Deck 9: Configuring Remote Access Services

ملء الشاشة (f)
exit full mode
سؤال
An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology?

A) Next Generation Firewall
B) Demarcation point
C) Remote access server
D) Point-to-Point Protocol over Ethernet (PPPoE)
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do?

A) She will select the Demand-dial connections service.
B) She will select the LAN routing service.
C) She will install the Web Application Proxy role service.
D) She will select the Dial-up access service.
سؤال
You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select?

A) LAN routing
B) Demand-dial connections
C) NAT
D) Dial-up access
سؤال
Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario?

A) The remote access server also contains a network location server.
B) Noortje had established a VPN connection before the system was restarted.
C) Noortje is using a Windows 7 operating system.
D) The client is using IPv4 packets to authenticate to the remote access server.
سؤال
Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.
سؤال
Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use?

A) Remote Access Server
B) Remote Clients
C) Infrastructure Servers
D) Application Servers
سؤال
The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?

A) Layer Two Tunneling Protocol
B) DirectAccess
C) Next Generation Firewall
D) Virtual Private Networks
سؤال
The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.
سؤال
Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard?

A) Damien should not select the Use force tunneling option.
B) Damien should select the Use force tunneling option.
C) Damien should select the Enable DirectAccess for mobile computers only option.
D) Damien should not select the Enable DirectAccess for mobile computers only option.
سؤال
An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization?

A) Virtual Private Networks
B) Web Application Proxy
C) DirectAccess
D) RemoteApp
سؤال
Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?

A) The remote access server should be outside the DMZ.
B) The NAT router must be configured to forward remote access requests.
C) The NAT router should be a Next Generation Firewall.
D) The remote access server should be connected directly to the demarc.
سؤال
You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work?

A) 1723/TCP
B) 443/TCP
C) 500/TCP
D) 1701/TCP
سؤال
Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario?

A) Trang should add a DHCP relay agent for IPv6 before proceeding with the next step.
B) Trang should reboot the remote access server before proceeding with the next step.
C) Trang should select the network interface that is connected to the DHCP clients.
D) Trang should select the network interface that is connected to the DMZ.
سؤال
When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication.
سؤال
Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server?

A) Password Authentication Protocol (PAP)
B) Challenge Handshake Authentication Protocol (CHAP)
C) Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
D) Extensible Authentication Protocol (EAP)
سؤال
Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?

A) Remote Desktop app
B) Virtual Private Network
C) RemoteApp
D) DirectAccess
سؤال
You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server.
سؤال
Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router?

A) Next Generation Firewall
B) Last mile technology
C) Demarcation point
D) Point-to-Point Protocol over Ethernet (PPPoE)
سؤال
Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?

A) The number of connections for the SSTP protocol does not exceed the number of remote access clients.
B) The remote access server was not rebooted after the recent changes.
C) The client systems are running the latest version of Windows 10.
D) The other protocols do not have updates to the number of connections.
سؤال
Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used?

A) When a client is authenticated using an unencrypted authentication method
B) When the Idle Timeout and Session Timeout constraints are set to 5 minutes
C) When the access permission on the same screen is set to Access denied
D) When a user account has the Control access through NPS Network Policy option set
سؤال
What are the additional configuration options available on the Remote Access Setup pane that are unavailable on Enable DirectAccess Wizard?
سؤال
When implementing a VPN server on Windows Server 2019, what are the four remote access tunneling protocols available for use, and how do they differ?
سؤال
How do last mile technologies impact the speed at which an organization can transfer information over the Internet?
سؤال
What is the purpose of adding entries for each RADIUS client on the RADIUS server when configuring remote access servers to use RADIUS?
سؤال
Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true?

A) Michaela expects users to connect from both laptops and desktops.
B) Michaela's organization allows users to connect remotely using their personal computers.
C) The Remote Desktop Licensing role service is not installed on the remote server.
D) Michaela has installed an HTTPS encryption certificate for Remote Desktop Web Access.
سؤال
What are the different role services available for the Remote Desktop services server role?
سؤال
Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true?

A) Rory used the Log off option.
B) Rory used the Disconnect option.
C) Rory used the Send Message option.
D) Rory used the Shadow option.
سؤال
How does a remote access client determine the creation of an IPSec tunnel to connect to a remote access server using DirectAccess?
سؤال
Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario?

A) Remote Desktop Protocol
B) Password Authentication Protocol
C) Point-to-Point Tunneling Protocol
D) Layer Two Tunneling Protocol
سؤال
Explain the configuration of dial-in settings for a fictional user J-Smith to allow the user VPN remote access.
سؤال
How does Remote Desktop differ from VPNs and DirectAccess?
سؤال
Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server?

A) Before installing the Remote Desktop Services server role
B) After selecting the role services that Aria wants to install
C) After choosing the desktop deployment type
D) After selecting deployment options
سؤال
What constraints are available for use in a remote access policy?
سؤال
Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application?

A) Remote Desktop Gateway
B) Remote Desktop Licensing
C) Remote Desktop Virtualization Host
D) Remote Desktop Web Access
سؤال
Discuss the authentication provider and accounting provider options that are available when configuring the security properties for a remote access server.
سؤال
What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

A) Remote Desktop Licensing
B) Remote Desktop Virtualization Host
C) Remote Desktop Web Access
D) Remote Desktop Gateway
سؤال
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true?

