Chapter 6 Review Quiz Active Directory

25 Questions

Settings
Please wait...
File Management Quizzes & Trivia

Studt this Chapter 6 also for Midterm


Questions and Answers
  • 1. 
    .By default, administrators are subject to quota limits.
    • A. 

      True

    • B. 

      False

  • 2. 
      The FAT file system has built-in support for file compression.
    • A. 

      True

    • B. 

      False

  • 3. 
      With NTFS, compression can be enabled on a folder with encryption.
    • A. 

      True

    • B. 

      False

  • 4. 
     In a domain environment, the domain Administrator account is designated as a recovery agent
    • A. 

      True

    • B. 

      False

  • 5. 
     By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m., and 12:00 p.m., Monday through Friday
    • A. 

      True

    • B. 

      False

  • 6. 
    Which of the following is not one of the filesystems Windows supports?
    • A. 

      NTFS

    • B. 

      FAT

    • C. 

      FAT32

    • D. 

      ZFS

  • 7. 
    What is the size limit for FAT32 partitions at creation time within Windows operating systems?
    • A. 

      4 GB

    • B. 

      2 GB

    • C. 

      2 TB

    • D. 

      32 GB

  • 8. 
    Which of the following is not a reason to use volume mount points?
    • A. 

      To extend the apparent amount of free space on an existing FAT32 volume

    • B. 

      Consolidate frequently accessed volumes

    • C. 

      Consolidate several shared volumes

    • D. 

      To avoid using a drive letter for a volume

  • 9. 
    What is the primary function of shadow copies?
    • A. 

      To maintain copies of files for security auditing

    • B. 

      Avoid distracting the user by normal system level file transfer activities

    • C. 

      Prevent the accidental loss of data

    • D. 

      To serve as the primary means of backing up data

  • 10. 
    If a file with the compression attribute set is copied to a new location, what happens? 
    • A. 

      The file loses the compression attribute

    • B. 

      The file inherits the compression attribute settings from its parent container

    • C. 

      The file retains its compression attribute

    • D. 

      The file can’t be copied to a new location without being decompressed first

  • 11. 
    If a file with the encryption attribute set is copied or moved within an NTFS volume, what happens?
    • A. 

      The encrypted file loses its encryption attribute

    • B. 

      The file inherits the encryption attribute settings from its parent container

    • C. 

      The file retains its encryption attribute, regardless of the parent container’s settings

    • D. 

      Nothing; the file must be decrypted before it can be moved or copied

  • 12. 
    What must a user have in order to be added to an encrypted file’s access list? 
    • A. 

      Valid EFS Certificate

    • B. 

      Special NTFS permissions

    • C. 

      Full Control permissions to the file

    • D. 

      EFS extended permissions

  • 13. 
    One of your co-workers, Jeremy, is trying to access a share on a server you’re responsible for. He has asked for your help because despite having the correct share permissions, he still cannot access the share. After investing the problem, you find the permissions are configured as follows:Share permissions:Everyone - Full controlNTFS Permissions:HRdept - ModifyJeremy - Deny Full ControlJeremy informs you that he is a member of the HRdept group. What is Jeremy’s effective permissions over the network?
    • A. 

      Modify

    • B. 

      Full control

    • C. 

      Read only

    • D. 

      Deny Full control

  • 14. 
    Vanessa has come to you asking for your help with a network share issue. She created a shared folder named ShareData on a member server with her account, vness1. However, she finds that she is unable to modify or make changes to any documents in the shared folder across the network. You have logged into the server, and checked the permissions set on ShareData:Share Permissions:Everyone - ReadNTFS PermissionsCreator owner - Implicit full controlWhat should Vanessa do? 
    • A. 

      She should set Everyone to Full Control in the share permissions

    • B. 

      She should add her username to the NTFS permissions and give her username Full Control

    • C. 

      Set Everyone’s share permissions to Modify

    • D. 

      Remove all share permissions

  • 15. 
    The HRdept group needs to have full access to a nested folder on a server. This folder cannot be moved, and is within a folder where the HRdept group must not be allowed to open or change any files. What is the easiest method to accomplish this?
    • A. 

      Assign the read attributes special permission to the container where HRdept should have no access, then apply Full Control to the nested folder

    • B. 

      Apply Full control permissions to the nested folder

    • C. 

      Apply the “List Folder Contents” standard permission to the container where HRdept should have no access, then apply Full Control to the nested folder

    • D. 

      Set up a batch script to automatically copy the files from the nested folder to another folder where HRdept can access them freely

  • 16. 
    In Windows Server 2008, the default limit for the number of simultaneous users is set to...
    • A. 

      10

    • B. 

      20

    • C. 

      50

    • D. 

      16,777,216

  • 17. 
    How would you access serverXX’s administrative share for the C Drive?
    • A. 

      Impossible; drives can’t be shared

    • B. 

      \\serverXX\C$

    • C. 

      \\serverXX\$C

    • D. 

      \serverXX\C$

  • 18. 
    Which of the following is not a method by which you can access Windows shares? 
    • A. 

      UNC path

    • B. 

      Active Directory search

    • C. 

      Mapping a drive

    • D. 

      Telnetting the UNC path

  • 19. 
    A DFS hierarchy is referred to as a...
    • A. 

      Namespace

    • B. 

      Filespace

    • C. 

      domainspace

    • D. 

      Dfspace

  • 20. 
    In a Windows environment, he physical printer containing paper and ink or toner to which print jobs are sent is called... 
    • A. 

      A printer

    • B. 

      A print server

    • C. 

      A print device

    • D. 

      Print queue

  • 21. 
    Where can you configure the Separator Page option on a printer? 
    • A. 

      In the printer’s Properties, on the General tab

    • B. 

      In the printer’s Properties, on the Device Settings tab

    • C. 

      In the printer’s Properties, on the Configuration tab

    • D. 

      In the printer’s Properties, on the Advanced tab

  • 22. 
    What service do you install to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers? 
    • A. 

      Line Printer Universal Access (LPUA)

    • B. 

      Line Printer Daemon (LPD)

    • C. 

      Special Print Services

    • D. 

      Linux Printer Daemon (LPD)

  • 23. 
    The Services for Network File System role service performs what function? 
    • A. 

      Allows Windows to use the Network File System file sharing protocol common to Linux and Unix

    • B. 

      Allows users to access Windows shares over the network via Server Message Block (SMB) protocol

    • C. 

      Creates a distributed file system that is shared among multiple servers

    • D. 

      Manages all network shares

  • 24. 
    This role service allows grouping shared folders from one or more file servers into a single hierarchical folder structure, so users don’t have to know on which server a share is located.
    • A. 

      Services for Network File System

    • B. 

      File Server

    • C. 

      Windows Search Service

    • D. 

      Distributed File System

  • 25. 
    What is the maximum partition size that FAT16 supports?
    • A. 

      1 GB

    • B. 

      2 GB

    • C. 

      4 GB

    • D. 

      8 GB