Deck 11: Managing Enterprise Clients

Full screen (f)
exit full mode
Question
By installing which server role can Windows Server 2019 be configured as a remote access server?

A) Remote Access
B) Remote Server Administration
C) Remote Assistance
D) Network Policy and Access Services
Use Space or
up arrow
down arrow
to flip the card.
Question
In Remote Desktop Connection, which tab allows you to select the screen resolution and color depth for the remote session?

A) The Local Resources tab
B) The Display tab
C) The General tab
D) The Experience tab
Question
In Remote Desktop Connection, which tab controls which resources in the local computer are available for the session?

A) The Local Resources tab
B) The Display tab
C) The General tab
D) The Experience tab
Question
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow you to connect to an existing session and view what another user is doing?

A) /admin
B) /public
C) /shadow
D) /control
Question
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow someone else to control your session if that person is viewing it with you?

A) /admin
B) /public
C) /shadow
D) /control
Question
Which tab in Remote Desktop Connection allows you to configure server authentication settings and Remote Desktop Gateway (RD Gateway) settings?

A) The Advanced tab
B) The Display tab
C) The General tab
D) The Experience tab
Question
With L2TP, which of the following is not something on which the authentication for IPSec can be based?

A) A pre-shared key
B) Certificates
C) PPTP
D) Kerberos
Question
Which of the following best describes Extensible Authentication Protocol (EAP)?

A) A framework that allows multiple authentication methods to be integrated with the sign-in process
B) One of the easiest protocols to use for a VPN, typically based on a user name and password
C) The Microsoft implementation of the WS-Management protocol for remote management
D) A Windows 10 feature that synchronizes files from a shared folder to a Windows 10 computer
Question
A user working from a different location from yours is experiencing an issue with an application on their system. To diagnose and resolve the issue, you need to be able to see the application while it is in use on the user's system.
Which of the following options should you use to resolve this issue?

A) Remote Desktop
B) Remote Assistance
C) Group Policy
D) Windows PowerShell remoting
Question
You are using Remote Desktop Connection as the RDP client to resolve an issue on a user's system. You want to configure the RD Gateway settings.
Which tab should you use to make the desired change?

A) Advanced
B) Experience
C) Local Resources
D) Display
Question
Maya launches Remote Desktop Connection from a command prompt by running mstsc.exe. She wants to connect to a remote computer to resolve an issue. Based on the issue description that she received in the ticketing tool, she suspects that the computer may be compromised.
Which of the following commands should Maya run in this scenario?

A) /admin
B) /restrictedAdmin
C) /public
D) /noConsentPrompt
Question
An application on Welma's computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer.
Which of the following remote assistance tools are Ezekiel and Welma most likely using?

A) Quick Assist
B) Remote Assistance
C) Remote Desktop
D) MMC Snap-Ins
Question
Jonaed, an IT support specialist, is using Quick Assist to resolve an issue that a user is facing with an application on their Windows 10 computer. Jonaed is trying to resolve the issue from his laptop over the Internet.
Which of the following is true of this scenario?

A) Jonaed will not be able to resolve the issue because Quick Assist does not work over the Internet.
B) Jonaed's laptop and the user's computer will not communicate directly with each other.
C) Jonaed will need to set up a special firewall configuration for Quick Assist to work.
D) Jonaed's laptop will not be able to display the user's screen even if the user allows it.
Question
You are using an MMC snap-in to troubleshoot an issue on a user's computer. The MMC snap-in is using the WinRM service to communicate between the user's computer and your computer.
Which of the following is true of the security used by WinRM if the port used is 5985?

A) WinRM is configured to use secure sockets layer (SSL) to secure communication.
B) WinRM is configured to use transport layer security (TLS) to secure communication.
C) Authentication to WinRM is protected by Kerberos.
D) Data sent over the network using WinRM is encrypted.
Question
Marlon is facing an issue on his Windows 10 laptop while working from home, so he contacts Jerusha from the IT helpdesk to resolve the issue. After evaluating the issue, Jerusha realizes that she needs to use the Registry Editor to edit the registry on Marlon's computer to resolve the issue.
Which of the following is true of the Remote Registry service on Marlon's computer in this scenario?

