Section 6 - Computer Management Flashcards

• Perform simple and advanced computer inventory searches. • Create static and smart computers groups. • Configure and deploy configuration profiles to computers. • Make apps available to users by installing them automatically or through Self Service. • Deploy policies automatically or through Self Service. (35 cards)

1
Q

Which attributes can be used to search for a computer in Jamf Pro inventory?

A

Many attributes including:

  • Computer Name
  • Site
  • Last Inventory Update
  • Last Check-in
  • IP Address
  • Jamf binary version
  • Supervised
  • MDM Capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can the presentation of search results be customized?

A

Navigate to Settings > Computer Management - Management Framework > Inventory Display and select the items you wish to display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inventory search results can be exported into which three file formats?

A
  • .CSV
  • .TXT
  • .XML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which formats can advanced searches be exported to?

A

CSV, TXT, XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can a computer belong to more than one building at a time?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Browse button do?

A

Provides a list of acceptable values on which to search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is collecting computer inventory information beneficial?

A
  • Asset management and tracking.
  • Current state of a computer and it’s software.
  • Inventory information can be used to create groups.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where can Processor Speed be located in an inventory record?

A

Inventory > General > Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can a Jamf Pro user update a computer’s asset tag in the inventory?

A

Inventory > General, then click the Edit button to add the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Besides Jamf Pro, which service is required to issue remote commands?

A

Apple Push Notification service (APNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens when a “Lock Computer” command is issued?

A

Logs the user out, forces a restart and requires a passcode be entered to log into the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which remote command can be issued to update macOS?

A

Download and Install Updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are two differences between computer searches and computer groups?

A
  • Groups can only contain Managed computers

- Groups can be dynamic and keep themselves up to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are computers assigned to static groups?

A

Manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can members of smart computer groups be monitored from the Jamf Pro Dashboard?

A

By enabling the option to Show in Jamf Pro Dashboard in the computer group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of Scope?

A

To control which computers receive management tasks.

17
Q

What is a Target?

A

The initial pool of computers to receive a management task.

18
Q

What is an Exclusion?

A

A pool of computers that should NOT receive the management task.

19
Q

If a configuration profile is scoped to all computers excluding the Germany building, which computers will receive the profile?

A

All computers except computers assigned to the Germany building.

20
Q

What happens if an exclusion is added to the scope of a configuration profile without a target?

A

Nothing. If there is no target, then nothing should get deployed.

21
Q

What do configuration profiles allow IT administrators to accomplish?

A

Allow definition or restriction of various settings.

22
Q

How are configuration profiles deployed?

A

In conjunction with Apple Push Notifications.

23
Q

Why should configuration profiles be separated based on functionality?

A

To create logical organization and help with troubleshooting. It also makes management and modification of profiles easier.

24
Q

What is the difference between “Make Available in Self Service” and “Install Automatically/Prompt Users to Install” when deploying Mac App Store apps?

A

User interaction is required in Make Available but may not be required with the second option (unless Prompt Users to Install is chosen).

25
What must be configured to deploy apps using "Install Automatically/Prompt Users to install"?
Enabling certificate-based authentication and Enable push notifications.
26
Which option allows apps to be featured on the front page of Self Service?
The checkbox to Include the app in the Featured category.
27
Which triggers are available for policy deployment?
- Startup - Login - Logout - Network State Change - Enrollment Complete - Recurring Check-in - Custom
28
How can policies be prevented from running?
By unchecking the Enable checkbox or removing all targets from the Scope.
29
Are policies limited to one payload each?
No.
30
Do policies require a configured payload besides General to deploy?
No.
31
Which payload is used to deploy local user accounts?
Local Accounts
32
How can a policy be rerun on a computer if it fails to deploy?
Flushing the policy log for the targeted computer.
33
Which Execution Frequency allows users to run Self Service policies multiple times?
Ongoing.
34
How does performing an Authenticated Restart affect the user experience when the Restart Options payload is configured?
They won't have to provide credentials for FileVault after the restart.
35
Is a Trigger required when configuring a Self Service policy?
Nope.