Recertification for MCSE: Desktop Infrastructure v5.0 (70-982)

Page:    1 / 12   
Total 180 questions

Your network contains an Active Directory domain named contoso.com. You plan to deploy personal virtual desktops.
You create a standard desktop that contains multiple desktop shortcuts to line-of-business applications. Administrators frequently update the desktop shortcuts.
You need to recommend a solution to prevent users from modifying the desktop shortcuts and from adding additional files to the desktop.
What should you include in the recommendation?
More than one answer choice may achieve the goal. Select the BEST answer.

  • A. Roaming profiles and NTFS permissions
  • B. Mandatory profiles
  • C. User profile disks
  • D. Folder Redirection and NTFS permissions


Answer : D

Your network contains a Virtual Desktop Infrastructure (VDI). The VDI contains five Hyper-
V hosts. The Hyper-V hosts are in a failover cluster.
You need to recommend a solution to distribute automatically the virtual desktops based on the current resource usage of the Hyper-V hosts.
What should you include in the recommendation?

  • A. Microsoft System Center 2012 virtual Machine Manager (VMM)
  • B. Hyper-V Replica Broker
  • C. Windows System Resource Manager (WSRM)
  • D. Microsoft System Center 2012 Configuration Manager


Answer : A

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that have Microsoft Deployment Toolkit
(MDT) 2012 installed. Server1 is used for testing and Server2 is used to deploy images to production computers.
On Server1, you have several deployments of Windows 7 and Windows 8.
You need to replicate only the content related to the Windows 8 deployments from Server1 to Server2.
What three actions should you perform from the Deployment Workbench?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.




Answer :

Explanation:
Box 1: On Server2, create a selection profile.
Box 2: On Server1, create a linked deployment share.
Box 3: On Server1, run Replicate content.
Note:
* When you replicate a deployment share, you can replicate everything or you can choose which folders in the deployment share to replicate. You choose folders to replicate by creating selection profiles. A selection profile simply selects folders across applications, operating systems, out-of-box drivers, packages, and task sequences. You create a selection profile in advance, and then you choose that selection profile when you set up replication.

Your network contains two Remote Desktop Services (RDS) session collections named
Collection 1 and Collection2.
Each user has a laptop computer that runs Windows 8.
The users frequently log on to sessions in Collection1 and Collection2.
You need to recommend a user state virtualization solution to meet the following requirements:
-> Ensure that the user profiles remain the same when the users log on to their laptop computer and virtual desktop.
-> Minimize the time required to log on.
What should you implement?

  • A. Folder Redirection and user profile disks
  • B. User profiles for Remote Desktop Services (RDS) and roaming profiles
  • C. User profiles for Remote Desktop Services (RDS) and Folder Redirection
  • D. Roaming profiles and Folder Redirection


Answer : D

Explanation:
Roaming User Profiles redirects user profiles to a file share so that users receive the same operating system and application settings on multiple computers. When a user signs in to a computer by using an account that is set up with a file share as the profile path, the users profile is downloaded to the local computer and merged with the local profile (if present).
When the user signs out of the computer, the local copy of their profile, including any changes, is merged with the server copy of the profile. Roaming User Profiles is typically enabled on domain accounts by a network administrator.
Folder Redirection enables users and administrators to redirect the path of a known folder to a new location, manually or by using Group Policy. The new location can be a folder on the local computer or a directory on a file share. Users interact with files in the redirected folder as if it still existed on the local drive. For example, you can redirect the Documents folder, which is usually stored on a local drive, to a network location. The files in the folder are then available to the user from any computer on the network.


C:\Documents and Settings\usernwz1\Desktop\1.PNG

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has Microsoft
System Center 2012 Configuration Manager installed. All client computers run Windows 8 and support Wake on LAN.
You plan to implement a software updates infrastructure to support updating the Windows
8 client computers.
You need to meet the following requirements:
-> Ensure that the updates are not applied during business hours.
-> Ensure that the updates are installed at 03:00 each day, even if the client computers are turned off.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

  • A. Add the Out of band service point Configuration Manager system role to Server1.
  • B. Create and link a Group Policy object (GPO) to the domain and configure the Automatic Updates settings in the GPO.
  • C. Install and configure Windows Server Update Services (WSUS) on Server1.
  • D. Add the Software update point Configuration Manager system role to Server1.
  • E. Install and configure System Center Updates Publisher 2011 on Server1.