A) The Remote Registry service is enabled by default whenever Marlon restarts his computer.
B) Jerusha needs to configure the firewall specifically to allow the Remote Registry service to access port 80.
C) Jerusha does not need the Remote Registry service to edit the registry on Marlon's computer using Registry Editor.
D) The Remote Registry service on Marlon's computer is started when Jerusha connects to his computer.
Question
Rizwan enables WP remoting and tries to access a remote computer using it. He begins the session by running the Enter-PSSession -ComputerName RemoteComputer command.
Which of the following additional steps does Rizwan need to perform if the computer is in a workgroup-based network?

A) He should configure TrustedHosts on the client.
B) He should register Windows PowerShell with WinRM.
C) He should restart the WinRM service to force settings to take effect.
D) He should enable the Remote Registry service.
Question
Guocheng, the IT administrator at Curio Technologies, is evaluating alternatives to using roaming profiles in the organization. He considers configuring folder redirection using Group Policy.
Which of the following justifies Guocheng's decision?

A) He wants to use an Azure AD account to synchronize profile settings to multiple computers.
B) He wants user profile settings to be synchronized while the user is signed in rather than at sign-in or sign-out.
C) He wants user certificates issued by the organization to be stored in Active Directory.
D) He wants to store user profile information on a file server so that it is accessible from any computer.
Question
Your organization issues certificates to users for authentication to resources. Because roaming profiles are not implemented, you implement credential roaming to synchronize the certificates to the profile on multiple computers.
In this scenario, where are the user certificates stored?

A) In Group Policy
B) In Active Directory
C) On a file server
D) In the user profile
Question
Umama wants to enable User Experience Virtualization (UE-V) by configuring Group Policy settings. Two important settings that she needs to configure are the setting storage location and settings template catalog location.
Which of the following is true of this scenario?

A) Umama needs to create settings location templates for all apps for which she wants to synchronize settings.
B) Umama will not be able to synchronize settings for Microsoft Office and Windows.
C) Umama needs to configure Azure AD account to synchronize profile settings to multiple computers.
D) Umama needs to create settings location templates for custom apps and non-Microsoft apps.
Question
Odilon, an IT administrator, configures all computers with a VPN client to allow access to the remote access server while working from home. The VPN clients are configured to use the L2TP protocol with IPSec for authentication and data encryption. The authentication is based on the use of a pre-shared key.
Which of the following is true of this scenario?

A) This authentication method is more secure than using certificates or Kerberos.
B) All clients have the same password to access the remote access server.
C) The pre-shared key does not need to be configured on the remote access server.
D) The pre-shared key is more complicated to implement than certificates or Kerberos.
Question
Jared is configuring a VPN connection on his Windows 10 laptop. He opens the Settings window to configure the connection.
What information should Jared include under the label VPN provider?

A) The FQDN or IP address of the remote access server
B) The software that creates and controls the VPN connection
C) The name of the VPN connection
D) The type of VPN such as PPTP or SSTP
Question
You decide to automate VPN deployment in your organization. You want to create an executable file that users can click on whenever they want to create a VPN connection.
Which of the following deployment methods should you use?

A) Windows Configuration Designer
B) Windows PowerShell
C) Group Policy Preferences
D) Connection Manager Administration Kit
Question
Ming is automating VPN deployment in her organization. She decides to use Windows Configuration Designer to enable the VPN deployment. She deploys the VPN connectivity profiles to the client computers as provisioning packages.
Which of the following is true of this scenario?

A) The provisioning packages need to be deployed via Microsoft Intune.
B) Users need to know Windows PowerShell scripting to install the provisioning packages.
C) This method cannot be used for computers that are not domain joined.
D) Users can click on the provisioning package to run it as an executable file.
Question
Yunha and Zachariah are discussing the authentication protocol that they should be using in their VPN settings. Yunha says that they should be using CHAP, but Zachariah disagrees.
Which of the following is a possible reason for Zachariah's disagreement?

A) CHAP transmits unencrypted credentials during authentication.
B) CHAP has serious security flaws that make it easy to obtain the credentials.
C) CHAP can only be used with IKEv2.
D) CHAP allows multiple authentication methods to be integrated with the sign-in process.
Question
Chao is using a VPN client to access work files via a remote access server. However, her VPN connection to access work files has also made Internet access slow.
Which of the following is the best solution to optimizing the Internet connection?

