SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
peer-to-peer
Full Control
You should run wbadmin
2. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
List Folder Contents
Full Control
Advanced
wbadmin start systemstaterecovery
3. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
Modify
List Folder Contents
rootkits
client-server
4. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
Distributed Cache and Hosted Cache
client-server
Write
System Image Recovery
5. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
clients
System Image Recovery
encrypting
wbadmin delete systemstatebackup
6. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
Full Control
administrators
removable flash drives
wbadmin start backup -backupTarget:L: -include:C: -quiet
7. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
clients
Write
Write
User files - System files - Program files
8. To restore a system state backup - run:
User files - System files - Program files
wbadmin start systemstaterecovery
Full Control
full control
9. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
system files
Full Control
Read
Data Recovery Agents (DRAs)
10. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
removable flash drives
Full Control
vssadmin create shadow /For=C:
administrators
11. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
Write
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
in use
DFS
12. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
Access-based Enumeration (ABE)
green
User files - System files - Program files
read access
13. To encrypt entire volumes and protect system files - use ______ Encryption.
Read
DFSDiag
wbadmin start backup -backupTarget:L: -allCritical -quiet
BitLocker Drive
14. To troubleshoot DFS - use the ______ command-line tool.
BitLocker Drive
dfsutil domain <domain_name>
Windows 7 or Windows Server 2008 R2
DFSDiag
15. To view the storage currently allocated to shadow copies - run the following command:
peer-to-peer
vssadmin list shadowstorage
Advanced
clients
16. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -allCritical -quiet
encryption certificates
User files - System files - Program files
peer-to-peer
17. BranchCache can operate in two modes: ______.
BranchCache
server running Win Srvr 2008 R2
BitLocker
Distributed Cache and Hosted Cache
18. With the ______ permissions - users can read - edit - and delete files and folders.
Modify
Write
wbadmin start backup -backupTarget:L: -include:C: -quiet
icacls
19. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
System Image Recovery
Write
Read & Execute
Access-based Enumeration (ABE)
20. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
vssadmin list shadows
system files
in use
wbadmin start backup -backupTarget:L: -include:C: -quiet
21. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
.vhd
peer-to-peer
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Distributed Cache and Hosted Cache
22. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
Windows 7 or Windows Server 2008 R2
encryption certificates
System Image Recovery
wbadmin start backup -backupTarget:L: -include:C: -quiet
23. BranchCache clients must be running ______ or ______.
wbadmin start backup -backupTarget:L: -include:C: -quiet
Read
Windows 7 or Windows Server 2008 R2
in use
24. To perform a backup of the system state - run:
wbadmin start systemstatebackup
System Image Recovery
read access
in its current state
25. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Write
administrators
BranchCache
File Classification Infrastructure
26. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
in its current state
Write
dfsutil domain <domain_name>
removable flash drives
27. To configure NTFS file permissions from a command prompt or script - use the ______ command.
icacls
Access-based Enumeration (ABE)
green
DFS
28. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
wbadmin start systemstaterecovery
File Classification Infrastructure
rootkits
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
29. To view available shadow copies and the time they were created - run the following command:
You should run wbadmin
vssadmin create shadow /For=C:
vssadmin list shadows
Windows 7 or Windows Server 2008 R2
30. With the ______ permissions - in addition to the Read permission - users can run applications.
encryption certificates
in its current state
wbadmin start systemstatebackup
Read & Execute
31. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
client-server
clients
wbadmin start backup -backupTarget:L: -allCritical -quiet
server running Win Srvr 2008 R2
32. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Enterprise and Ultimate
Access-based Enumeration (ABE)
Read & Execute
read
33. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
in use
Full Control
wbadmin delete systemstatebackup
administrators
34. To delete a system state backup - run:
wbadmin delete systemstatebackup
System Image Recovery
green
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
35. What command should you run to initiate a backup?
You should run wbadmin
administrators
BranchCache
vssadmin list shadowstorage
36. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
Access-based Enumeration (ABE)
peer-to-peer
full control
client-server
37. Shadow copies allow backup software to access files that are ______.
DFS
server running Win Srvr 2008 R2
read - but not write
in use
38. What command should you run to configure shadow copies?
clients
peer-to-peer
You should run vssadmin
vssadmin create shadow /For=C:
39. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
wbadmin delete systemstatebackup
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Write
Windows 7 or Windows Server 2008 R2
40. Administrators can assign users or groups any of the following permissions to a file or folder:
System Image Recovery
in its current state
server running Win Srvr 2008 R2
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
41. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
You should run vssadmin
read
system files
DFS
42. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
vssadmin list shadowstorage
List Folder Contents
.vhd
server running Win Srvr 2008 R2
43. With the ______ permissions - users can create files in a folder but not necessarily read them.
read
Write
User files - System files - Program files
vssadmin list shadows
44. EFS protects files and folders by ______ them on the disk.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
encrypting
BitLocker
Distributed Cache and Hosted Cache
45. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
full control
BitLocker
Full Control
dfsutil domain <domain_name>
46. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
read - but not write
server running Win Srvr 2008 R2
peer-to-peer
in use
47. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
Modify
client-server
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
BranchCache
48. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
server running Win Srvr 2008 R2
Enterprise and Ultimate
rootkits
DFS
49. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
vssadmin create shadow /For=C:
List Folder Contents
User files - System files - Program files
system files
50. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
wbadmin delete systemstatebackup
BitLocker
full control