Internet, Intranet And Extranet! Network Security Trivia Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Reem2009_1981
R
Reem2009_1981
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,711
Questions: 44 | Attempts: 1,711

SettingsSettingsSettings
Internet, Intranet And Extranet! Network Security Trivia Quiz - Quiz

Over the past week, we have covered a lot about the internet, intranet, and extranet all under the network security topic and the quiz below are prepared to see just how much we got to understand. In the world today, where everything is computerized, there is a high need to ensure just how much knowledge you have to offer. Give it a try!


Questions and Answers
  • 1. 

    A network that is part of your intranet but is extended to users outside of your organization and is accessible from the Internet is a private network.

    • A.

      No change is needed

    • B.

      An intranet

    • C.

      A public network

    • D.

      An extranet

    Correct Answer
    D. An extranet
    Explanation
    The given correct answer is "An extranet". An extranet is a network that is part of an organization's intranet but is extended to external users, such as partners, suppliers, or customers, who are granted access to certain resources or services. It is accessible from the Internet but still maintains a level of security and restricted access, making it a private network.

    Rate this question:

  • 2. 

    The network has 12 desktop computers and two servers that host a web-based inventory application that all the employee connected to the same network switch A firewall protects all computers and servers from external networks. Which type of network are you configuring?

    • A.

      Extranet

    • B.

      Wide area network

    • C.

      VPN

    • D.

      Intranet

    Correct Answer
    D. Intranet
    Explanation
    The given scenario describes a network that consists of 12 desktop computers and two servers, all connected to the same network switch. A firewall is in place to protect the network from external networks. This setup suggests that the network is an intranet. An intranet is a private network that is only accessible to authorized users within an organization. It allows for internal communication, collaboration, and sharing of resources.

    Rate this question:

  • 3. 

    To share media files between your computer and your video game system, you should create a public network.

    • A.

      No change is needed

    • B.

      An extranet

    • C.

      A VPN connection

    • D.

      A private network

    Correct Answer
    D. A private network
    Explanation
    To share media files between your computer and your video game system, you should create a private network. This is because a private network provides a secure and controlled environment for sharing files between devices. It ensures that only authorized devices can access the network and prevents unauthorized access from external sources. Creating a private network also helps in maintaining the privacy and security of the shared media files.

    Rate this question:

  • 4. 

    Which type of information about users does biometrics evaluate?

    • A.

      Where a user is located

    • B.

      Physical characteristics of user

    • C.

      Phrases a user has memorized

    • D.

      Objects a user carries with him or her

    Correct Answer
    B. pHysical characteristics of user
    Explanation
    Biometrics evaluates the physical characteristics of a user. This refers to unique and measurable traits such as fingerprints, facial features, iris patterns, and voiceprints. By analyzing these physical characteristics, biometric systems can accurately identify and authenticate individuals.

    Rate this question:

  • 5. 

    To strengthen security, you want to utilize multi-factor authentication that uses biometrics. A password and a per-shared security question accomplish this goal.

    • A.

      No change is needed

    • B.

      Swipe pattern

    • C.

      Thumb print

    • D.

      PIN

    Correct Answer
    C. Thumb print
    Explanation
    Utilizing a thumbprint for multi-factor authentication strengthens security by adding an additional layer of biometric verification. This means that in addition to a password and a pre-shared security question, the user's thumbprint will also be required to access the system or account. Thumbprints are unique to each individual and are difficult to replicate, making them a reliable form of authentication.

    Rate this question:

  • 6. 

    You are an IT intern. You are incorporating multi-factor authentication as part of security protocols .you are using a smart card to authentication What else must be used to make this multi-factor authentication

    • A.

      Token

    • B.

      Magnetic stripe card

    • C.

      Password

    • D.

      Mobile phone

    Correct Answer
    C. Password
    Explanation
    In order to make the smart card authentication a multi-factor authentication, a password must be used in addition to the smart card. This is because multi-factor authentication requires the use of at least two different factors to verify the user's identity. The smart card serves as one factor, while the password serves as another factor. By requiring both the smart card and the password, it adds an extra layer of security to the authentication process.

    Rate this question:

  • 7. 

