The default hide drive behavior is set to "Hide all drives unless otherwise specified" and all other settings are left at their default settings. Why would one of the user's drives still be visible?
A. Because it is a USB drive
B. Because it is a home drive
C. Because it is a drive substitute
D. Because it is a DVD-ROM drive
An administrator has configured User Settings for a specific application to track registry and files. At application level, the User Setting is enabled. Start tracking changes is configured to track changes immediately.
However, no changes are being preserved for users of the application. Which of the following could be the cause of this problem?
1.
Sampling mode is disabled.
2.
User Settings is disabled at global level.
3.
"Preserve" and "Apply" are both checked.
4.
"Allow users to restore their own settings" is disabled.
A. 1 and 2 only
B. 3 only
C. 2 only
D. 4 only
At the Desktop > Background node a Desktop background image is configured for the users. If an administrator creates a Building Block of this setting, what will happen with that image?
A. The background image will be inserted into the Building Block.
B. It is not possible to create a Building Block of items containing images.
C. The background image will be stored in an additional file.
D. All settings will be included, but the background image is ignored.
When using E- Mail Templates with Microsoft App-V, the MAPI profile will be created
A. On the Microsoft App-V Server.
B. On the user's home drive.
C. In the virtual environment.
D. In the Datastore.
You want to protect your Relay Server against unauthorized Agent connections. How can that be done?
A. Configure an Administrative Role without access to the Relay Servers.
B. Enforce protocol encryption between the Relay Server and the Agents.
C. Configure an environment password for the Relay Servers.
D. Create a Scope without access to the Relay Servers.
Which Access Control criteria can be used restrict Workspace Contains?
1.
User/Group
2.
Directory Services
3.
Client Name
4.
Language
A. 1 and 2
B. 1 and 4
C. 2 and 3
D. 2 and 4
A CAD application needs full CPU power to ensure the shortest rendering times. CPU Optimization is configured for the total environment to limit CPU usages for applications. How can the administrator configure RES Workspace Manager so that it grants this specific application the necessary CPU power, without losing control over other applications?
A. Add a registry action at application level: Exclude From CPU = Yes
B. Exclude the application from CPU Optimization by adding the process name in the global CPU Optimization properties.
C. All applications are effected by CPU Optimization. No exceptions can be made.
D. Exclude the application from CPU Optimization on the application's Settings tab
Memory Optimization optimizes the
A. Virtual memory usage of system processes.
B. Physical memory usage of system processes.
C. Virtual memory usage of application processes.
D. Physical memory usage of application processes.
When importing applications in the Workspace Designer several users are listed on the tab Slack
A. These users have access to the application but will lose access with the chosen context rule.
B. These users do not have access to the application but will gain access with the chosen context rule.
C. These users will see the application in the start menu but will not be able to run the application.
D. These users will not see the application in the start menu or on the desktop.
What is a Workspace Extension?
A. A workstation-installed application that is integrated in a laptop environment.
B. A Terminal Server-installed application that is published through RES VDX.
C. A workstation-installed application that is integrated in a Terminal Server environment.
D. A Terminal Server-installed application that is published through the RES Workspace Extender.