasks are performed during the “Deployment” phase?

A

Installing the operating system, enrolling devices in management systems (e.g., Intune), and deploying applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary goal of the “Operations” phase?

A

Ensuring systems are functioning correctly, are secure, and meet performance and availability requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of activities are included in the “Support” phase?

A

Providing end-user training, troubleshooting issues, and offering assistance with using systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens during the “Upgrade and Retire” phase?

A

Replacing old devices, retiring obsolete hardware, and unenrolling devices from the organization’s management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What factors should organizations consider when planning for new systems?

A

Existing device inventory, upgrade feasibility, operating system misconfigurations, and future needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the key elements of the “Computer strategy” stage in the planning phase?

A

Image and hardware standardization, environment design, replacement frequency, mobile device vs. desktop usage, and BYOD policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is involved in the “Computer selection” stage?

A

Choosing hardware, software, and peripherals, and conducting design configuration and application compatibility testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What should be considered when evaluating “Deployment methods” during planning?

A

The costs associated with each method, the suitability for different scenarios, and whether a cloud-based or on-premises solution is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is “Demand forecasting” in the context of IT planning?

A

Predicting future computing resource requirements to determine purchasing needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of “Design configuration”?

A

Determining how to utilize new features and incorporate them into the overall plan, including new tools, resources, and settings.

22
Q

What activities are included in the “Purchasing” stage?

A

Negotiation, contracts, vendor management, shipping, and disposal of packaging materials.

23
Q

What are the major cost factors to consider during the purchasing phase?

A

Hardware, software, accessories, deployment process, and hardware staging.

24
Q

What is involved in “Hardware staging”?

A

Securely storing, unpacking, inspecting, and inventorying new systems before deployment.

25
Q

What are the key steps in the “Building” phase of desktop deployment?

A

Streamlining the process, developing the process, testing, configuration, and managing logistics.

26
Q

What is the purpose of the “Testing” step in the building phase?

A

To identify and correct errors in the OS configuration or deployment process before rollout.

27
Q

What does the “Configuration” step involve?

A

Developing automation solutions, configuring standardized images or device configurations, and planning for network access.

28
Q

What is included in “Managing the logistics” during the building phase?

A

Storing computers, deploying hardware, communicating with end users, and potentially coordinating with hardware vendors for pre-shipment configuration.

29
Q

How does the deployment team typically approach the deployment phase?

A

They deploy in phases, stabilizing each phase before moving on, and use early phases to validate configurations and user experience.

30
Q

What is “Enrollment” in the context of modern device management?

A

Configuring an existing device to meet organizational requirements and granting it access to resources without redeploying the OS.

31
Q

What are the benefits of using enrollment for mobile devices and BYOD scenarios?

A

It allows organizations to manage a range of devices and scenarios, from basic email access to full device management, while accommodating different requirements for various user groups.

32
Q

What are some best practices for managing data during deployment?

A

Migrating essential data to the cloud or network shares before deployment, using in-place upgrades whenever possible, and leveraging tools like USMT for local data and settings migration.

33
Q

What is the purpose of the User State Migration Tool (USMT)?

A

To capture and migrate user accounts, files, OS settings, and application settings to a new Windows installation.

34
Q

What are the three phases of application deployment planning?

A

Managing application inventory and compatibility, 2. Packaging applications, 3. Providing life-cycle support.

35
Q

What is the first step in understanding the impact of application compatibility changes?

A

Gathering an application inventory.

36
Q

What is an effective way to reduce the number of applications in an environment and associated costs?

A

Standardizing application versions across the organization.

37
Q

What are some methods for obtaining silent installation commands for applications?

A

Checking installation guides, searching internet forums, or using command-line options like /help or /? with the setup application.

38
Q

What is Microsoft Application Virtualization (App-V)?

A

A technology that provides application packaging and sequencing to create virtual applications. (Note: App-V will be end-of-life in April 2026.)

39
Q

What are the main aspects of application life-cycle support?

A

Deploying new applications, installing new versions of existing applications, and updating applications.

40
Q

What are the common options for application delivery in an organization?

A

Automatic installation (e.g., during deployment), on-demand installation through a portal, and access to applications on personal devices.

41
Q

What are the key features of Microsoft Intune for application management?

A

Supports various application installation types (Office, app packages, LOB apps), application policies for data protection, and compliance-based access control.

42
Q

When is virtual application delivery beneficial?

A

When the client device cannot run the application locally. Applications are installed on a server or Cloud PC and accessed remotely.

43
Q

What are some examples of virtual application delivery solutions?

A

Azure Virtual Desktop and Windows 365.

44
Q

What factors should be considered when deciding whether to upgrade or retire existing computer hardware?

A

Age of the computers, performance, cost of upgrading compared to replacement, and the availability of facilities for refurbishment and storage.

45
Q

What are some key considerations for upgrading software on user workstations?

A

Upgrading applications to new versions requires more planning and testing than applying simple updates.

46
Q

What is the focus of the “Retirement” phase in the device lifecycle?

A

Safely and efficiently removing a system from production when it is no longer useful.

47
Q

What logistical factors should be considered during the retirement phase?

A

Minimizing user disruption during computer pickup, preparing computers for resale (including data wiping), managing inventory and paperwork, and handling packing and shipping.

48
Q

What should be done with sensitive information on hard drives of retired computers?

A

Ensure that sensitive data is securely removed before the device leaves the organization, using appropriate software tools or hardware solutions.

49
Q

What factors should be considered regarding the value of retired equipment?

A

Residual or resale value for accounting purposes, potential for charitable donations, and tax implications.

50
Q

What challenges and considerations are associated with BYOD device retirement or unenrollment?

A

Balancing the need to remove organizational data with protecting the user’s personal information. Selective wiping of applications and data may be necessary.

51
Q

What is a crucial step before allowing BYOD devices to access organizational resources?

A

Informing users about the organization’s policies regarding data removal and device wiping upon retirement or unenrollment.

52
Q
A