    What is an example of the way in which a Trajan horse commonly spreads to other computers?

    • A.

      It pretends to be a document from a friend .

    • B.

      It inserts copies of itself into other computer programs .

    • C.

      It downloads from an infected web page .

    • D.

      It traverses a network by exploiting a vulnerability .

    Correct Answer
    C. It downloads from an infected web page .
    Explanation
    An example of the way in which a Trojan horse commonly spreads to other computers is by downloading from an infected web page. This means that when a user visits a compromised website, the Trojan horse is automatically downloaded onto their computer without their knowledge or consent. Once the Trojan horse is downloaded, it can then carry out malicious activities, such as stealing sensitive information or damaging the system. It is important for users to be cautious when browsing the internet and to have up-to-date security measures in place to prevent such downloads.

    Rate this question:

  • 8. 

    What are two ways to lower the risk of a virus or malware infection? Choose two

    • A.

      Enable the Windows firewall .

    • B.

      Keep the system updated .

    • C.

      Install a download manager .

    • D.

      Use only HTTPS while web surfing .

    Correct Answer(s)
    A. Enable the Windows firewall .
    B. Keep the system updated .
    Explanation
    Enabling the Windows firewall helps to protect the computer from unauthorized access and blocks potential threats from entering the system. Keeping the system updated ensures that the latest security patches and fixes are installed, which helps to close any vulnerabilities that could be exploited by viruses or malware. By combining these two measures, the risk of a virus or malware infection can be significantly lowered.

    Rate this question:

  • 9. 

    What are two strategies to lower the risk of a virus infection that is sent through an email? Choose two

    • A.

      Use SSL to access the email service.

    • B.

      Turn the windows firewall on .

    • C.

      Run anti-virus software on the client .

    • D.

      Open attachments only from trusted sources .

    Correct Answer(s)
    B. Turn the windows firewall on .
    D. Open attachments only from trusted sources .
    Explanation
    Two strategies to lower the risk of a virus infection sent through an email are turning the Windows firewall on and opening attachments only from trusted sources. By enabling the Windows firewall, it can help block unauthorized access and potentially harmful content. Opening attachments only from trusted sources reduces the likelihood of downloading infected files or executing malicious scripts. These measures can help protect against virus infections and enhance the overall security of email communications.

    Rate this question:

  • 10. 

    Computer worms are different from another type of malware or spyware because they are designed to be destructive

    • A.

      No change is needed

    • B.

      Are embedded inside another program .

    • C.

      Display ads in a web browser

    • D.

      Can self-replicate

    Correct Answer
    D. Can self-replicate
    Explanation
    Computer worms are different from other types of malware or spyware because they can self-replicate. Unlike malware or spyware that may only infect a single system or target specific files, worms have the ability to spread and create copies of themselves across multiple systems. This self-replication feature allows worms to rapidly propagate and infect a large number of devices, causing widespread damage and disruption.

    Rate this question:

  • 11. 

    Which is a feature of Active Directory Rights Management  Services  ( AD RMS )?

    • A.

      Provides a permissions system that work with any cloud-based storage solution

    • B.

      Manages Digital Rights Management ( DRM ) for digital media

    • C.

      Allows users to define who can open ., modify , print , on forward a document .

    • D.

      Manages share and file permissions on all servers in an enterprise

    Correct Answer
    C. Allows users to define who can open ., modify , print , on forward a document .
    Explanation
    AD RMS allows users to define who can open, modify, print, or forward a document. This feature provides a comprehensive permissions system that allows users to control access to sensitive information and protect it from unauthorized use. Users can set specific permissions for each document, ensuring that only authorized individuals can perform certain actions on it. This enhances security and helps organizations maintain control over their data.

    Rate this question:

  • 12. 

    When you access a file located on a shared resource,  the most restrictive permissions take precedence.

    • A.

      No change is needed

    • B.

      ACL

    • C.

      NTFS

    • D.

      Share

    Correct Answer
    A. No change is needed
    Explanation
    When accessing a file located on a shared resource, the most restrictive permissions take precedence. This means that if there are different permissions set at different levels (such as at the share level or the file system level), the most restrictive permissions will be applied and enforced. Therefore, no change is needed in this scenario as the statement accurately reflects the behavior of accessing files on shared resources.

