Section 6 - Computer Management Flashcards

• Perform simple and advanced computer inventory searches. • Create static and smart computers groups. • Configure and deploy configuration profiles to computers. • Make apps available to users by installing them automatically or through Self Service. • Deploy policies automatically or through Self Service.

1
Q

Which attributes can be used to search for a computer in Jamf Pro inventory?

A

Many attributes including:

  • Computer Name
  • Site
  • Last Inventory Update
  • Last Check-in
  • IP Address
  • Jamf binary version
  • Supervised
  • MDM Capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can the presentation of search results be customized?

A

Navigate to Settings > Computer Management - Management Framework > Inventory Display and select the items you wish to display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inventory search results can be exported into which three file formats?

A
  • .CSV
  • .TXT
  • .XML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which formats can advanced searches be exported to?

A

CSV, TXT, XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can a computer belong to more than one building at a time?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Browse button do?

A

Provides a list of acceptable values on which to search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is collecting computer inventory information beneficial?

A
  • Asset management and tracking.
  • Current state of a computer and it’s software.
  • Inventory information can be used to create groups.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where can Processor Speed be located in an inventory record?

A

Inventory > General > Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can a Jamf Pro user update a computer’s asset tag in the inventory?

A

Inventory > General, then click the Edit button to add the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Besides Jamf Pro, which service is required to issue remote commands?

A

Apple Push Notification service (APNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens when a “Lock Computer” command is issued?

A

Logs the user out, forces a restart and requires a passcode be entered to log into the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which remote command can be issued to update macOS?

A

Download and Install Updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are two differences between computer searches and computer groups?

A
  • Groups can only contain Managed computers

- Groups can be dynamic and keep themselves up to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are computers assigned to static groups?

A

Manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can members of smart computer groups be monitored from the Jamf Pro Dashboard?

A

By enabling the option to Show in Jamf Pro Dashboard in the computer group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of Scope?

A

To control which computers receive management tasks.

17
Q

What is a Target?

A

The initial pool of computers to receive a management task.

18
Q

What is an Exclusion?

A

A pool of computers that should NOT receive the management task.

19
Q

If a configuration profile is scoped to all computers excluding the Germany building, which computers will receive the profile?

A

All computers except computers assigned to the Germany building.

20
Q

What happens if an exclusion is added to the scope of a configuration profile without a target?

A

Nothing. If there is no target, then nothing should get deployed.

21
Q

What do configuration profiles allow IT administrators to accomplish?

A

Allow definition or restriction of various settings.

22
Q

How are configuration profiles deployed?

A

In conjunction with Apple Push Notifications.

23
Q

Why should configuration profiles be separated based on functionality?

A

To create logical organization and help with troubleshooting. It also makes management and modification of profiles easier.

24
Q

What is the difference between “Make Available in Self Service” and “Install Automatically/Prompt Users to Install” when deploying Mac App Store apps?

A

User interaction is required in Make Available but may not be required with the second option (unless Prompt Users to Install is chosen).

25
Q

What must be configured to deploy apps using “Install Automatically/Prompt Users to install”?

A

Enabling certificate-based authentication and Enable push notifications.

26
Q

Which option allows apps to be featured on the front page of Self Service?

A

The checkbox to Include the app in the Featured category.

27
Q

Which triggers are available for policy deployment?

A
  • Startup
  • Login
  • Logout
  • Network State Change
  • Enrollment Complete
  • Recurring Check-in
  • Custom
28
Q

How can policies be prevented from running?

A

By unchecking the Enable checkbox or removing all targets from the Scope.

29
Q

Are policies limited to one payload each?

A

No.

30
Q

Do policies require a configured payload besides General to deploy?

A

No.

31
Q

Which payload is used to deploy local user accounts?

A

Local Accounts

32
Q

How can a policy be rerun on a computer if it fails to deploy?

A

Flushing the policy log for the targeted computer.

33
Q

Which Execution Frequency allows users to run Self Service policies multiple times?

A

Ongoing.

34
Q

How does performing an Authenticated Restart affect the user experience when the Restart Options payload is configured?

A

They won’t have to provide credentials for FileVault after the restart.

35
Q

Is a Trigger required when configuring a Self Service policy?

A

Nope.