1.
__________ permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system.
Explanation
NTFS permissions refer to the access controls set on files and folders stored on disk volumes formatted with the NTFS file system. These permissions determine who can access, modify, or delete files and folders, and also specify the level of access granted to different users or groups. NTFS permissions provide a more advanced and granular level of security compared to other file systems, allowing administrators to effectively manage and control access to sensitive data.
2.
_________ folders makes them accessible to network users.
Explanation
The term "Sharing" refers to the process of granting access or permission to other users on a network to view, edit, or use the contents of a particular folder. By sharing folders, network users can easily access and collaborate on files, documents, and resources stored within those folders. This allows for efficient sharing and communication among users, promoting teamwork and productivity in a networked environment.
3.
An access __________ list is a collection of individual permissions in the form of access control entries.
Explanation
An access control list is a collection of individual permissions in the form of access control entries. This list is used to control and manage access to resources or systems by specifying who is allowed or denied access. By organizing permissions into a list, it becomes easier to manage and enforce access control policies.
4.
When you assign a __________ permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects.
Explanation
When you assign a "Deny" permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects. This means that even if the element has been granted permission to perform a certain action by its parent objects, the "Deny" permission will take precedence and prevent the element from carrying out that action.
5.
Folder __________ asks users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server.
Explanation
The term "redirection" accurately describes the action of clicking on a folder that appears to be local, but actually leads to files stored on a server. This is a common practice in computer systems where the user interface is designed to mimic a local file system, giving the illusion that the files are stored locally when they are actually stored remotely. The user is redirected to the server where the files are stored when they click on the folder.
6.
You can use the Net.exe command-line utility with the __________ parameter to map drive letters to folders.
Explanation
The correct answer is "USE". The Net.exe command-line utility can be used with the "USE" parameter to map drive letters to folders. This allows users to access specific folders on a network drive by assigning them a drive letter for easy navigation and file management.
7.
What type of devices are essentially dedicated file servers that provide file-based storage services directly to clients on the network?
Explanation
Network attached storage (NAS) devices are essentially dedicated file servers that provide file-based storage services directly to clients on the network. NAS devices are designed to be connected to a network and provide a centralized storage location for multiple clients to access and share files. They typically have their own operating system and file management capabilities, allowing them to handle file sharing, data backup, and other storage-related tasks. NAS devices are commonly used in home and small business environments to provide easy and convenient file storage and sharing solutions.
8.
What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?
Explanation
The Microsoft Management Console (MMC) snap-in used to perform disk-related tasks is called Disk Management. This tool allows users to view and manage the disks and volumes on a computer. It provides functionalities such as creating, deleting, and formatting partitions, assigning drive letters, extending or shrinking volumes, and initializing new disks. Disk Management is a useful tool for managing storage devices and organizing disk space efficiently.
9.
What type of permissions control access to specific parts of an Active Directory hierarchy?
Explanation
Active Directory permissions control access to specific parts of an Active Directory hierarchy. These permissions determine what actions users or groups can perform on objects within the Active Directory structure, such as creating, modifying, or deleting objects. By assigning appropriate permissions, administrators can ensure that only authorized users have access to sensitive information and can perform necessary tasks within the Active Directory environment.
10.
Drives can be mapped through Group Policy or though what other method?
Explanation
Drives can be mapped through Group Policy or through logon scripts. Logon scripts are a method used to automate the mapping of network drives for users when they log in to their computers. These scripts can be written using scripting languages such as VBScript or PowerShell and are executed during the user's logon process. By configuring the logon script to map specific network drives, administrators can ensure that users have access to the necessary network resources upon logging in.
11.
What lookup service maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts?
Correct Answer
C. User Name Mapping
Explanation
User Name Mapping is the correct answer because it is the lookup service that maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts. This service is used to map the user names between UNIX and Windows/Active Directory environments, allowing for seamless integration and authentication across different systems.
12.
You must install the File Services role to use the Distributed File System.
Correct Answer
A. True
Explanation
To use the Distributed File System (DFS), it is necessary to install the File Services role. DFS is a feature in Windows Server that allows users to access and manage files stored on multiple servers as if they were on a single shared folder. By installing the File Services role, the necessary components and services required for DFS are enabled, allowing for the implementation and utilization of DFS. Therefore, the statement that installing the File Services role is required to use DFS is true.
13.
Which Windows operating system protocol is used for file sharing?
Correct Answer
B. Server Message Blocks (SMB)
Explanation
Server Message Blocks (SMB) is the protocol used for file sharing in Windows operating systems. It allows for the sharing of files, printers, and other resources between computers on a network. SMB provides a standardized way for different devices and operating systems to communicate and access shared files and resources. It is commonly used in Windows-based networks and is supported by a wide range of devices and operating systems.