    Rate this question:

  • 13. 

    True Or False You are trying to access a  file in a folder on a windows 8.1 pro computer from a second computer over the network. You have the following permissions : NTFS: full control Share: read-only

    • A.

      You will be able to read the file

    • B.

      You will be able to delete the file

    • C.

      You will be able to change the file.

    Correct Answer
    A. You will be able to read the file
    Explanation
    Since the NTFS permissions are set to full control, it means that you have the ability to read, write, modify, and delete the file. However, the share permissions are set to read-only, which means that other users accessing the file over the network can only read the file but cannot make any changes to it. Therefore, you will be able to read the file but not delete or change it.

    Rate this question:

  • 14. 

    When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?

    • A.

      They are the combined permissions of the original file and destination folder

    • B.

      They inherit the permissions of the destination folder.

    • C.

      They remain the same as the original

    • D.

      They are removed , and only the creator is given full control

    Correct Answer
    B. They inherit the permissions of the destination folder.
    Explanation
    When a file is copied from one NTFS file system partition to another, the file permissions of the copied file will inherit the permissions of the destination folder. This means that the copied file will have the same permissions as the folder it is being copied into. This ensures consistency and allows the file to be accessed and managed according to the permissions set for the destination folder.

    Rate this question:

  • 15. 

    You need to change the permissions of a file. However, the file was created by a user on a system to which you don't know What are two possible ways to achieve this goal? Choose two

    • A.

      Ask the administrator for modify permission to the file .

    • B.

      Have the user grant you the take ownership permission for the file

    • C.

      Add the Restore files and directories privilege to your account.

    • D.

      Change the file permissions by using a file share

    Correct Answer(s)
    A. Ask the administrator for modify permission to the file .
    B. Have the user grant you the take ownership permission for the file
    Explanation
    Two possible ways to achieve the goal of changing the permissions of a file are: asking the administrator for modify permission to the file and having the user grant you the take ownership permission for the file.

    Rate this question:

  • 16. 

    Your company is deploying a new application on employees’ personal Windows RT devices. The devices are registered with Microsoft Intune You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application. What are the requirements of the published installation files?

    • A.

      In order to publish the files , internet speed must be at least 50 Kbps .

    • B.

      As many files as necessary may be uploaded but no single file may be larger than 2 GB

    • C.

      The cumulative total file size for the published applications must be smaller than 2 GB

    • D.

      In order to upload the software , the files must be in a zip format .

    Correct Answer
    B. As many files as necessary may be uploaded but no single file may be larger than 2 GB
    Explanation
    The requirements for the published installation files are that multiple files can be uploaded, but each individual file cannot exceed 2 GB in size. This means that the application can be broken down into smaller files for easier distribution. The cumulative total file size for all the published applications must also be smaller than 2 GB. Additionally, the files must be in a zip format in order to be uploaded to Microsoft Intune cloud storage.

    Rate this question:

  • 17. 

    In order to install Microsoft  Intune client software on a computer, you need to be a member of that computer’s Administrators group.

    • A.

      No change is needed

    • B.

      Remote Management Users

    • C.

      Power Users

    • D.

      Remote Desktop Users

    Correct Answer
    A. No change is needed
    Explanation
    The correct answer is "No change is needed" because the statement in the question already states that in order to install Microsoft Intune client software on a computer, you need to be a member of that computer's Administrators group. Therefore, no change or additional group membership is required.

    Rate this question:

  • 18. 

    The windows store allows users of Windows 8 and Windows 8.1 computers to view and install applications that the users’ administrators make available to them. The computers must be attached to the domain, and the user must be logged in With domain credentials.

    • A.

      No change is needed .

    • B.

      Microsoft SharePoint

    • C.

      The Microsoft Intune Company portal APP

    • D.

      The system Center configuration manager company portal App

    Correct Answer
    D. The system Center configuration manager company portal App
    Explanation
    The given correct answer is "The system Center configuration manager company portal App". This is because the question is asking for an application that allows users to view and install applications made available by their administrators on Windows 8 and Windows 8.1 computers attached to the domain. The System Center Configuration Manager Company Portal App is specifically designed for this purpose, allowing users to access and install applications provided by their administrators while logged in with domain credentials.