A) Disable the VPN connection.
B) Change the VPN protocol from PEAP-MS-CHAP v2 to PAP.
C) Disable VPN from being used as a default gateway.
D) Use IPv4 instead of IPv6.
Question
Ruzwana configures Always On VPN for the Windows 10 client computers in her organization. The client computers have a mix of Windows 10 Enterprise and Windows 10 Pro licenses.
Which of the following is true of this scenario?

A) User authentication is through using cached credentials on Windows 10 Enterprise computers.
B) Group Policy Objects cannot be employed on Windows 10 Enterprise computers.
C) Windows 10 Pro computers must be domain joined to implement device tunnel.
D) Only user tunnel is available for Windows 10 Pro computers.
Question
Chieh wants to implement DirectAccess to allow clients to automatically connect to VPN. An alternative option is Always On VPN, but she decides against using it.
Which of the following justifies Chieh's decision?

A) The clients have Windows 8.1 installed.
B) DirectAccess uses a device tunnel.
C) The client connectivity for DirectAccess is based on IPv6.
D) Chieh does not want to use GPOs.
Question
Nicole, a digital marketer, uses her Windows 10 laptop to create content. She often travels and works remotely, so all of her work files are synced to a shared folder on a file server using offline files. Offline files is enabled on her laptop as well on the file server. Nicole creates a new file at work and edits it.
What action does Nicole need to take to ensure that the same file is available to her when she reaches home?

A) No action is required because the file will be made offline automatically.
B) Nicole should manually select the file and make it available offline.
C) Nicole should copy the file to her laptop.
D) Nicole should disable offline files on her laptop.
Question
Iba uses the offline files feature for two users, Abed and Jessica, working on the same project to enable the sharing of data when they go offline. Abed makes changes on a synchronized file at home. Meanwhile, Jessica makes changes to the original file in the shared folder.
What will happen when Abed returns to the office and tries to sync the file that he edited?

A) Abed's changes will overwrite the changes made by Jessica.
B) Jessica's changes will overwrite the changes made by Abed.
C) Abed or Jessica will have to manually resolve the sync conflict.
D) Abed's version will be saved as a new file in the shared folder.
Question
Trisha, an IT admin, implements Work Folders to enable data synchronization for users in the sales team in her organization.
Which of the following is true of this scenario?

A) The Work Folders client is not available for Windows 7 devices.
B) The Work Folders client cannot be run on an iOS or Android phone.
C) The folder for each user is stored on their individual computers.
D) The users are given unique folders for file storage.
Question
Nanxi wants to switch from using roaming profiles in the organization. After evaluating various alternatives, she decides to proceed with UE-V because it offers several advanced functionalities that are not offered by roaming profiles.
Which of the following is an example of such functionality?

A) Certificates can be synchronized to user profiles by storing them in Active Directory.
B) Settings are synchronized at sign-in or sign-out rather than while the user is signed in.
C) Synchronization is based on templates for fine-grained control of specific application settings.
D) Synchronization can be performed across multiple operating devices using the same operating system.
Question
Jin, a system administrator, implements Work Folders at his organization, Nelconnect. He decides to enable automatic discovery of the Work Folders URL to support devices that are not domain joined. Darwish is working from home and opens the Work Folders client to access his work files.
If Darwish's email is darwish@nelconnect.com, what address will the Work Folders client attempt to connect to?

A) https://workfolders.nelconnect.com
B) https://www.workfolders.com
C) https://darwish.nelconnect.com
D) https://darwish.workfolders.nelconnect.com
Question
Frida opens the Work Folders client on her personal laptop to access her work files. Her laptop is not domain joined. The administrator has not enabled automatic discovery.
What should Frida do in this scenario?

A) She should enter her email address.
B) She should manually enter the Work Folders URL.
C) She should enter the address of her company's website.
D) She should use Group Policy to configure the Work Folders URL.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/33
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Managing Enterprise Clients
1
By installing which server role can Windows Server 2019 be configured as a remote access server?

