Information Technology Reference
In-Depth Information
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can find the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. You want to allow people to connect using Remote Desktop connection from their
home computers, through an RD Gateway server deployed on your organization's
perimeter network, to their work desktop computers on your organization's internal
network. Which of the following profiles should you deploy to accomplish this goal?
a. Email profile
B. Certificate profile
C. VPN profile
D. Remote connection profile
2. You are testing a new device that uses a self-signed certificate to encrypt communica-
tion. You want to configure 30 Configuration Manager clients so that they trust this
self-signed certificate. Which of the following profiles would you deploy to accomplish
this goal?
a. Email profile
B. Certificate profile
C. VPN profile
D. Remote connection profile
3. You are switching your remote access service from an SSTP VPN to an IKEv2 VPN
because this allows automatic reconnection without requiring user reauthentication.
Which of the following profiles would you deploy to mobile computers so that they are
updated with this new VPN connection information?
a. Remote connection profile
B. Certificate profile
C. VPN profile
D. Email profile
4. Which of the following can you use to configure nondomain-joined computers running
the Windows 8.1 operating system with the appropriate settings that allow them to
connect to your organization's Exchange deployment?
a. Email profile
B. Certificate profile
C. VPN profile
D. Remote connection profile
 
 
Search WWH ::




Custom Search