Chapter 6 Review Quiz Active Directory

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By TimGutierrez
T
TimGutierrez
Community Contributor
Quizzes Created: 4 | Total Attempts: 699
| Attempts: 252 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1.  In a domain environment, the domain Administrator account is designated as a recovery agent

Explanation

In a domain environment, the domain Administrator account is designated as a recovery agent. This means that the Administrator account has the necessary permissions and access rights to recover encrypted files or data in case of any issues or emergencies. As the highest level of authority in the domain, the Administrator account is entrusted with this responsibility to ensure the security and availability of the encrypted data.

Submit
Please wait...
About This Quiz
Active Directory Quizzes & Trivia

This Chapter 6 Review Quiz focuses on Active Directory and related Windows security features. It assesses understanding of NTFS and FAT file systems, administrative privileges, and data protection... see moremechanisms. Essential for learners aiming to master Windows server environments. see less

2. Which of the following is not one of the filesystems Windows supports?

Explanation

ZFS is not one of the filesystems supported by Windows. Windows primarily supports NTFS, FAT, and FAT32 filesystems. ZFS is a file system developed by Sun Microsystems and is commonly used in Unix-based operating systems such as Solaris and FreeBSD. However, it is not natively supported by Windows.

Submit
3.  By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m., and 12:00 p.m., Monday through Friday

Explanation

Shadow copies are a feature in Windows that allow users to restore previous versions of files or folders. By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m. and 12:00 p.m., Monday through Friday. This means that the statement "True" is correct, as it accurately describes the default behavior of shadow copies in Windows.

Submit
4. How would you access serverXX's administrative share for the C Drive?

Explanation

To access serverXX's administrative share for the C Drive, you would use the UNC path \\serverXX\C$. This path allows you to access the administrative share of the C Drive on serverXX remotely. The $ symbol indicates that it is a hidden share, and the C represents the C Drive.

Submit
5. .By default, administrators are subject to quota limits.

Explanation

Administrators are not subject to quota limits by default. Quota limits are typically imposed on regular users to restrict their usage of certain resources, such as storage or API calls. However, administrators usually have elevated privileges and are exempt from these limitations to perform their administrative tasks effectively. Therefore, the correct answer is False.

Submit
6. What is the primary function of shadow copies?

Explanation

Shadow copies are primarily used to prevent the accidental loss of data. They create copies of files at specific points in time, allowing users to restore previous versions of files if they are deleted, modified, or corrupted. This feature acts as a safety net, ensuring that data can be recovered in case of accidental deletion or data loss due to system failures or errors.

Submit
7.   The FAT file system has built-in support for file compression.

Explanation

The statement is false because the FAT file system does not have built-in support for file compression. The FAT file system is a simple and widely used file system that was developed for early operating systems. It does not include features like file compression, which are typically found in more advanced file systems.

Submit
8. What is the maximum partition size that FAT16 supports?

Explanation

The maximum partition size that FAT16 supports is 2 GB. FAT16 is a file system used in older versions of Windows and DOS, and it has a limitation on the maximum size of a partition. In this case, the maximum size is 2 GB, meaning that any partition created using FAT16 cannot exceed this size.

Submit
9. Which of the following is not a reason to use volume mount points?

Explanation

Volume mount points are used to consolidate volumes and avoid using drive letters for a volume. They are not used to extend the apparent amount of free space on an existing FAT32 volume.

Submit
10. In Windows Server 2008, the default limit for the number of simultaneous users is set to...

Explanation

In Windows Server 2008, the default limit for the number of simultaneous users is set to 16,777,216. This means that the server can handle up to 16,777,216 users accessing it at the same time. This high limit allows for scalability and ensures that the server can accommodate a large number of users without any performance issues.

Submit
11. If a file with the compression attribute set is copied to a new location, what happens? 

Explanation

When a file with the compression attribute set is copied to a new location, it will inherit the compression attribute settings from its parent container. This means that the file will retain its compression attribute in the new location, ensuring that it remains compressed.

Submit
12. Vanessa has come to you asking for your help with a network share issue. She created a shared folder named ShareData on a member server with her account, vness1. However, she finds that she is unable to modify or make changes to any documents in the shared folder across the network. You have logged into the server, and checked the permissions set on ShareData:Share Permissions:Everyone - ReadNTFS PermissionsCreator owner - Implicit full controlWhat should Vanessa do? 

Explanation

Vanessa should set Everyone to Full Control in the share permissions. By doing so, she will grant all users the ability to modify and make changes to the documents in the shared folder across the network. This will ensure that she and other users have the necessary permissions to perform desired actions on the files within the shared folder.

Submit
13. In a Windows environment, he physical printer containing paper and ink or toner to which print jobs are sent is called... 

Explanation

The physical printer containing paper and ink or toner to which print jobs are sent is called a print device. This term encompasses the actual hardware device that produces the printed output.

Submit
14. Which of the following is not a method by which you can access Windows shares? 

Explanation

Telnetting the UNC path is not a method to access Windows shares. Telnet is a network protocol used for remote administration of computers, but it does not provide direct access to shared resources on a Windows network. UNC path, Active Directory search, and mapping a drive are all valid methods to access Windows shares. UNC path allows accessing shared folders by specifying the server and share name in the path. Active Directory search helps in finding shared resources through the network directory service. Mapping a drive assigns a drive letter to a shared folder for easy access.

Submit
15. What service do you install to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers? 

Explanation

The Line Printer Daemon (LPD) is the service that needs to be installed in order to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers. LPD is a printing protocol that allows remote printing across different operating systems. It enables UNIX/Linux systems to send print jobs to Windows shared printers by acting as a print server and handling the print queue.

