SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
BranchCache
List Folder Contents
Enterprise and Ultimate
removable flash drives
2. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
read
File Classification Infrastructure
read - but not write
3. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
encryption certificates
Full Control
encrypting
in use
4. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
.vhd
Read
BitLocker
dfsutil domain <domain_name>
5. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
List Folder Contents
in its current state
vssadmin create shadow /For=C:
User files - System files - Program files
6. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
full control
DFS
wbadmin start backup -backupTarget:L: -include:C: -quiet
vssadmin create shadow /For=C:
7. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
server running Win Srvr 2008 R2
clients
User files - System files - Program files
Write
8. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
encrypting
in its current state
DFS
client-server
9. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
encryption certificates
Read
User files - System files - Program files
Data Recovery Agents (DRAs)
10. To view the storage currently allocated to shadow copies - run the following command:
encrypting
administrators
full control
vssadmin list shadowstorage
11. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
peer-to-peer
List Folder Contents
DFSDiag
wbadmin start systemstaterecovery
12. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
File Classification Infrastructure
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
wbadmin start backup -backupTarget:L: -include:C: -quiet
You should run vssadmin
13. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
BranchCache
Write
encrypting
DFS
14. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
dfsutil domain <domain_name>
Access-based Enumeration (ABE)
Read
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
15. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
vssadmin list shadows
read
Access-based Enumeration (ABE)
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
16. EFS protects files and folders by ______ them on the disk.
vssadmin create shadow /For=C:
in use
dfsutil domain <domain_name>
encrypting
17. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
peer-to-peer
vssadmin list shadowstorage
List Folder Contents
File Classification Infrastructure
18. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
Advanced
System Image Recovery
in its current state
read - but not write
19. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Windows 7 or Windows Server 2008 R2
removable flash drives
wbadmin start backup -backupTarget:L: -include:C: -quiet
File Classification Infrastructure
20. With the ______ permissions - users can view the contents of a folder and open files.
Read
dfsutil domain <domain_name>
BitLocker Drive
vssadmin list shadowstorage
21. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
You should run wbadmin
Distributed Cache and Hosted Cache
Read & Execute
Write
22. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
wbadmin start backup -backupTarget:L: -allCritical -quiet
icacls
encrypting
Full Control
23. To view available shadow copies and the time they were created - run the following command:
wbadmin start systemstaterecovery
vssadmin list shadows
You should run vssadmin
system files
24. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
system files
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
read
DFS
25. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
Read
rootkits
vssadmin list shadows
icacls
26. With the ______ permissions - users can create files in a folder but not necessarily read them.
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Write
File Classification Infrastructure
vssadmin list shadows
27. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
encrypting
System Image Recovery
BitLocker
wbadmin delete systemstatebackup
28. To create a hard limit of 100 MB - run the following command:
System Image Recovery
encrypting
read
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
29. What command should you run to initiate a backup?
You should run wbadmin
Read & Execute
Access-based Enumeration (ABE)
Windows 7 or Windows Server 2008 R2
30. Shadow copies allow backup software to access files that are ______.
wbadmin start backup -backupTarget:L: -allCritical -quiet
in use
wbadmin start systemstatebackup
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
31. With the ______ permissions - users can read - edit - and delete files and folders.
.vhd
Modify
You should run vssadmin
in its current state
32. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
in use
clients
.vhd
read
33. To troubleshoot DFS - use the ______ command-line tool.
read access
DFSDiag
Write
icacls
34. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
DFSDiag
.vhd
vssadmin create shadow /For=C:
BitLocker Drive
35. Administrators can assign users or groups any of the following permissions to a file or folder:
Write
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
read - but not write
Modify
36. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
green
encrypting
full control
User files - System files - Program files
37. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
vssadmin list shadows
read
Distributed Cache and Hosted Cache
removable flash drives
38. BranchCache can operate in two modes: ______.
Data Recovery Agents (DRAs)
Distributed Cache and Hosted Cache
vssadmin create shadow /For=C:
You should run vssadmin
39. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
File Classification Infrastructure
green
clients
administrators
40. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
in its current state
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
vssadmin create shadow /For=C:
List Folder Contents
41. To encrypt entire volumes and protect system files - use ______ Encryption.
Windows 7 or Windows Server 2008 R2
BitLocker Drive
encrypting
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
42. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
User files - System files - Program files
clients
Write
wbadmin delete systemstatebackup
43. What command should you run to configure shadow copies?
wbadmin start systemstatebackup
You should run vssadmin
Access-based Enumeration (ABE)
read - but not write
44. With the ______ permissions - in addition to the Read permission - users can run applications.
Read & Execute
administrators
You should run vssadmin
Write
45. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -allCritical -quiet
Read
You should run wbadmin
in its current state
46. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
BranchCache
vssadmin create shadow /For=C:
in use
wbadmin start systemstaterecovery
47. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
List Folder Contents
BitLocker
in its current state
server running Win Srvr 2008 R2
48. To perform a backup of the system state - run:
read
wbadmin start systemstatebackup
wbadmin delete systemstatebackup
DFSDiag
49. To delete a system state backup - run:
wbadmin delete systemstatebackup
read - but not write
wbadmin start systemstaterecovery
removable flash drives
50. To restore a system state backup - run:
vssadmin list shadowstorage
removable flash drives
wbadmin start systemstaterecovery
Write