A) Remote Access
B) Remote Server Administration
C) Remote Assistance
D) Network Policy and Access Services
Remote Access
2
In Remote Desktop Connection, which tab allows you to select the screen resolution and color depth for the remote session?

A) The Local Resources tab
B) The Display tab
C) The General tab
D) The Experience tab
The Display tab
3
In Remote Desktop Connection, which tab controls which resources in the local computer are available for the session?

A) The Local Resources tab
B) The Display tab
C) The General tab
D) The Experience tab
The Local Resources tab
4
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow you to connect to an existing session and view what another user is doing?

A) /admin
B) /public
C) /shadow
D) /control
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
5
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to allow someone else to control your session if that person is viewing it with you?

A) /admin
B) /public
C) /shadow
D) /control
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
6
Which tab in Remote Desktop Connection allows you to configure server authentication settings and Remote Desktop Gateway (RD Gateway) settings?

A) The Advanced tab
B) The Display tab
C) The General tab
D) The Experience tab
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
7
With L2TP, which of the following is not something on which the authentication for IPSec can be based?

A) A pre-shared key
B) Certificates
C) PPTP
D) Kerberos
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following best describes Extensible Authentication Protocol (EAP)?

A) A framework that allows multiple authentication methods to be integrated with the sign-in process
B) One of the easiest protocols to use for a VPN, typically based on a user name and password
C) The Microsoft implementation of the WS-Management protocol for remote management
D) A Windows 10 feature that synchronizes files from a shared folder to a Windows 10 computer
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
9
A user working from a different location from yours is experiencing an issue with an application on their system. To diagnose and resolve the issue, you need to be able to see the application while it is in use on the user's system.
Which of the following options should you use to resolve this issue?

A) Remote Desktop
B) Remote Assistance
C) Group Policy
D) Windows PowerShell remoting
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
10
You are using Remote Desktop Connection as the RDP client to resolve an issue on a user's system. You want to configure the RD Gateway settings.
Which tab should you use to make the desired change?

A) Advanced
B) Experience
C) Local Resources
D) Display
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
11
Maya launches Remote Desktop Connection from a command prompt by running mstsc.exe. She wants to connect to a remote computer to resolve an issue. Based on the issue description that she received in the ticketing tool, she suspects that the computer may be compromised.
Which of the following commands should Maya run in this scenario?

A) /admin
B) /restrictedAdmin
C) /public
D) /noConsentPrompt
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
12
An application on Welma's computer crashes whenever she tries to save a file that she is working on. To help resolve the issue over the Internet, she contacts Ezekiel from the tech support team. After signing in using his Microsoft Azure AD account, he receives a security code that he sends across to Welma. Welma uses this code to grant Ezekiel access to her computer.
Which of the following remote assistance tools are Ezekiel and Welma most likely using?

A) Quick Assist
B) Remote Assistance
C) Remote Desktop
D) MMC Snap-Ins
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
13
Jonaed, an IT support specialist, is using Quick Assist to resolve an issue that a user is facing with an application on their Windows 10 computer. Jonaed is trying to resolve the issue from his laptop over the Internet.
Which of the following is true of this scenario?

A) Jonaed will not be able to resolve the issue because Quick Assist does not work over the Internet.
B) Jonaed's laptop and the user's computer will not communicate directly with each other.
C) Jonaed will need to set up a special firewall configuration for Quick Assist to work.
D) Jonaed's laptop will not be able to display the user's screen even if the user allows it.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
14
You are using an MMC snap-in to troubleshoot an issue on a user's computer. The MMC snap-in is using the WinRM service to communicate between the user's computer and your computer.
Which of the following is true of the security used by WinRM if the port used is 5985?

A) WinRM is configured to use secure sockets layer (SSL) to secure communication.
B) WinRM is configured to use transport layer security (TLS) to secure communication.
C) Authentication to WinRM is protected by Kerberos.
D) Data sent over the network using WinRM is encrypted.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
15
Marlon is facing an issue on his Windows 10 laptop while working from home, so he contacts Jerusha from the IT helpdesk to resolve the issue. After evaluating the issue, Jerusha realizes that she needs to use the Registry Editor to edit the registry on Marlon's computer to resolve the issue.
Which of the following is true of the Remote Registry service on Marlon's computer in this scenario?