Answer : C,D

Explanation:
CD: The software update point in Microsoft System Center Configuration Manager 2007 is a required component of software updates and is installed as a site system role in the
Configuration Manager console. The software update point site system role must be created on a site system server that has Microsoft Windows Server Update Services
(WSUS) 3.0 installed.

Your network contains an Active Directory domain named contoso.com. The domain contains a Virtual Desktop Infrastructure (VDI).
You plan to create a pooled virtual desktop collection.
You need to ensure that users of the pooled virtual desktop collection store their data on a separate VHD.
What should you do before you create the virtual desktop collection?

  • A. Create a shared folder and assign the users permission to the shared folder.
  • B. Create a fixed-size VHD and assign the users permission to the VHD.
  • C. Create a shared folder and assign the virtualization hosts permission to the shared folder.
  • D. Create a fixed-size VHD and assign the virtualization hosts permission to the VHD.


Answer : C

You are planning the virtual desktop migration of the desktop computers for the sales department.
You need to recommend a solution that preserves the data stored on the sales users desktop computers during the migration to Windows 8. The solution must meet the sales department requirements and the technical requirements.
What should you recommend?

  • A. On the client computers that run Windows XP, run usmtutils.exe.
  • B. From Configuration Manager, configure the User and Device Affinity.
  • C. On the client computers that run Windows XP, run scanstate.exe.
  • D. From Configuration Manager, create computer associations.


Answer : D

Explanation:
The desktop computers of the sales users must be replaced by virtual desktops that run
Windows 8:
A computer association creates a relationship between a source and destination computer for the side-by-side migration of user state data.
The source computer is an existing computer that is managed by Configuration Manager, and contains the user state data and settings that will be migrated to a specified destination computer. You can also create a computer association when importing new computers into the
Configuration Manager database by using the Import Computer Information Wizard.
User device affinity in Microsoft System Center 2012 Configuration Manager is a method of associating a user with one or more specified devices.
User device affinity can eliminate the need to know the names of a users devices in order to deploy an application to that user.
Instead of deploying the application to all of the users devices, you deploy the application to the user.
Then, user device affinity automatically ensures that the application install on all devices that are associated with that user.
You can define primary devices. These are typically the devices that users use on a daily basis to perform their work.
When you create an affinity between a user and a device, you gain more software deployment options. For example, if a user requires Microsoft Office Visio, you can install it on the users primary device by using a Windows Installer deployment.
However, on a device that is not a primary device, you might deploy Microsoft Office Visio as a virtual application.
You can also use user device affinity to predeploy software on a users device when the user is not logged in.
Then, when the user logs on, the application is already installed and ready to run.

Your company has a main office and multiple branch offices.
The network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2008 R2. All client computers run Windows 7.
All users are configured to use roaming profiles and Folder Redirection. Each user has a personal laptop computer and a personal desktop computer, Users occasionally log on to other computers.
The company introduces a new security policy, which requires that roaming profiles and redirected folders only be downloaded to the users' personal laptop computer and desktop computer.
You need to prepare the environment to meet the new security policy. You want to achieve this goal by using the minimum amount of administrative effort.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

  • A. Upgrade the Active Directory schema to Windows Server 2012.
  • B. Raise the domain functional level to Windows Server 2012.
  • C. Upgrade all of the client computers to Windows 8.
  • D. Raise the forest functional level to Windows Server 2012.
  • E. Upgrade all of the domain controllers to Windows Server 2012.


Answer : B,E

Explanation: First upgrade the domain controller to Windows Server 2012, then raise the domain functional level to 2012.

Your network contains an Active Directory domain named contoso.com.
A Group Policy object (GPO) named LaptopSecurity is linked to an organizational unit (OU) named Laptops.
A corporate policy states that users who use a laptop computer are forbidden from using removable media.
You configure LaptopSecurity to prevent the users from installing removable devices on their laptop.
A user named User1 cannot install removable devices. However, User1 can read and execute applications from a removable device that the user used before you configured the
GPO.
You need to ensure that the users cannot access any removable devices, even if the driver for the removable media was installed already on their laptop.
Which Removable Storage Access setting should you modify?
To answer, select the appropriate setting in the answer area.




Answer :

Explanation:


Prevent installation of devices not described by other policy settings.
This policy setting controls the installation of devices that are not specifically described by any other policy setting. If you enable this policy setting, users cannot install or update the driver for devices unless they are described by either the Allow installation of devices that match these device IDs policy setting or the Allow installation of devices for these device classes policy setting. If you disable or do not configure this policy setting, users can install and update the driver for any device that is not described by the Prevent installation of devices that match these device IDs policy setting, the Prevent installation of devices for these device classes policy setting, or the Prevent installation of removable devices policy setting.

