Your network contains an Active Directory domain named adatum.com. The domain contains a
server named Server5 that has the Remote Desktop Services (RDS) server role installed and all of the
RDS role services installed. Server5 is configured as a file server and a Remote Desktop Services
client access licences (RDS CALS) on Server5. Which tool should you use?
A.
Regedit
B.
Remote Desktop Gateway Manager
C.
Dism
D.
Rdpsign
E.
Netsh
F.
Remote Desktop Services Manager
G.
Windows System Resource Manager (WSRM)
H.
Rdpinit
I.
Mstsc
J.
Remote Desktop Connection Manager
K.
Remote Desktop Session Host Configuration
Explanation:
Your network contains an Active Directory domain named adatum.com. The domain contains a
server named Server5 that has the Remote Desktop Services (RDS) server role installed and all of the
RDS role services installed. Server5 is configured as a file server and a Remote Desktop services
server. You configure a remote Desktop Connection named server5.rdp. You plan to deploy
server5.rdp to all users in the domain. You need to ensure that server5.rdp cannot be used by any
user if the content of the file has been modified Which tool should you use?
A)
Regedit
B)
Remote Desktop Gateway Manager
C)
Dism
D)
Rdpsign
E)
Netsh
F)
Remote Desktop Services Manager
G)
Windows System Resource Manager (WSRM)
H)
Rdpinit
I)
Mstsc
J)
Remote Desktop Connection Manager
K)
Remote Desktop Session Host ConfigurationAnswer) D