14.
Which system can warn administrators of excessive storage utilization trends or apply hard restrictions to user accounts?ques
Correct Answer
B. Quota
Explanation
The correct answer is "Quota." A quota system can warn administrators of excessive storage utilization trends by setting limits on the amount of storage space that can be used by individual users or groups. When the storage utilization approaches or exceeds the set limit, the system can generate warnings or notifications to the administrators. Additionally, a quota system can also apply hard restrictions to user accounts by preventing them from using additional storage once they have reached their allocated quota.
15.
For organizations utilizing Windows and UNIX computers, Windows Server 2008 includes which role service?
Correct Answer
A. Services for Network File System
Explanation
Windows Server 2008 includes the role service of "Services for Network File System" for organizations utilizing both Windows and UNIX computers. This role service allows for the sharing of files and resources between Windows and UNIX systems, facilitating seamless communication and collaboration between the two platforms.
16.
Which console includes several predefined quota templates that can be used to create your own quota template?
Correct Answer
B. File Server Resource Manager
Explanation
The correct answer is File Server Resource Manager. The File Server Resource Manager console includes several predefined quota templates that can be used to create your own quota template. This allows users to easily set up and manage quotas for file shares on a Windows file server. The console provides a user-friendly interface for configuring and monitoring quotas, and the predefined templates offer a starting point for creating custom quotas based on specific requirements.
17.
What will the Window’s Server 2008 “Deploying a File Server” default allow you to manage on the server?
Correct Answer
D. All the above
Explanation
The default settings for "Deploying a File Server" in Windows Server 2008 allow you to manage disk drives, share drives, and map drives on the server. This means that you can control and manipulate the storage devices, create shared folders for network access, and assign drive letters to network locations, all within the file server environment.
18.
Which system simplifies the process of locating files and folders on network servers?
Correct Answer
A. Distributed File System
Explanation
The correct answer is Distributed File System. Distributed File System simplifies the process of locating files and folders on network servers by providing a unified and transparent view of multiple file servers. It allows users to access files and folders from different servers as if they were on a single server, eliminating the need to know the specific location of each file. This simplifies file management and improves efficiency in a networked environment.
19.
To raise the domain functional level of a domain, use the Active Directory Domains and Trusts console.
Correct Answer
A. True
Explanation
To raise the domain functional level of a domain, the Active Directory Domains and Trusts console is used. This console allows administrators to manage trust relationships and domain functional levels. By raising the domain functional level, administrators can enable additional features and capabilities within the domain, such as improved security and compatibility with newer versions of Windows Server. Therefore, the statement is true.
20.
What technique duplicates copies of a file that are all updated on a regular basis, no matter which copy changes?
Correct Answer
B. Multimaster replication
Explanation
Multimaster replication is a technique that duplicates copies of a file and ensures that all copies are regularly updated, regardless of which copy changes. This means that any changes made to one copy of the file are automatically replicated to all other copies, ensuring consistency and synchronization across multiple locations or systems. Multimaster replication is commonly used in distributed systems or environments where multiple copies of the same file need to be kept up to date.
21.
An NFS server exports part of its file system and the NFS client integrates the exported information into its own file system. What is this process called?
Correct Answer
A. Mounting
Explanation
The process described in the question is called "mounting". Mounting refers to the process of integrating a remote file system into a local file system, allowing the client to access and use the exported information from the NFS server as if it were part of its own file system. This enables seamless file sharing and access between the NFS server and client.
22.
Network File System (NFS) places the bulk of the file-sharing process on the __________.
Correct Answer
D. Client
Explanation
NFS is a distributed file system protocol that allows a client computer to access files over a network as if they were stored locally. The client is responsible for initiating the file-sharing process and requesting files from the server. The server, on the other hand, is responsible for storing and managing the files. Therefore, the correct answer is client.
23.
What works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection?
Correct Answer
B. DFS Replication
Explanation
DFS Replication works in tandem with DFS Namespaces to provide unified services such as data distribution, load balancing, and data collection. DFS Replication ensures that files are replicated across multiple servers, allowing for improved data availability and fault tolerance. This replication process helps to distribute the load among multiple servers, ensuring that clients can access data from the nearest or least loaded server. Additionally, DFS Replication allows for data collection by consolidating files from multiple servers into a single location, making it easier for administrators to manage and analyze the data.
24.
Which option allows clients to revert to a previously unavailable target when it becomes available again at a lower cost than the present target?
Correct Answer
B. Client Failback
Explanation
Client Failback allows clients to revert to a previously unavailable target when it becomes available again at a lower cost than the present target. This means that if a target becomes unavailable, clients will automatically switch to an alternative target. Once the previously unavailable target becomes available again and is at a lower cost than the current target, clients will revert back to it. This feature helps optimize costs and ensure that clients are always connected to the most cost-effective target.