You have a server named Server1 that runs Windows Server 2012.
You install the Windows Deployment Services server role on Server1.
You plan to deploy Windows 8 to client computers by using Windows Deployment Services
(WDS).
You need to identify which images are required for the planned deployment. The solution must use the minimum amount of images.
Which images should you identify? (Each correct answer presents part of the solution.
Choose all that apply.)

  • A. a boot image
  • B. an install image
  • C. a capture image
  • D. a discover image


Answer : A,B

Explanation:
After you have at least one boot and one install image on the server, you can deploy an install image.
The question doesn't state that you need to capture an existing machine, so you can just use the .wim from the install media.
The question does not specify whether clients have enabled or disable the PXE, therefore, the PXE is enable in the clients and not necesary a discover image http://technet.microsoft.com/en-us/library/jj648426.aspx

Your network contains an Active Directory domain named contoso.com. You deploy a generalized image of Windows 8 to a test computer.
You need to ensure that when the computer starts, the drivers are installed and the computer automatically logs on as the local administrator. The solution must ensure that the computer remains generalized.
You create an unattended file.
Which configuration pass should you modify?
To answer, select the appropriate configuration pass in the answer area.




Answer :

Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 has the Windows Server Update Services server role installed and configured.
Server1 is located in the main office. Server2 is located in the branch office.
You plan to install Windows Server update Services (WSUS) on Server2.
You need to configure the update infrastructure to meet the following requirements:
-> Only updates approved by the administrator in the main office must be installed on client computers in the branch office.
-> The local administrator in the branch office must not be able to approve updates.
-> Bandwidth usage between the offices must be minimized.
What should you do?

  • A. Configure Server2 as a downstream server in autonomous mode.
  • B. On Server1, configure a computer group that contains the client computers in the branch office, and then set the approvals to Automatic.
  • C. On Server1, configure a client computer group that contains Server2, and then set the approvals to Automatic.
  • D. Configure Server2 as a downstream server in replica mode.


Answer : D

Explanation:


C:\Documents and Settings\usernwz1\Desktop\1.PNG

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Windows Deployment Services server role installed.
Server1 hosts multiple install images of Windows 8 (x64).
You are testing the automated deployment of one of the install images.
You need to ensure that the install image that you are testing is selected automatically during the deployment of Windows 8 (x64) to the clients.
What should you do?

  • A. From WDS Server Properties, configure the PXE Boot Policy.
  • B. From WDS Server Properties, configure the default boot image.
  • C. From the properties of the install image, click Allow image to install in unattended mode.
  • D. From the properties of the install image, modify the Priority value.


Answer : B

Explanation: It is possible to set the default boot image in WDS if one have multiple boot images.
Well of course you can set it, just go to Properties for the WDS server and go to the boot tab and choose a default boot image for the architecture you want to set a default image.
Note: This sets the default boot image to the one you choose but you will still be able to choose another boot image in the list of boot images.

Your network contains an Active Directory domain named contoso.com. You plan to implement Microsoft System Center 2012. You need to identify which solution automates the membership of security groups for contoso.com. The solution must use workflows that provide administrators with the ability to approve the addition of members to the security groups. Which System Center 2012 roles should you identify?

  • A. Service Manager and Virtual Machine Manager (VMM)
  • B. Configuration Manager and Orchestrator
  • C. Operations Manager and Orchestrator
  • D. Orchestrator and Service Manager


Answer : D

Explanation:

Workflows = orchestator -
Automate membership= service manager

You have a server named Server1.
You open Server Manager on Server1 as shown in the exhibit. (Click the Exhibit button.)


You need to ensure that you can publish RemoteApp programs.
What should you do?

  • A. Create a Remote Desktop connection authorization policy (RD CAP).
  • B. Install the Remote Desktop Gateway role service.
  • C. Create a collection.
  • D. Install the Remote Desktop Virtualization Host role service.


Answer : C

Explanation:
A RD CAP isnt right as this isnt a RD Gateway scenario
B RD Gateway doesnt appear to be in play her
C RemoteApp programs are published to either a session collection or virtual desktop collection using
Server Manager.
D RD Virtual Host implies we are using a VDI pool and that doesnt appear to be the case with a RemoteApp.
Test Lab Guide: Remote Desktop Services Publishing
http://technet.microsoft.com/en-us/library/hh831442.aspx
http://class10e.com/Microsoft/you-need-to-ensure-that-you-can-publish-remoteapp- programs/

Page:    1 / 12   
Total 180 questions