Submit
16. The Services for Network File System role service performs what function? 

Explanation

The correct answer is "Allows Windows to use the Network File System file sharing protocol common to Linux and Unix." This role service enables Windows operating systems to access and share files using the Network File System (NFS) protocol, which is commonly used in Linux and Unix environments. By enabling this role service, Windows can seamlessly communicate and share files with systems running on different operating systems, promoting interoperability and file sharing across heterogeneous network environments.

Submit
17. A DFS hierarchy is referred to as a...

Explanation

A DFS hierarchy is referred to as a namespace because it provides a way to organize and manage the distributed file system. It allows for logical grouping and structuring of files and directories, similar to how namespaces are used in programming languages to organize code. The namespace in DFS helps to avoid naming conflicts and provides a unified view of the distributed file system to users and applications.

Submit
18. What is the size limit for FAT32 partitions at creation time within Windows operating systems?

Explanation

The size limit for FAT32 partitions at creation time within Windows operating systems is 32 GB. This means that when creating a FAT32 partition, the maximum size it can be is 32 GB.

Submit
19. What must a user have in order to be added to an encrypted file's access list? 

Explanation

To be added to an encrypted file's access list, a user must possess a valid EFS (Encrypting File System) certificate. This certificate is required to authenticate the user's identity and grant them access to the encrypted file. Without a valid EFS certificate, the user will not be able to gain access to the file's contents.

Submit
20. One of your co-workers, Jeremy, is trying to access a share on a server you're responsible for. He has asked for your help because despite having the correct share permissions, he still cannot access the share. After investing the problem, you find the permissions are configured as follows:Share permissions:Everyone - Full controlNTFS Permissions:HRdept - ModifyJeremy - Deny Full ControlJeremy informs you that he is a member of the HRdept group. What is Jeremy's effective permissions over the network?

Explanation

Jeremy's effective permissions over the network are "Deny Full control". This is because even though he is a member of the HRdept group, which has "Modify" permissions, the "Deny Full Control" permission specifically assigned to him overrides any other permissions he may have.

Submit
21. This role service allows grouping shared folders from one or more file servers into a single hierarchical folder structure, so users don't have to know on which server a share is located.

Explanation

The correct answer is Distributed File System. Distributed File System is a role service in Windows Server that allows administrators to group shared folders from multiple file servers into a single logical namespace. This means that users do not need to know the specific location of a share on a server, as the distributed file system provides a single hierarchical folder structure that encompasses all the shared folders. This simplifies file access and management for users and improves overall efficiency in a networked environment.

Submit
22.   With NTFS, compression can be enabled on a folder with encryption.

Explanation

NTFS (New Technology File System) supports both compression and encryption, but these two features cannot be enabled simultaneously on a folder. When compression is enabled on a folder, it cannot be encrypted. Similarly, when encryption is enabled on a folder, it cannot be compressed. Therefore, the statement that compression can be enabled on a folder with encryption is false.

Submit
23. If a file with the encryption attribute set is copied or moved within an NTFS volume, what happens?

Explanation

When a file with the encryption attribute set is copied or moved within an NTFS volume, the file retains its encryption attribute, regardless of the parent container's settings. This means that even if the file is moved to a different folder or directory, it will still remain encrypted. The encryption attribute is independent of the parent container's settings, ensuring that the file remains protected and secure.

Submit
24. The HRdept group needs to have full access to a nested folder on a server. This folder cannot be moved, and is within a folder where the HRdept group must not be allowed to open or change any files. What is the easiest method to accomplish this?

Explanation

The easiest method to accomplish this is to apply the "List Folder Contents" standard permission to the container where HRdept should have no access. This will allow them to see the nested folder but not open or change any files within it. Then, Full Control permissions can be applied specifically to the nested folder, giving HRdept full access to it. This ensures that HRdept has full access to the nested folder while being restricted from accessing or modifying any files in the container folder.

Submit
25. Where can you configure the Separator Page option on a printer? 

Explanation

To configure the Separator Page option on a printer, you would go to the printer's Properties. Within the Properties window, you would navigate to the Advanced tab. This tab contains various settings and options for the printer, including the Separator Page option. By selecting and configuring this option, you can specify a separator page to be printed between print jobs, helping to distinguish between different documents or print jobs.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 06, 2014
    Quiz Created by
    TimGutierrez
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
 In a domain environment, the domain Administrator account is...
Which of the following is not one of the filesystems Windows supports?
 By default, shadow copies are created when they are first...
How would you access serverXX's administrative share for the C Drive?
.By default, administrators are subject to quota limits.
What is the primary function of shadow copies?
  The FAT file system has built-in support for file...
What is the maximum partition size that FAT16 supports?
Which of the following is not a reason to use volume mount points?
In Windows Server 2008, the default limit for the number of...
If a file with the compression attribute set is copied to a new...
Vanessa has come to you asking for your help with a network share...
In a Windows environment, he physical printer containing paper and ink...
Which of the following is not a method by which you can access Windows...
What service do you install to allow UNIX/Linux computers using the...
The Services for Network File System role service performs what...
A DFS hierarchy is referred to as a...
What is the size limit for FAT32 partitions at creation time within...
What must a user have in order to be added to an encrypted file's...
One of your co-workers, Jeremy, is trying to access a share on a...
This role service allows grouping shared folders from one or more file...
  With NTFS, compression can be enabled on a folder with...
If a file with the encryption attribute set is copied or moved within...
The HRdept group needs to have full access to a nested folder on a...
Where can you configure the Separator Page option on a printer? 
Alert!

Advertisement