    Rate this question:

  • 19. 

    Microsoft Azure Remote App provides the ability to centrally manage on-premise systems and corporate result

    • A.

      No change is needed

    • B.

      System Center 2012 R2 Configuration Manager

    • C.

      Microsoft Virtual Desktop Infrastructure ( VDI )

    • D.

      Microsoft Azure Service Bus

    Correct Answer
    B. System Center 2012 R2 Configuration Manager
    Explanation
    The given correct answer is "System Center 2012 R2 Configuration Manager". This is because the question is asking for a tool or solution that can centrally manage on-premise systems and corporate results. System Center 2012 R2 Configuration Manager is a comprehensive management solution that allows organizations to manage their on-premise systems, including servers, desktops, and mobile devices, from a central location. It provides features such as software distribution, patch management, inventory tracking, and remote control, making it an ideal choice for centrally managing on-premise systems and corporate results.

    Rate this question:

  • 20. 

    Which Microsoft Intune Company Portal APP platform requires IT deployment?

    • A.

      Windows Phone 8.1

    • B.

      IOS

    • C.

      Windows Rt

    • D.

      Android

    Correct Answer
    A. Windows pHone 8.1
    Explanation
    The Microsoft Intune Company Portal app platform that requires IT deployment is Windows Phone 8.1. This means that in order to deploy and manage the Microsoft Intune Company Portal app on Windows Phone 8.1 devices, IT personnel need to be involved. The other options, such as iOS, Windows RT, and Android, do not require IT deployment as they can be easily downloaded and installed by users from their respective app stores.

    Rate this question:

  • 21. 

    Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune. You need to enforce the following security requirements on personal devices : Company data can be removed if an employee is terminated. Company data cannot be accessed if the device is lost or stolen. What should you do?

    • A.

      Enable selective wipe , and secure file transfers with SSL

    • B.

      Enable selective wipe , and enforce encryption .

    • C.

      Enable selective wipe , and enforce a lock screen and password

    • D.

      Enforce encryption , and enforce a lock screen and password .

    Correct Answer
    B. Enable selective wipe , and enforce encryption .
    Explanation
    Enabling selective wipe allows the company to remove company data from personal devices if an employee is terminated, ensuring that sensitive information is not accessible to unauthorized individuals. Enforcing encryption ensures that company data cannot be accessed if the device is lost or stolen, as the data will be encrypted and unreadable without the proper encryption key. This combination of selective wipe and encryption provides a strong security measure for protecting company data on personal devices.

    Rate this question:

  • 22. 

    True Or False Check the right sentences.

    • A.

      Windows Intune provides support for your Own Device ( BYOD ) policies all platforms Including linux .

    • B.

      Windows Intune integrates with existing system center 2012 R2 configuration Manager deployments

    • C.

      Windows Intune lets you manage devices to protect corporate assets by using configuration policies and remote wipe .

    Correct Answer(s)
    B. Windows Intune integrates with existing system center 2012 R2 configuration Manager deployments
    C. Windows Intune lets you manage devices to protect corporate assets by using configuration policies and remote wipe .
    Explanation
    The correct answer states that Windows Intune integrates with existing system center 2012 R2 configuration Manager deployments and allows you to manage devices to protect corporate assets using configuration policies and remote wipe. This means that Windows Intune can be seamlessly integrated with the existing system center 2012 R2 configuration Manager deployments and provides features to manage devices and protect corporate assets.

    Rate this question:

  • 23. 

    The president of your university asks you to set up a service website for students who line in the dorm . The website’s official launch date is in two days, and you do not have the resources needed to set up the server infrastructure and develop the system. You need a cloud-based solution that can have the servers and storage available in two days. Which Microsoft cloud solution achieves this goal?

    • A.

      Active Directory

    • B.

      Microsoft Intune

    • C.

      Microsoft OneDrive

    • D.

      Microsoft Azure

    Correct Answer
    D. Microsoft Azure
    Explanation
    Microsoft Azure is the correct answer because it is a cloud-based solution that provides the necessary server infrastructure and storage. It allows for quick deployment and scalability, making it suitable for setting up a service website within a short timeframe.

