The "Comments" that can be specified when assigning Application Managers to an application is displayed to the
A. End user when the application is started.
B. End user when access to the application is requested.
C. Application Manager when users are assigned to the application
D. Application Manager when information about the application is viewed.
RES Workspace Manager is configured to monitor CPU usage to prevent bad applications from disturbing other sessions. What happens when an application takes too much processing time?
RES Workspace Manager will:
A. Lower the process priority so the operating system will only run it in leftover CPU time.
B. Kill the application after notifying the user about the misbehaving process.
C. Automatically move the running instance to a free server, if available.
D. Pause the application, notify the user, and continue the application when there's enough free CPUpower.
Can the option "Windows Shell Shortcut creation: Do Nothing" be used in combination with the RES Workspace Manager Shell?
A. Yes, and applications will not be managed.
B. Yes, and the session will not be managed.
C. No, RES Workspace Manager will not continue when the session is started
D. No, RES Workspace Manager will automatically revert to `Replace'.
Which rules can be used with Zones?
1.
USB serial number
2.
Active Directory Site
3.
Hardware requirement
4.
Terminal Server listener name
A. 1 and 2 only
B. 3 and 4 only
C. 1, 3 and 4 only
D. 1, 2, 3 and 4
You want to protect your Relay Server against unauthorized Agent connections. How can that be done?
A. Configure an Administrative Role without access to the Relay Servers.
B. Enforce protocol encryption between the Relay Server and the Agents.
C. Configure an environment password for the Relay Servers.
D. Create a Scope without access to the Relay Servers.
What happens with the old RES Workspace Manager Environment Password when an administrator sets a new one?
A. The old password will be honored during a grace period of 30 days.
B. The old password will be stored in the passwords, old file.
C. The old password will be destroyed immediately.
D. The old password can be restored with the license node.
To create a failover printer connection, an administrator needs to configure a(n)
A. Additional printer at the same Workspace Container.
B. Backup printer for an existing connection.
C. Backup printer with Advanced Printing Preferences.
D. Additional printer with the same access control settings.
User Workspace Management consists of
A. Context, Composition and Content
B. Context, Content and Security
C. Security, Diagnostics and Setup
D. Composition, Security, Extensions
If an administrator needs to view the Workspace Analysis of settings in a Workspace, without actually applying them, what RES Workspace Manager functionality can he use?
A. The Workspace Scenario Wizard
B. The Baseline Desktop Analyzer
C. The Workspace Designer
D. The Desktop Sampler
What components are needed for Desktop Transformation?
1.
Desktop Sampler
2.
Workspace Model
3.
Workspace Preferences
4.
Workspace Designer
A. 1 and 2 only
B. 2 and 3 only
C. 1, 2 and 4 only
D. 1, 2, 3, and 4