A) The Remote Registry service is enabled by default whenever Marlon restarts his computer.
B) Jerusha needs to configure the firewall specifically to allow the Remote Registry service to access port 80.
C) Jerusha does not need the Remote Registry service to edit the registry on Marlon's computer using Registry Editor.
D) The Remote Registry service on Marlon's computer is started when Jerusha connects to his computer.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
16
Rizwan enables WP remoting and tries to access a remote computer using it. He begins the session by running the Enter-PSSession -ComputerName RemoteComputer command.
Which of the following additional steps does Rizwan need to perform if the computer is in a workgroup-based network?

A) He should configure TrustedHosts on the client.
B) He should register Windows PowerShell with WinRM.
C) He should restart the WinRM service to force settings to take effect.
D) He should enable the Remote Registry service.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
17
Guocheng, the IT administrator at Curio Technologies, is evaluating alternatives to using roaming profiles in the organization. He considers configuring folder redirection using Group Policy.
Which of the following justifies Guocheng's decision?

A) He wants to use an Azure AD account to synchronize profile settings to multiple computers.
B) He wants user profile settings to be synchronized while the user is signed in rather than at sign-in or sign-out.
C) He wants user certificates issued by the organization to be stored in Active Directory.
D) He wants to store user profile information on a file server so that it is accessible from any computer.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
18
Your organization issues certificates to users for authentication to resources. Because roaming profiles are not implemented, you implement credential roaming to synchronize the certificates to the profile on multiple computers.
In this scenario, where are the user certificates stored?

A) In Group Policy
B) In Active Directory
C) On a file server
D) In the user profile
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
19
Umama wants to enable User Experience Virtualization (UE-V) by configuring Group Policy settings. Two important settings that she needs to configure are the setting storage location and settings template catalog location.
Which of the following is true of this scenario?

A) Umama needs to create settings location templates for all apps for which she wants to synchronize settings.
B) Umama will not be able to synchronize settings for Microsoft Office and Windows.
C) Umama needs to configure Azure AD account to synchronize profile settings to multiple computers.
D) Umama needs to create settings location templates for custom apps and non-Microsoft apps.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
20
Odilon, an IT administrator, configures all computers with a VPN client to allow access to the remote access server while working from home. The VPN clients are configured to use the L2TP protocol with IPSec for authentication and data encryption. The authentication is based on the use of a pre-shared key.
Which of the following is true of this scenario?

A) This authentication method is more secure than using certificates or Kerberos.
B) All clients have the same password to access the remote access server.
C) The pre-shared key does not need to be configured on the remote access server.
D) The pre-shared key is more complicated to implement than certificates or Kerberos.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
21
Jared is configuring a VPN connection on his Windows 10 laptop. He opens the Settings window to configure the connection.
What information should Jared include under the label VPN provider?

A) The FQDN or IP address of the remote access server
B) The software that creates and controls the VPN connection
C) The name of the VPN connection
D) The type of VPN such as PPTP or SSTP
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
22
You decide to automate VPN deployment in your organization. You want to create an executable file that users can click on whenever they want to create a VPN connection.
Which of the following deployment methods should you use?

A) Windows Configuration Designer
B) Windows PowerShell
C) Group Policy Preferences
D) Connection Manager Administration Kit
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
23
Ming is automating VPN deployment in her organization. She decides to use Windows Configuration Designer to enable the VPN deployment. She deploys the VPN connectivity profiles to the client computers as provisioning packages.
Which of the following is true of this scenario?

A) The provisioning packages need to be deployed via Microsoft Intune.
B) Users need to know Windows PowerShell scripting to install the provisioning packages.
C) This method cannot be used for computers that are not domain joined.
D) Users can click on the provisioning package to run it as an executable file.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
24
Yunha and Zachariah are discussing the authentication protocol that they should be using in their VPN settings. Yunha says that they should be using CHAP, but Zachariah disagrees.
Which of the following is a possible reason for Zachariah's disagreement?

