Case Scenarios

In the following case scenarios, you will apply what you’ve learned in this chapter. You can find answers to these questions in the “Answers” section at the end of this book.

Case Scenario 1: Configuring Remote Desktop

You work as a desktop support technician in a large company whose network consists of a single Active Directory domain, Nwtraders.msft. The company network includes 10 servers running Windows Server 2003 and 100 client computers running Windows Vista Enterprise.

A certain computer named Client1.nwtraders.msft is running a network monitoring application. You are using Remote Desktop to connect to Client1 periodically so that you can view statistics generated by this application. You are a member of the Administrators group on Client1.

  1. A user named MonicaV has received authorization to connect to Client1 through Remote Desktop. You have been tasked with the responsibility of allowing MonicaV to connect to the computer without providing her with administrative privileges on the machine. What should you do?
  2. You want to ensure that user authentication to Client1 is performed before any full Remote Desktop connection is established. What should you do?

Case Scenario 2: Offering Remote Assistance

You work at a call center for a software company. Your job is to provide technical support to customers all over the world by answering their questions on the telephone and occasionally by connecting to their computers through Windows Remote Assistance.

A customer named Fred calls in to the tech support center and describes to you problems configuring the software. You have decided that the best way to help Fred is to connect to his computer by using Remote Assistance.

You have verified that both your computer and Fred’s computer are connected to the Internet.

  1. Given the network environment, what is the best way to establish a Windows Remote Assistance connection to Fred’s computer?
  2. You want to be able to perform adjustments to Fred’s computer without requring him to continually approve UAC messages. What should you do?

< Back      Next >

 

 

© Microsoft. All Rights Reserved.