Windows 7 Enterprise Help Desk 4 Part.2

170 Questions | Total Attempts: 375

SettingsSettingsSettings
Windows 7 Enterprise Help Desk 4 Part.2 - Quiz

Enterprise is a version of Windows 7 that is only available to businesses through volume licensing. It consists of all the features of Windows 7 Professional, as well as more features to enhance security and network.


Questions and Answers
  • 1. 
    When files and folders are created on an NTFS volume, a security descriptor known as and is created, what is this object?
    • A. 

      ACL

    • B. 

      ACE

    • C. 

      NTFS permission

    • D. 

      UAC

  • 2. 
    NTFS permissions allow you to control which __________ and ________ can gain access to files and folders on an NTFS volume.
  • 3. 
    Groups or users granted Full Control permission on a folder can delete any files in that folder regardless of the permissions protecting the file.
    • A. 

      True

    • B. 

      False

  • 4. 
    What are two types of permissions used in NTFS?
    • A. 

      Explicit permission:

    • B. 

      Users permission:

    • C. 

      Inherited permission:

    • D. 

      Domain permission:

  • 5. 
    When you copy a folder or file, the new folder or file will automatically acquire the permissions of the drive or folder that the folder or file is being copied to.
    • A. 

      True

    • B. 

      False

  • 6. 
    When you move a folder or file within the same volume, the folder or file will retain the same permissions that were originally assigned to it.
    • A. 

      True

    • B. 

      False

  • 7. 
    When you move a folder or file from one volume to another volume, the folder or file will automatically acquire the permissions of the drive or folder that the folder or file is being copied to.
    • A. 

      True

    • B. 

      False

  • 8. 
    The owner of the object controls how permissions are set on the object and to whom permissions are granted.
    • A. 

      True

    • B. 

      False

  • 9. 
    All administrators automatically have the Take Ownership permission of all NTFS objects.
    • A. 

      True

    • B. 

      False

  • 10. 
    In Windows 7, there are four types of file sharing: what are they?
    • A. 

      Homegroup

    • B. 

      Public

    • C. 

      Standard

    • D. 

      Advanced

    • E. 

      User

    • F. 

      Domain

  • 11. 
    System Protection is a feature that regularly creates and saves information about your computer’s system files and settings.
    • A. 

      True

    • B. 

      False

  • 12. 
    System Protection uses restore points, which are created just before significant system events, such as the installation of a program or device driver.
    • A. 

      True

    • B. 

      False

  • 13. 
    What other feature is included with System Protection?
    • A. 

      System Restore

    • B. 

      System Backup

    • C. 

      System Config

    • D. 

      System Date Stamp

  • 14. 
    What does System Restore create when it is used on a regular basis?
    • A. 

      Restore Point

    • B. 

      Restore Mark

    • C. 

      Disk Restore

    • D. 

      Disk Marker

  • 15. 
    As mentioned earlier, security can be divided into three areas. Authentication is used to prove the identify of a user. Authorization gives access to the user that was authenticated. To complete the security picture, you need to enable ___________ so that you can have a record of the users who have logged in and what the user accessed or tried to access. 
  • 16. 
    Auditing is not enabled by default.
    • A. 

      True

    • B. 

      False

  • 17. 
    Inherited permissions are permissions that are granted to a folder (parent object or container) that flow into that folder’s child objects (subfolders or files inside the parent folder).
    • A. 

      True

    • B. 

      False

  • 18. 
    What type of printer when one of the basic network services is network printing, where multiple users can share the same printer?
    • A. 

      Shared Printer

    • B. 

      Shared Object

    • C. 

      Shared User

    • D. 

      Shared Resource

  • 19. 
    When a printer is requested, where does the print job sent to, for completion?
    • A. 

      Spooler

    • B. 

      Memory

    • C. 

      HDD

    • D. 

      CPU

  • 20. 
    What file format used by the Windows operating system, when a document has been set to the spooler for printing?.
    • A. 

      EMF - Enhanced Metafile

    • B. 

      IMF - Inbound Metafile

    • C. 

      FMF - Forward Metafile

    • D. 

      PMF - Print Metafile

  • 21. 
    If you have a high volume of print jobs, the printer can become congested, and users will have to wait for their documents to print.
    • A. 

      True

    • B. 

      False

  • 22. 
    You can create a group of printers called a printer pool to act as a single virtual printer with a single print queue.
    • A. 

      True

    • B. 

      False

  • 23. 
    What are the two objects needed to create a printer pool?
    • A. 

      Same model of printer

    • B. 

      2 different printing models

    • C. 

      Same printer drivers

    • D. 

      Different printer drivers

  • 24. 
    Windows 7 provides three levels of printer permissions: they are?
    • A. 

      Print

    • B. 

      Driver Manager

    • C. 

      Manage Printers

    • D. 

      Manage Documents

  • 25. 
    One advantage of using logical printers that point to a physical printer/printer device is that you can use multiple logical printers that point to a single physical printer.
    • A. 

      True

    • B. 

      False

Back to Top Back to top