A) Jabez removed Marion from the Marketing group and added her to another group.
B) Jabez removed the Remote Desktop Connection Broker service.
C) Jabez created a shared folder that is accessible to remote servers in the collection.
D) Jabez rebooted the remote access server.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/37
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Configuring Remote Access Services
1
An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology?

A) Next Generation Firewall
B) Demarcation point
C) Remote access server
D) Point-to-Point Protocol over Ethernet (PPPoE)
B
2
Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do?

A) She will select the Demand-dial connections service.
B) She will select the LAN routing service.
C) She will install the Web Application Proxy role service.
D) She will select the Dial-up access service.
A
3
You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select?

A) LAN routing
B) Demand-dial connections
C) NAT
D) Dial-up access
A
4
Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario?

A) The remote access server also contains a network location server.
B) Noortje had established a VPN connection before the system was restarted.
C) Noortje is using a Windows 7 operating system.
D) The client is using IPv4 packets to authenticate to the remote access server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
5
Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
6
Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use?

A) Remote Access Server
B) Remote Clients
C) Infrastructure Servers
D) Application Servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
7
The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?

A) Layer Two Tunneling Protocol
B) DirectAccess
C) Next Generation Firewall
D) Virtual Private Networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
9
Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard?

A) Damien should not select the Use force tunneling option.
B) Damien should select the Use force tunneling option.
C) Damien should select the Enable DirectAccess for mobile computers only option.
D) Damien should not select the Enable DirectAccess for mobile computers only option.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
10
An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization?

A) Virtual Private Networks
B) Web Application Proxy
C) DirectAccess
D) RemoteApp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?

A) The remote access server should be outside the DMZ.
B) The NAT router must be configured to forward remote access requests.
C) The NAT router should be a Next Generation Firewall.
D) The remote access server should be connected directly to the demarc.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
12
You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work?

A) 1723/TCP
B) 443/TCP
C) 500/TCP
D) 1701/TCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
13
Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario?

A) Trang should add a DHCP relay agent for IPv6 before proceeding with the next step.
B) Trang should reboot the remote access server before proceeding with the next step.
C) Trang should select the network interface that is connected to the DHCP clients.
D) Trang should select the network interface that is connected to the DMZ.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
14
When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
15
Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server?

A) Password Authentication Protocol (PAP)
B) Challenge Handshake Authentication Protocol (CHAP)
C) Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
D) Extensible Authentication Protocol (EAP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
16
Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?

A) Remote Desktop app
B) Virtual Private Network
C) RemoteApp
D) DirectAccess
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
17
You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
18
Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router?

A) Next Generation Firewall
B) Last mile technology
C) Demarcation point
D) Point-to-Point Protocol over Ethernet (PPPoE)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
19
Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?

A) The number of connections for the SSTP protocol does not exceed the number of remote access clients.
B) The remote access server was not rebooted after the recent changes.
C) The client systems are running the latest version of Windows 10.
D) The other protocols do not have updates to the number of connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
20
Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used?

A) When a client is authenticated using an unencrypted authentication method
B) When the Idle Timeout and Session Timeout constraints are set to 5 minutes
C) When the access permission on the same screen is set to Access denied
D) When a user account has the Control access through NPS Network Policy option set
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
21
What are the additional configuration options available on the Remote Access Setup pane that are unavailable on Enable DirectAccess Wizard?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
22
When implementing a VPN server on Windows Server 2019, what are the four remote access tunneling protocols available for use, and how do they differ?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
23
How do last mile technologies impact the speed at which an organization can transfer information over the Internet?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is the purpose of adding entries for each RADIUS client on the RADIUS server when configuring remote access servers to use RADIUS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
25
Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true?

A) Michaela expects users to connect from both laptops and desktops.
B) Michaela's organization allows users to connect remotely using their personal computers.
C) The Remote Desktop Licensing role service is not installed on the remote server.
D) Michaela has installed an HTTPS encryption certificate for Remote Desktop Web Access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the different role services available for the Remote Desktop services server role?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
27
Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true?

A) Rory used the Log off option.
B) Rory used the Disconnect option.
C) Rory used the Send Message option.
D) Rory used the Shadow option.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
28
How does a remote access client determine the creation of an IPSec tunnel to connect to a remote access server using DirectAccess?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
29
Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario?

A) Remote Desktop Protocol
B) Password Authentication Protocol
C) Point-to-Point Tunneling Protocol
D) Layer Two Tunneling Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
30
Explain the configuration of dial-in settings for a fictional user J-Smith to allow the user VPN remote access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
31
How does Remote Desktop differ from VPNs and DirectAccess?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
32
Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server?

A) Before installing the Remote Desktop Services server role
B) After selecting the role services that Aria wants to install
C) After choosing the desktop deployment type
D) After selecting deployment options
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
33
What constraints are available for use in a remote access policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
34
Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application?

A) Remote Desktop Gateway
B) Remote Desktop Licensing
C) Remote Desktop Virtualization Host
D) Remote Desktop Web Access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
35
Discuss the authentication provider and accounting provider options that are available when configuring the security properties for a remote access server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
36
What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

A) Remote Desktop Licensing
B) Remote Desktop Virtualization Host
C) Remote Desktop Web Access
D) Remote Desktop Gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
37
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true?

A) Jabez removed Marion from the Marketing group and added her to another group.
B) Jabez removed the Remote Desktop Connection Broker service.
C) Jabez created a shared folder that is accessible to remote servers in the collection.
D) Jabez rebooted the remote access server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.