    Rate this question:

  • 24. 

    Microsoft Azure storage solutions replicate four copies of your data within a single region.

    • A.

      No change is needed

    • B.

      Two

    • C.

      Three

    • D.

      Six

    Correct Answer
    C. Three
    Explanation
    The given correct answer is "Three". This means that Microsoft Azure storage solutions replicate three copies of your data within a single region. This ensures data redundancy and increases data durability and availability. By having multiple copies of the data, the chances of data loss or unavailability are minimized, providing a more reliable storage solution for users.

    Rate this question:

  • 25. 

    Which feature of an Azure Application detects failed elements and maneuvers around them, and then returns the correct results within a specific time frame?

    • A.

      Redundancy

    • B.

      Fault tolerance

    • C.

      Scalability

    • D.

      Disaster recovery

    Correct Answer
    B. Fault tolerance
    Explanation
    Fault tolerance is the feature of an Azure Application that detects failed elements and maneuvers around them, ensuring that the application continues to function without interruption. It is designed to handle failures and errors by implementing measures such as redundancy, backup systems, and automatic failover. This allows the application to return correct results within a specific time frame, even in the presence of failures or errors. Fault tolerance is crucial for ensuring the reliability and availability of an application, especially in scenarios where downtime or data loss can have significant consequences.

    Rate this question:

  • 26. 

    Redundant  Microsoft Azure application is able to meet increased demand with consistent results in acceptable time windows

    • A.

      No change is needed

    • B.

      Highly available

    • C.

      Fault tolerant

    • D.

      Scalable

    Correct Answer
    D. Scalable
    Explanation
    The given correct answer is "Scalable." This means that the redundant Microsoft Azure application can handle increased demand by expanding its resources or capacity, allowing it to consistently deliver results within acceptable time windows. Scalability is crucial for applications that experience varying levels of demand, as it ensures that the system can adapt and handle increased workload without compromising performance or reliability.

    Rate this question:

  • 27. 

    Your company needs a service that eliminates a single point of failure on any provisioned service. Which feature can Microsoft Azure offer to lower the probability of a failure that disrupts business operations?

    • A.

      HDInsight

    • B.

      Scalability

    • C.

      High availability

    • D.

      Backup

    Correct Answer
    C. High availability
    Explanation
    High availability is the correct answer because it refers to the ability of a system or service to remain operational and accessible even in the event of component failures. By implementing high availability in Microsoft Azure, the company can ensure that there is no single point of failure, reducing the probability of a failure that disrupts business operations. This feature provides redundancy and fault tolerance, allowing the system to automatically switch to a backup or redundant system if one component fails, thus maintaining continuous operation.

    Rate this question:

  • 28. 

    True Or False Check the right answers

    • A.

      You can create a Microsoft Azure virtual machine by using a platform image.

    • B.

      You can create a Microsoft Azure virtual machine by using your own image

    • C.

      You can create a Microsoft Azure virtual machine by using your own disk

    Correct Answer
    A. You can create a Microsoft Azure virtual machine by using a platform image.
    Explanation
    You can create a Microsoft Azure virtual machine by using a platform image, which is a pre-configured image provided by Azure. This image contains the operating system and other software that is already installed and configured. By using a platform image, you can quickly create a virtual machine without having to manually install and configure the software.

    Rate this question:

  • 29. 

    You want to use Microsoft Azure Backup . Which two certificate requirements are necessary to set up your vault ? Choose two

    • A.

      A certificate with an encryption key that is at least 256 bits

    • B.

      A wildcard certificate in the Microsoft.com domain

    • C.

      A certificate from a CA that is trusted by Microsoft

    • D.

      A self-signed certificate

    Correct Answer(s)
    C. A certificate from a CA that is trusted by Microsoft
    D. A self-signed certificate
    Explanation
    To set up a vault for Microsoft Azure Backup, two certificate requirements are necessary. First, a certificate from a CA (Certificate Authority) that is trusted by Microsoft is needed. This ensures that the certificate is issued by a trusted authority and can be used for secure communication. Second, a self-signed certificate is required. This type of certificate is generated and signed by the user or organization themselves, providing a level of security for internal use. Both of these certificates are necessary to establish a secure and trusted connection for Azure Backup.