25.
Replication groups use which topology to limit the replication traffic to specific pairs of members?
Correct Answer
C. Hub/spoke topology
Explanation
Replication groups use a hub/spoke topology to limit the replication traffic to specific pairs of members. In this topology, there is a central hub that connects to multiple spoke nodes. The hub acts as a central point for communication, and the spokes only communicate with the hub, reducing the replication traffic between members. This allows for more efficient and controlled replication within the group.
26.
Windows Server 2008 supports the UNIX and Linux file server clients with Server Message Blocks (SMB).
Correct Answer
B. False
Explanation
Windows Server 2008 does not support UNIX and Linux file server clients with Server Message Blocks (SMB). This statement is false.
27.
Which of the following items allows administrators to monitor and regulate the storage consumed by network users?
Correct Answer
A. File Server Resource Manager
Explanation
File Server Resource Manager allows administrators to monitor and regulate the storage consumed by network users. It provides tools for managing and classifying files, creating storage quotas, generating reports on storage usage, and implementing file screening and storage management policies. This allows administrators to effectively manage and control the storage resources on the network, ensuring efficient use of storage and preventing storage overutilization.
28.
For enterprise networks, creating workgroups is the recommended method for managing quota assignments on a large scale.
Correct Answer
B. False
Explanation
Creating workgroups is not the recommended method for managing quota assignments on a large scale in enterprise networks. Instead, enterprise networks typically use centralized management systems or directory services to manage quota assignments more efficiently and effectively. Workgroups are generally used in smaller networks or home environments where the number of users and resources is limited.
29.
Which role service selection allows you to install the Share and Storage Management console for Microsoft Management Console (MMC)?
Correct Answer
C. File Server
Explanation
The correct answer is File Server. The File Server role service allows you to install the Share and Storage Management console for Microsoft Management Console (MMC). This console provides a graphical interface for managing shares, volumes, and storage pools on a file server.
30.
DFS can distribute access requests by using what feature, thus preventing any one server from shouldering the entire traffic load?
Correct Answer
B. Load balancing
Explanation
DFS can distribute access requests by using load balancing, which helps prevent any one server from shouldering the entire traffic load. Load balancing evenly distributes the incoming requests across multiple servers, ensuring that no single server becomes overwhelmed with traffic. This helps to improve overall performance, optimize resource utilization, and enhance the reliability and availability of the system.
31.
Which UNIX operating system protocol is used for file sharing?
Correct Answer
A. Network File System (NFS)
Explanation
Network File System (NFS) is the correct answer because it is a protocol commonly used in UNIX operating systems for file sharing. NFS allows clients to access files on remote servers as if they were local files. It provides a simple and efficient way to share files between different machines on a network. Server Message Blocks (SMB) is a protocol used for file sharing in Windows operating systems, not UNIX. Internet Engineering Task Force (IETF) is a standards organization that develops and promotes Internet standards, but it is not specifically related to file sharing protocols. Therefore, the correct answer is Network File System (NFS).
32.
Configuring role services as you install them saves time and effort later.
Correct Answer
A. True
Explanation
Configuring role services as you install them saves time and effort later because it allows you to set up the necessary services and configurations during the initial installation process. This eliminates the need to go back and manually configure the role services at a later time, which can be time-consuming and potentially prone to errors. By configuring the role services as you install them, you ensure that the necessary services are properly set up and ready to use immediately after the installation is completed.
33.
What protocol conserves network bandwidth by detecting changes in files and transmitting only the modified data to the destination?
Correct Answer
B. Remote Differential Compressions
Explanation
Remote Differential Compressions is the correct answer because it is a protocol that specifically detects changes in files and transmits only the modified data to the destination. This helps to conserve network bandwidth by reducing the amount of data that needs to be transmitted. Remote Desktop Protocol is not the correct answer as it is used for remote access to desktops, not for conserving network bandwidth. Load Balancing Protocol and Server Message Block are also not the correct answers as they do not have the specific functionality of detecting changes in files and transmitting only modified data.
34.
The File Services node provides access to which of the following elements?
Correct Answer
D. All of the above
Explanation
The File Services node provides access to all of the above elements, including System Services, roles Services, and Resources and Support. This means that users can access and manage various file-related services, system services, roles services, and resources and support through the File Services node.
35.
Windows Server 2008 computers must run which protocol service to send email messages?
Correct Answer
C. Simple Mail Transfer Protocol (SMTP)
Explanation
Windows Server 2008 computers must run the Simple Mail Transfer Protocol (SMTP) service to send email messages. SMTP is a widely used protocol for sending email over the internet. It is responsible for the transmission of email between servers and is necessary for the proper functioning of email communication.