SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To configure NTFS file permissions from a command prompt or script - use the ______ command.
peer-to-peer
icacls
User files - System files - Program files
administrators
2. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
wbadmin start backup -backupTarget:L: -include:C: -quiet
server running Win Srvr 2008 R2
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
wbadmin start backup -backupTarget:L: -allCritical -quiet
3. To delete a system state backup - run:
Read
in use
clients
wbadmin delete systemstatebackup
4. With the ______ permissions - in addition to the Read permission - users can run applications.
Read & Execute
system files
Enterprise and Ultimate
DFS
5. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
full control
in use
Distributed Cache and Hosted Cache
User files - System files - Program files
6. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
DFS
green
Full Control
wbadmin start backup -backupTarget:L: -include:C: -quiet
7. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
clients
You should run wbadmin
DFS
.vhd
8. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
Read & Execute
Read
dfsutil domain <domain_name>
BitLocker
9. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
BitLocker
File Classification Infrastructure
Data Recovery Agents (DRAs)
in its current state
10. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
rootkits
Read
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
You should run wbadmin
11. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
read
DFSDiag
File Classification Infrastructure
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
12. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
in use
Write
peer-to-peer
removable flash drives
13. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
wbadmin start backup -backupTarget:L: -include:C: -quiet
full control
read - but not write
Read
14. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
in its current state
Distributed Cache and Hosted Cache
wbadmin start backup -backupTarget:L: -allCritical -quiet
System Image Recovery
15. To troubleshoot DFS - use the ______ command-line tool.
Read & Execute
DFSDiag
Access-based Enumeration (ABE)
User files - System files - Program files
16. To encrypt entire volumes and protect system files - use ______ Encryption.
Modify
administrators
Read
BitLocker Drive
17. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
read
BitLocker Drive
dfsutil domain <domain_name>
List Folder Contents
18. What command should you run to initiate a backup?
dfsutil domain <domain_name>
You should run wbadmin
BitLocker Drive
vssadmin create shadow /For=C:
19. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
encrypting
Distributed Cache and Hosted Cache
wbadmin start backup -backupTarget:L: -include:C: -quiet
green
20. EFS protects files and folders by ______ them on the disk.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Enterprise and Ultimate
encrypting
21. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
DFS
read - but not write
Data Recovery Agents (DRAs)
List Folder Contents
22. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
Full Control
in its current state
.vhd
Data Recovery Agents (DRAs)
23. With the ______ permissions - users can create files in a folder but not necessarily read them.
You should run vssadmin
Access-based Enumeration (ABE)
Write
icacls
24. Administrators can assign users or groups any of the following permissions to a file or folder:
read - but not write
Distributed Cache and Hosted Cache
read
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
25. To perform a backup of the system state - run:
List Folder Contents
Full Control
wbadmin start systemstatebackup
vssadmin list shadows
26. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
System Image Recovery
Data Recovery Agents (DRAs)
green
encryption certificates
27. What command should you run to configure shadow copies?
read - but not write
You should run vssadmin
User files - System files - Program files
icacls
28. Run the following command to back up all critical files to the L drive
icacls
DFSDiag
wbadmin start backup -backupTarget:L: -allCritical -quiet
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
29. To create a hard limit of 100 MB - run the following command:
List Folder Contents
DFS
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
dfsutil domain <domain_name>
30. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
Write
DFS
User files - System files - Program files
green
31. To view available shadow copies and the time they were created - run the following command:
Read & Execute
vssadmin list shadows
in its current state
.vhd
32. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
Advanced
peer-to-peer
administrators
full control
33. With the ______ permissions - users can view the contents of a folder and open files.
removable flash drives
full control
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Read
34. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Enterprise and Ultimate
in its current state
Access-based Enumeration (ABE)
35. Shadow copies allow backup software to access files that are ______.
Advanced
wbadmin delete systemstatebackup
in use
removable flash drives
36. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
icacls
vssadmin list shadows
System Image Recovery
BitLocker
37. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
system files
vssadmin list shadowstorage
System Image Recovery
Full Control
38. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
File Classification Infrastructure
green
wbadmin start backup -backupTarget:L: -include:C: -quiet
in its current state
39. To view the storage currently allocated to shadow copies - run the following command:
wbadmin start systemstaterecovery
vssadmin list shadowstorage
icacls
Write
40. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
vssadmin create shadow /For=C:
removable flash drives
read access
41. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
wbadmin delete systemstatebackup
server running Win Srvr 2008 R2
green
vssadmin create shadow /For=C:
42. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
Full Control
client-server
DFSDiag
Advanced
43. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
system files
Access-based Enumeration (ABE)
vssadmin list shadowstorage
44. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
icacls
full control
Enterprise and Ultimate
BranchCache
45. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
encryption certificates
You should run vssadmin
Advanced
read access
46. With the ______ permissions - users can read - edit - and delete files and folders.
Modify
vssadmin list shadowstorage
client-server
full control
47. BranchCache clients must be running ______ or ______.
in use
Windows 7 or Windows Server 2008 R2
full control
Write
48. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
You should run vssadmin
Write
client-server
system files
49. To restore a system state backup - run:
Full Control
BitLocker Drive
wbadmin start systemstaterecovery
Windows 7 or Windows Server 2008 R2
50. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Write
BitLocker
vssadmin create shadow /For=C:
wbadmin start backup -backupTarget:L: -allCritical -quiet