Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-140 Exam - Topic 8 Question 55 Discussion

Actual exam question for Microsoft's AZ-140 exam
Question #: 55
Topic #: 8
[All AZ-140 Questions]

You have an Azure Virtual Desktop deployment.

You have a RemoteApp named App1.

You discover that from the Save As dialog box of App1, users can run executable applications other than App1 on the session hosts.

You need to ensure that the users can run only published applications on the session hosts.

What should you do?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Shawnta
4 months ago
A conditional access policy won't help with app restrictions, just saying.
upvoted 0 times
...
Quentin
4 months ago
I disagree, modifying RDP properties won't solve this issue.
upvoted 0 times
...
Denny
4 months ago
Wait, can users really run other executables from the Save As dialog? That's surprising!
upvoted 0 times
...
Francis
5 months ago
I think B could work too, but not as effective as AppLocker.
upvoted 0 times
...
Truman
5 months ago
You should definitely go with D, AppLocker is the way to restrict apps.
upvoted 0 times
...
Delsie
5 months ago
Conditional access policies sound important, but I don’t think they would directly control application execution like we need here. I’m leaning towards AppLocker.
upvoted 0 times
...
Dustin
5 months ago
I practiced a similar question where we had to restrict application access, and I think AppLocker was the answer there too. It makes sense for this scenario.
upvoted 0 times
...
Armanda
5 months ago
I'm not entirely sure, but I feel like modifying RDP properties could help limit what users can do in their sessions. It seems relevant.
upvoted 0 times
...
Trina
6 months ago
I remember studying about AppLocker policies, and I think they can restrict which applications users can run. That might be the right choice here.
upvoted 0 times
...
Samira
6 months ago
The key here is to identify the component that would be used to scale out the virtual next-generation firewalls in the public cloud. I think the answer is D, internal load balancer.
upvoted 0 times
...
Jesusita
6 months ago
I'm a bit confused by the question - it seems to be asking about scenarios that don't apply to Aestivation, but I'm not entirely sure what Aestivation is. I'll need to review my notes to refresh my memory on that concept.
upvoted 0 times
...
Wade
6 months ago
Hmm, I'm a bit unsure about this one. I know it has something to do with Real-Time Transport Protocol, but I can't remember the specific protocol used to communicate codec capabilities.
upvoted 0 times
...
Thurman
10 months ago
I heard the Azure team is working on a new feature called 'Azure Remote Straightjacket' to solve this problem. Keeps those users in line, ya know?
upvoted 0 times
...
Jesus
10 months ago
D is the way to go. I mean, come on, who needs to run executable apps on a remote session anyway? That's like trying to play Doom on a calculator.
upvoted 0 times
Christa
9 months ago
D is definitely the best option to restrict unauthorized executable apps.
upvoted 0 times
...
Nakita
9 months ago
A) Configure a conditional access policy in Azure Active Directory (Azure AD).
upvoted 0 times
...
Reuben
10 months ago
D) Configure an AppLocker policy on the session hosts.
upvoted 0 times
...
...
Jordan
11 months ago
B might work, but I'm not sure if that's the most efficient way to handle this. Shouldn't we just lock down the session hosts directly?
upvoted 0 times
Jaclyn
9 months ago
Shouldn't we just lock down the session hosts directly?
upvoted 0 times
...
Avery
9 months ago
B) might work, but I'm not sure if that's the most efficient way to handle this.
upvoted 0 times
...
Jestine
9 months ago
D) Configure an AppLocker policy on the session hosts.
upvoted 0 times
...
Rosio
9 months ago
B) Modify the Access control (IAM) settings of the host pool.
upvoted 0 times
...
Ruby
9 months ago
Yeah, I agree. Configuring an AppLocker policy directly on the session hosts seems like the most secure solution.
upvoted 0 times
...
Carin
10 months ago
I think D is the best option to restrict users from running unauthorized applications.
upvoted 0 times
...
Eric
10 months ago
D) Configure an AppLocker policy on the session hosts.
upvoted 0 times
...
Verda
11 months ago
B) Modify the Access control (IAM) settings of the host pool.
upvoted 0 times
...
...
Jillian
11 months ago
I'm not sure about AppLocker. Maybe we should also consider modifying the Access control (IAM) settings of the host pool.
upvoted 0 times
...
Marnie
11 months ago
I agree with Lili. AppLocker can help restrict which applications can be run on the session hosts.
upvoted 0 times
...
Lili
11 months ago
I think we should configure an AppLocker policy on the session hosts.
upvoted 0 times
...
Odette
11 months ago
I'm not sure about AppLocker. Maybe we should also consider modifying the Access control (IAM) settings of the host pool.
upvoted 0 times
...
Kerry
12 months ago
D seems like the best option to restrict the users to only published applications. AppLocker should do the trick!
upvoted 0 times
Bernardo
10 months ago
Definitely, AppLocker will help ensure that only approved applications are allowed on the session hosts.
upvoted 0 times
...
Ula
11 months ago
I agree, AppLocker is a great way to control which applications users can run.
upvoted 0 times
...
Chau
11 months ago
That sounds like a good idea. AppLocker should restrict the users to only published applications.
upvoted 0 times
...
Lynette
11 months ago
D) Configure an AppLocker policy on the session hosts.
upvoted 0 times
...
...
Malissa
12 months ago
I agree with Jolanda. AppLocker can help restrict which applications can be run on the session hosts.
upvoted 0 times
...
Jolanda
12 months ago
I think we should configure an AppLocker policy on the session hosts.
upvoted 0 times
...

Save Cancel