SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
Read
vssadmin list shadows
BitLocker
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
2. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
Data Recovery Agents (DRAs)
in its current state
administrators
peer-to-peer
3. To create a hard limit of 100 MB - run the following command:
Write
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
green
Access-based Enumeration (ABE)
4. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
removable flash drives
administrators
Advanced
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
5. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
Modify
wbadmin delete systemstatebackup
BranchCache
green
6. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
BitLocker Drive
read - but not write
read
DFS
7. BranchCache can operate in two modes: ______.
Write
read - but not write
system files
Distributed Cache and Hosted Cache
8. Shadow copies allow backup software to access files that are ______.
wbadmin start systemstatebackup
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
in use
9. To view the storage currently allocated to shadow copies - run the following command:
vssadmin list shadowstorage
vssadmin list shadows
in its current state
wbadmin start backup -backupTarget:L: -allCritical -quiet
10. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
Advanced
wbadmin start systemstaterecovery
DFS
green
11. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
full control
List Folder Contents
DFS
client-server
12. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
vssadmin create shadow /For=C:
read - but not write
client-server
encrypting
13. To view available shadow copies and the time they were created - run the following command:
icacls
rootkits
vssadmin list shadows
Enterprise and Ultimate
14. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
Modify
server running Win Srvr 2008 R2
Access-based Enumeration (ABE)
Distributed Cache and Hosted Cache
15. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
List Folder Contents
Advanced
BranchCache
removable flash drives
16. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
rootkits
DFSDiag
wbadmin start backup -backupTarget:L: -include:C: -quiet
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
17. With the ______ permissions - in addition to the Read permission - users can run applications.
BitLocker Drive
System Image Recovery
in use
Read & Execute
18. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
File Classification Infrastructure
server running Win Srvr 2008 R2
rootkits
in its current state
19. What command should you run to initiate a backup?
in use
Access-based Enumeration (ABE)
rootkits
You should run wbadmin
20. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
clients
read - but not write
You should run wbadmin
in use
21. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
Advanced
Windows 7 or Windows Server 2008 R2
server running Win Srvr 2008 R2
Access-based Enumeration (ABE)
22. To troubleshoot DFS - use the ______ command-line tool.
read
User files - System files - Program files
Read
DFSDiag
23. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
in use
vssadmin list shadowstorage
wbadmin start backup -backupTarget:L: -include:C: -quiet
List Folder Contents
24. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
system files
administrators
read access
25. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
wbadmin start systemstatebackup
system files
.vhd
peer-to-peer
26. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
Write
client-server
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Distributed Cache and Hosted Cache
27. With the ______ permissions - users can view the contents of a folder and open files.
Read
icacls
removable flash drives
.vhd
28. To restore a system state backup - run:
read access
wbadmin start systemstaterecovery
clients
Write
29. BranchCache clients must be running ______ or ______.
Windows 7 or Windows Server 2008 R2
Read
User files - System files - Program files
vssadmin create shadow /For=C:
30. With the ______ permissions - users can read - edit - and delete files and folders.
vssadmin list shadowstorage
Modify
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
clients
31. Administrators can assign users or groups any of the following permissions to a file or folder:
in its current state
Advanced
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
icacls
32. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
wbadmin start systemstaterecovery
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
User files - System files - Program files
wbadmin start systemstatebackup
33. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
read - but not write
read
green
vssadmin create shadow /For=C:
34. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
wbadmin start systemstaterecovery
You should run vssadmin
read
system files
35. With the ______ permissions - users can create files in a folder but not necessarily read them.
Write
wbadmin start systemstatebackup
Windows 7 or Windows Server 2008 R2
Modify
36. Run the following command to back up all critical files to the L drive
read
Distributed Cache and Hosted Cache
wbadmin start backup -backupTarget:L: -allCritical -quiet
Read
37. To encrypt entire volumes and protect system files - use ______ Encryption.
rootkits
read access
Windows 7 or Windows Server 2008 R2
BitLocker Drive
38. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
File Classification Infrastructure
Modify
client-server
Write
39. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
wbadmin start systemstaterecovery
vssadmin list shadows
DFS
Full Control
40. What command should you run to configure shadow copies?
You should run vssadmin
BitLocker
Data Recovery Agents (DRAs)
in its current state
41. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
You should run vssadmin
system files
administrators
peer-to-peer
42. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
vssadmin list shadows
read access
wbadmin start systemstaterecovery
BranchCache
43. EFS protects files and folders by ______ them on the disk.
vssadmin create shadow /For=C:
read - but not write
encrypting
BranchCache
44. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
vssadmin list shadows
Read
wbadmin start backup -backupTarget:L: -include:C: -quiet
DFS
45. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
encrypting
Advanced
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Data Recovery Agents (DRAs)
46. To delete a system state backup - run:
wbadmin delete systemstatebackup
read - but not write
system files
administrators
47. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
BitLocker
wbadmin start backup -backupTarget:L: -include:C: -quiet
Advanced
in its current state
48. To perform a backup of the system state - run:
rootkits
BranchCache
wbadmin start systemstatebackup
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
49. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Enterprise and Ultimate
BitLocker
Distributed Cache and Hosted Cache
BitLocker Drive
50. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
DFSDiag
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
encryption certificates
peer-to-peer