    Rate this question:

  • 30. 

    Your university’s IT department currently has no Active Directory  strategy . The university needs a solution that allows you to manage users and groups to secure access to Microsoft online services such as Microsoft Office 365. Which Active Dirctory strategy should the university use?

    • A.

      Active Directory Certificate Services

    • B.

      Active Directory Federation Services

    • C.

      Azure Active Directory

    • D.

      Active Directory Lightweight Directory Services

    Correct Answer
    C. Azure Active Directory
    Explanation
    The university should use Azure Active Directory as the Active Directory strategy. Azure Active Directory is a cloud-based identity and access management service that allows the university to manage users and groups, as well as secure access to Microsoft online services such as Office 365. It provides a centralized platform for user authentication, single sign-on, and multi-factor authentication, making it an ideal solution for managing access to Microsoft online services in a university setting.

    Rate this question:

  • 31. 

    Your school’s computer lab has an Active Directory installation . The lab  manager wants you to configure local IT users to be able to authenticate with their existing  domain  credentials to Microsoft Azure . Which technology should you install and  configure ?

    • A.

      Active Directory Lightweight Directory Services

    • B.

      Azure Active Directory

    • C.

      Active Directory Federation Services

    • D.

      Active Directory Domain Services

    Correct Answer
    C. Active Directory Federation Services
    Explanation
    Active Directory Federation Services (AD FS) should be installed and configured in order to allow local IT users to authenticate with their existing domain credentials to Microsoft Azure. AD FS enables single sign-on (SSO) capabilities, allowing users to access multiple systems and applications with one set of credentials. It establishes a trust relationship between the local Active Directory and Azure Active Directory, enabling users to seamlessly authenticate and access Azure resources using their existing domain credentials.

    Rate this question:

  • 32. 

    Widows Server Active Directory enables single sin-on , which simplifies user access to thousands of cloud applications on windows , Mac and iOS devices.

    • A.

      No change is needed

    • B.

      Microsoft Account

    • C.

      Active Directory Rights Management

    • D.

      Azure Active Directory

    Correct Answer
    D. Azure Active Directory
    Explanation
    Azure Active Directory is the correct answer because it is a cloud-based identity and access management service that allows users to sign in and access various cloud applications on different devices. It provides single sign-on capabilities, simplifying user access to cloud applications on Windows, Mac, and iOS devices. Azure Active Directory is specifically designed for cloud-based applications and integrates well with other Microsoft services and products.

    Rate this question:

  • 33. 

    Which term describes the security boundary for an organization that uses Active Directory and defines the scope of authority for administrators?

    • A.

      Global catalog

    • B.

      Organizational unit

    • C.

      Forest

    • D.

      Universal group

    Correct Answer
    C. Forest
    Explanation
    The correct answer is "Forest." In an organization that uses Active Directory, a forest is a security boundary that defines the scope of authority for administrators. A forest is a collection of one or more domains that share a common schema, configuration, and global catalog. It provides a boundary for security and administrative purposes, allowing administrators to manage resources and control access within their designated forest.

    Rate this question:

  • 34. 

    Which feature is provided in Azure Active Directory Basic that is not present in the free edition?

    • A.

      Advanced Anomaly Security reports ( machine learning-based)

    • B.

      Multi-Factor Authentication service for cloud users

    • C.

      Self-Service password Reset for cloud applications

    • D.

      Group-based Application access

    Correct Answer
    D. Group-based Application access
    Explanation
    Group-based Application access is a feature provided in Azure Active Directory Basic that is not present in the free edition. This feature allows administrators to manage access to cloud applications based on group membership, making it easier to grant and revoke access for multiple users at once. It provides a more efficient and centralized way of managing application access, improving security and simplifying administration tasks.

    Rate this question:

  • 35. 

    Work Folder allows users to sync data to their device from their user folder located in their corporation’s data center.

    • A.

      No change is needed

    • B.

      Workplace Join

    • C.

      Mobile Device Management

    • D.

