SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. With the ______ permissions - users can read - edit - and delete files and folders.
Windows 7 or Windows Server 2008 R2
Modify
Write
.vhd
2. What command should you run to initiate a backup?
Access-based Enumeration (ABE)
You should run wbadmin
read - but not write
wbadmin delete systemstatebackup
3. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
full control
User files - System files - Program files
client-server
in its current state
4. BranchCache can operate in two modes: ______.
in its current state
read
Distributed Cache and Hosted Cache
You should run vssadmin
5. To perform a backup of the system state - run:
wbadmin start systemstatebackup
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
You should run wbadmin
in use
6. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
Write
.vhd
icacls
wbadmin start backup -backupTarget:L: -include:C: -quiet
7. EFS protects files and folders by ______ them on the disk.
Read & Execute
server running Win Srvr 2008 R2
read
encrypting
8. What command should you run to configure shadow copies?
Modify
You should run vssadmin
Windows 7 or Windows Server 2008 R2
BranchCache
9. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
You should run vssadmin
Windows 7 or Windows Server 2008 R2
read access
removable flash drives
10. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
BranchCache
vssadmin create shadow /For=C:
DFSDiag
List Folder Contents
11. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
vssadmin list shadowstorage
removable flash drives
full control
dfsutil domain <domain_name>
12. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
icacls
rootkits
File Classification Infrastructure
client-server
13. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
read
File Classification Infrastructure
vssadmin list shadows
User files - System files - Program files
14. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
You should run vssadmin
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Advanced
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
15. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
clients
DFS
full control
wbadmin start backup -backupTarget:L: -include:C: -quiet
16. To view the storage currently allocated to shadow copies - run the following command:
DFS
vssadmin list shadowstorage
rootkits
in its current state
17. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
encryption certificates
in its current state
system files
wbadmin delete systemstatebackup
18. To configure NTFS file permissions from a command prompt or script - use the ______ command.
wbadmin delete systemstatebackup
BranchCache
icacls
User files - System files - Program files
19. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
Write
in its current state
File Classification Infrastructure
read
20. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
Read
wbadmin start systemstatebackup
wbadmin delete systemstatebackup
read - but not write
21. With the ______ permissions - users can view the contents of a folder and open files.
Read
Data Recovery Agents (DRAs)
vssadmin list shadows
icacls
22. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
Full Control
green
Data Recovery Agents (DRAs)
.vhd
23. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
BranchCache
Write
You should run vssadmin
wbadmin start systemstaterecovery
24. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
System Image Recovery
Modify
encrypting
25. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
in use
.vhd
system files
DFS
26. Administrators can assign users or groups any of the following permissions to a file or folder:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
full control
removable flash drives
wbadmin start systemstatebackup
27. To encrypt entire volumes and protect system files - use ______ Encryption.
You should run vssadmin
BitLocker Drive
Read & Execute
dfsutil domain <domain_name>
28. With the ______ permissions - users can create files in a folder but not necessarily read them.
wbadmin start backup -backupTarget:L: -allCritical -quiet
Write
System Image Recovery
read - but not write
29. To create a hard limit of 100 MB - run the following command:
BitLocker Drive
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Access-based Enumeration (ABE)
icacls
30. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
wbadmin start backup -backupTarget:L: -allCritical -quiet
List Folder Contents
rootkits
in its current state
31. To delete a system state backup - run:
wbadmin delete systemstatebackup
System Image Recovery
wbadmin start systemstatebackup
read
32. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
System Image Recovery
green
BranchCache
full control
33. To restore a system state backup - run:
wbadmin start systemstaterecovery
File Classification Infrastructure
server running Win Srvr 2008 R2
dfsutil domain <domain_name>
34. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
Enterprise and Ultimate
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
removable flash drives
system files
35. To troubleshoot DFS - use the ______ command-line tool.
Modify
BranchCache
DFSDiag
.vhd
36. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
wbadmin start backup -backupTarget:L: -allCritical -quiet
Access-based Enumeration (ABE)
Windows 7 or Windows Server 2008 R2
read - but not write
37. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
File Classification Infrastructure
Advanced
BitLocker Drive
clients
38. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
encryption certificates
administrators
DFS
dfsutil domain <domain_name>
39. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
List Folder Contents
Enterprise and Ultimate
System Image Recovery
User files - System files - Program files
40. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
in use
full control
Enterprise and Ultimate
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
41. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
Enterprise and Ultimate
peer-to-peer
server running Win Srvr 2008 R2
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
42. Shadow copies allow backup software to access files that are ______.
in use
Enterprise and Ultimate
User files - System files - Program files
vssadmin create shadow /For=C:
43. To view available shadow copies and the time they were created - run the following command:
File Classification Infrastructure
in use
vssadmin list shadows
.vhd
44. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
administrators
You should run wbadmin
DFSDiag
dfsutil domain <domain_name>
45. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
File Classification Infrastructure
List Folder Contents
rootkits
encryption certificates
46. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
BitLocker
BranchCache
You should run vssadmin
DFSDiag
47. With the ______ permissions - in addition to the Read permission - users can run applications.
.vhd
Read & Execute
green
Windows 7 or Windows Server 2008 R2
48. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
administrators
in its current state
You should run vssadmin
dfsutil domain <domain_name>
49. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
removable flash drives
Read
Data Recovery Agents (DRAs)
Advanced
50. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
rootkits
read access
removable flash drives
wbadmin start systemstaterecovery