Filters
Question type

Study Flashcards

Discuss the authentication provider and accounting provider options that are available when configuring the security properties for a remote access server.

Correct Answer

verifed

verified

You can configure the remote access serv...

View Answer

You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server.

A) True
B) False

Correct Answer

verifed

verified

After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true?


A) Jabez removed Marion from the Marketing group and added her to another group.
B) Jabez removed the Remote Desktop Connection Broker service.
C) Jabez created a shared folder that is accessible to remote servers in the collection.
D) Jabez rebooted the remote access server.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario?


A) Remote Desktop Protocol
B) Password Authentication Protocol
C) Point-to-Point Tunneling Protocol
D) Layer Two Tunneling Protocol

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work?


A) 1723/TCP
B) 443/TCP
C) 500/TCP
D) 1701/TCP

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?


A) Remote Desktop Licensing
B) Remote Desktop Virtualization Host
C) Remote Desktop Web Access
D) Remote Desktop Gateway

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

D

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?


A) The number of connections for the SSTP protocol does not exceed the number of remote access clients.
B) The remote access server was not rebooted after the recent changes.
C) The client systems are running the latest version of Windows 10.
D) The other protocols do not have updates to the number of connections.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is the purpose of adding entries for each RADIUS client on the RADIUS server when configuring remote access servers to use RADIUS?

Correct Answer

verifed

verified

Remote access servers do not forward req...

View Answer

What are the different role services available for the Remote Desktop services server role?

Correct Answer

verifed

verified

The collection of services that provide ...

View Answer

Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server?


A) Before installing the Remote Desktop Services server role
B) After selecting the role services that Aria wants to install
C) After choosing the desktop deployment type
D) After selecting deployment options

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

B

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication.

A) True
B) False

Correct Answer

verifed

verified

False

How do last mile technologies impact the speed at which an organization can transfer information over the Internet?

Correct Answer

verifed

verified

Last mile technologies often span the "l...

View Answer

Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do?


A) She will select the Demand-dial connections service.
B) She will select the LAN routing service.
C) She will install the Web Application Proxy role service.
D) She will select the Dial-up access service.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.

A) True
B) False

Correct Answer

verifed

verified

Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true?


A) Rory used the Log off option.
B) Rory used the Disconnect option.
C) Rory used the Send Message option.
D) Rory used the Shadow option.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true?


A) Michaela expects users to connect from both laptops and desktops.
B) Michaela's organization allows users to connect remotely using their personal computers.
C) The Remote Desktop Licensing role service is not installed on the remote server.
D) Michaela has installed an HTTPS encryption certificate for Remote Desktop Web Access.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application?


A) Remote Desktop Gateway
B) Remote Desktop Licensing
C) Remote Desktop Virtualization Host
D) Remote Desktop Web Access

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?


A) Remote Desktop app
B) Virtual Private Network
C) RemoteApp
D) DirectAccess

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?


A) Layer Two Tunneling Protocol
B) DirectAccess
C) Next Generation Firewall
D) Virtual Private Networks

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization?


A) Virtual Private Networks
B) Web Application Proxy
C) DirectAccess
D) RemoteApp

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 37

Related Exams

Show Answer