      OneDrive

    Correct Answer
    A. No change is needed
    Explanation
    The given statement states that the Work Folder feature allows users to sync data to their device from their user folder located in their corporation's data center. The correct answer, "No change is needed," implies that the statement is already accurate and does not require any modifications or adjustments.

    Rate this question:

  • 36. 

    You are responsible for managing employee mobile devices at your company . Your company does not want its medical records distributed to these devices. You need to keep all medical records on corporate resources while still allowing end-users to use their mobile devices for work. Which solution should you deploy?

    • A.

      Work Folders

    • B.

      Workplace Join

    • C.

      Virtual Desktop Infrastructure ( VDI )

    • D.

      VPN

    Correct Answer
    B. Workplace Join
    Explanation
    Workplace Join allows users to join their devices to the organization network without joining the device to the Active Directory domain

    Rate this question:

  • 37. 

    The  OneDrive feature of Microsoft Azure centralizes applications on the same trusted and reliable platform that governments, financial services companies, and other large Organizations use for sensitive information.

    • A.

      No change is needed

    • B.

      Virtual Machines

    • C.

      Virtual network

    • D.

      RemoteApp

    Correct Answer
    D. RemoteApp
    Explanation
    The OneDrive feature of Microsoft Azure is the correct answer because it centralizes applications on a trusted and reliable platform that is used by governments, financial services companies, and other large organizations for sensitive information. This suggests that RemoteApp, which allows users to access applications from anywhere, would be the most appropriate choice in this context.

    Rate this question:

  • 38. 

    You need to provide a way to allow employees to use their own devices to access company applications that are running in the company data center. Which Microsoft product provides this service?

    • A.

      Microsoft Virtual Desktop Infrastructure

    • B.

      Windows live services

    • C.

      Office365

    • D.

      Microsoft intune

    Correct Answer
    A. Microsoft Virtual Desktop Infrastructure
    Explanation
    Microsoft Virtual Desktop Infrastructure (VDI) is the correct answer because it allows employees to access company applications running in the company data center using their own devices. VDI provides a virtual desktop environment that can be accessed remotely, allowing employees to use their personal devices while still accessing the necessary company applications securely. This solution enables flexibility and productivity while maintaining the security and control of company data.

    Rate this question:

  • 39. 

    You have implemented Virtual Desktop Infrastructure ( VDI ) for employees in your company who use bring your own device ( BYOD). Some employees report high network  latency when loading VDI apps You need to resolve the network latency issue while still maintaining a secure BYOD environment. Which tool should you use?

    • A.

      Folder Replication

    • B.

      Windows To Go

    • C.

      Auto-Triggered VPN

    • D.

      Work Folder

    Correct Answer
    B. Windows To Go
  • 40. 

    Organizational Units help you apply data governance for bring your own device ( BYOD ) because it allows you to identify data by using the classification of files.

    • A.

      No change is needed

    • B.

      File security and Access Rights help

    • C.

      Active Directory groups help

    • D.

      Dynamic access control helps

    Correct Answer
    D. Dynamic access control helps
    Explanation
    Dynamic Access Control (DAC), originally called claims-based access control, is used for access management. It provides an automatic mechanism to secure and control access to resources.In Windows Server 2012 R2/2016, DAC allows you to Identify data by using automatic and manual classification or tagging files in an organization.

    Rate this question:

  • 41. 

    What are two types of system-level updates that can be installed automatically on Microsoft surface pro 3? Choose two

    • A.

      Microsoft office updates

    • B.

      Side-loaded updates

    • C.

      Surface firmware updates

    • D.

      Windows software updates

    Correct Answer(s)
    C. Surface firmware updates
    D. Windows software updates
    Explanation
    Surface Pro 3 is a Microsoft product, and it runs on the Windows operating system. Therefore, it is reasonable to assume that system-level updates for the Surface Pro 3 would include Windows software updates. Additionally, firmware updates are specific to the hardware of the device and are necessary for improving performance, fixing bugs, and adding new features. Hence, surface firmware updates are also a type of system-level update that can be installed automatically on the Microsoft Surface Pro 3.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 20, 2017
    Quiz Created by
    Reem2009_1981
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.