A) CHAP transmits unencrypted credentials during authentication.
B) CHAP has serious security flaws that make it easy to obtain the credentials.
C) CHAP can only be used with IKEv2.
D) CHAP allows multiple authentication methods to be integrated with the sign-in process.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
25
Chao is using a VPN client to access work files via a remote access server. However, her VPN connection to access work files has also made Internet access slow.
Which of the following is the best solution to optimizing the Internet connection?

A) Disable the VPN connection.
B) Change the VPN protocol from PEAP-MS-CHAP v2 to PAP.
C) Disable VPN from being used as a default gateway.
D) Use IPv4 instead of IPv6.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
26
Ruzwana configures Always On VPN for the Windows 10 client computers in her organization. The client computers have a mix of Windows 10 Enterprise and Windows 10 Pro licenses.
Which of the following is true of this scenario?

A) User authentication is through using cached credentials on Windows 10 Enterprise computers.
B) Group Policy Objects cannot be employed on Windows 10 Enterprise computers.
C) Windows 10 Pro computers must be domain joined to implement device tunnel.
D) Only user tunnel is available for Windows 10 Pro computers.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
27
Chieh wants to implement DirectAccess to allow clients to automatically connect to VPN. An alternative option is Always On VPN, but she decides against using it.
Which of the following justifies Chieh's decision?

A) The clients have Windows 8.1 installed.
B) DirectAccess uses a device tunnel.
C) The client connectivity for DirectAccess is based on IPv6.
D) Chieh does not want to use GPOs.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
28
Nicole, a digital marketer, uses her Windows 10 laptop to create content. She often travels and works remotely, so all of her work files are synced to a shared folder on a file server using offline files. Offline files is enabled on her laptop as well on the file server. Nicole creates a new file at work and edits it.
What action does Nicole need to take to ensure that the same file is available to her when she reaches home?

A) No action is required because the file will be made offline automatically.
B) Nicole should manually select the file and make it available offline.
C) Nicole should copy the file to her laptop.
D) Nicole should disable offline files on her laptop.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
29
Iba uses the offline files feature for two users, Abed and Jessica, working on the same project to enable the sharing of data when they go offline. Abed makes changes on a synchronized file at home. Meanwhile, Jessica makes changes to the original file in the shared folder.
What will happen when Abed returns to the office and tries to sync the file that he edited?

A) Abed's changes will overwrite the changes made by Jessica.
B) Jessica's changes will overwrite the changes made by Abed.
C) Abed or Jessica will have to manually resolve the sync conflict.
D) Abed's version will be saved as a new file in the shared folder.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
30
Trisha, an IT admin, implements Work Folders to enable data synchronization for users in the sales team in her organization.
Which of the following is true of this scenario?

A) The Work Folders client is not available for Windows 7 devices.
B) The Work Folders client cannot be run on an iOS or Android phone.
C) The folder for each user is stored on their individual computers.
D) The users are given unique folders for file storage.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
31
Nanxi wants to switch from using roaming profiles in the organization. After evaluating various alternatives, she decides to proceed with UE-V because it offers several advanced functionalities that are not offered by roaming profiles.
Which of the following is an example of such functionality?

A) Certificates can be synchronized to user profiles by storing them in Active Directory.
B) Settings are synchronized at sign-in or sign-out rather than while the user is signed in.
C) Synchronization is based on templates for fine-grained control of specific application settings.
D) Synchronization can be performed across multiple operating devices using the same operating system.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
32
Jin, a system administrator, implements Work Folders at his organization, Nelconnect. He decides to enable automatic discovery of the Work Folders URL to support devices that are not domain joined. Darwish is working from home and opens the Work Folders client to access his work files.
If Darwish's email is darwish@nelconnect.com, what address will the Work Folders client attempt to connect to?

A) https://workfolders.nelconnect.com
B) https://www.workfolders.com
C) https://darwish.nelconnect.com
D) https://darwish.workfolders.nelconnect.com
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
33
Frida opens the Work Folders client on her personal laptop to access her work files. Her laptop is not domain joined. The administrator has not enabled automatic discovery.
What should Frida do in this scenario?

A) She should enter her email address.
B) She should manually enter the Work Folders URL.
C) She should enter the address of her company's website.
D) She should use Group Policy to configure the Work Folders URL.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 33 flashcards in this deck.