Você está na página 1de 4

Kuvempu University Model Question Paper for B.Sc.

(IT-IMS) Semester 3 (Academic Year 2010 - 2011 Cycle) Subject: Deploying Business Desktops Subject Code: BSIMS-31 Part A: Answer all questions. Marks) Max Marks: 100 1 Mark Each (25

1. In the _________ environment, connectivity with deployment servers is not available due to low network bandwidth and infrastructure resources. 2. ________ databases are used to identify application compatibility problems after an application is installed. 3. The ________ file contains the portion of the user profile that pertains to Office 2003 Editions. 4. Microsoft Windows Vista uses a single Extensible Markup Language (XML)-based answer file format known as ___________. 5. The ___________ allows you to store multiple images in one file. 6. USMT is used for the _________and _______ scenarios. 7. The __________ tool is used to create a Windows PE CD to boot and install desktop on a reference computer. 8. __________ helps in generating .ISO files and WIM images by using Microsoft Windows PE. 9. There are three desktop deployment scenarios: _______, _______, and ______. 10. ___________ firewall has a limited capacity of screening data packets transferred over the network. 11. ____________ is a framework that is used to control user access to any resources by authenticating the digital identity of the user. 12. ________ costs are less visible and dispersed across the various business operations of an enterprise. 13. The Scanstate tool collects the users accounts, files, and settings and creates a data store called _________. 14. An operating system operates in two modes, _______and __________.

Page 1 of 4

15. __________ is used to monitor the occurrence of problems and security breaches in the organization. State whether the following statements are True or False. 1. Windows PE does not support running 16-bit applications on 32-bit versions of Windows PE or 32-bit applications on 64-bit version of Windows PE. 2. Scanstate.exe is used to collect the user information and settings from computers running Windows 95/98/Me. 3. Databases follow a common plan that defines the characteristics of the data. 4. Storage Virtualization upgrades the hardware devices without corrupting the data stored on the server. 5. BDD 2007 helps in generating the .ISO files and WIM images by using Microsoft Windows PE. 6. The WIM format is hardware-agnostic, which means that one image can manage different hardware configurations. 7. Windows PE does not assign persistent drive letters across sessions and always starts with the default drive letter. 8. Migration databases are used to identify application compatibility issues and resolve the issues when an application runs on a new operating system. 9. Application Verifier for Microsoft Windows XP Professional helps you to resolve application incompatibility issues by applying compatibility modes to custom database. 10. The ZTP services run on ZTP servers by using the ASP.NET applications.

Page 2 of 4

Part B: Answer any five questions three benefits of each level.


2. What are the requirements to deploy an operating system?

Marks: 75 15 15 15 5 10

1. Explain the different levels of virtualization in an enterprise network. List

3. How will you perform image-based desktop deployment using Windows

tools in a new computer scenario?


4.

a. Why do you need ZTP? What are the two components of ZTP? b. What are the various phases of ZTP you need to follow while implementing ZTP?
5.

a. Briefly describe different types of identity data sources. b. What are the different levels of deployment?
6.

7 8

a. List and explain the enhancements that Microsoft Windows Vista has introduced in automation tools. 7 b. What are the different types of tools that are used to implement application compatibility solutions in an enterprise environment? 8
7.

a. CCDS, Inc. consists of 200 employees. Recently, it has opened a division in New Jersey for which, it has procured 150 new computers. Sam, the Desktop Administrator, has been assigned the task to deploy more than one operating system on all the newly procured computers. However, the network bandwidth and connectivity with the deployment server are quite poor in the new division. Which deployment method should Sam select to perform the assigned task? Give reasons to justify your answer. 8 b. Jim has purchased a new computer with the latest configuration for his personal work at home. He already has one computer that he now plans to discard, as it is out-of-date and slow. Further, the computer does not have the hardware to connect to the Internet. Therefore, he has dismantled the existing computer and installed the new computer in its place. Now, he needs to deploy a Windows operating system on this computer. He is aware of the various methods to deploy Windows operating system. Out of all the methods, which one should he implement such that the deployment is completed successfully? Justify your answer. 7

Page 3 of 4

8.

a. Charles has recently joined as a Desktop Administrator in Parkers & Sons, Inc. He has been assigned the task to create and deploy desktop images on the computers there. While planning for the deployment, Charles finds that the network bandwidth is insufficient for creating as well as deploying desktop images. The SMS infrastructure and security system are also poorly managed. In such a situation, which image-based deployment method should he choose and why? 7 b. Techno Sol, Inc. is a software company, which has shifted its office to London. Paul, who is working as a Desktop Administrator in the company has been given a responsibility to deploy the operating system on the new computer. He has been instructed by his seniors to maintain the same user settings that the employees were using in the previous office. Which deployment scenario should he choose? How will he perform the deployment? 8

Page 4 of 4

Você também pode gostar