SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. With the ______ permissions - in addition to the Read permission - users can run applications.
Read & Execute
system files
Advanced
Read
2. To restore a system state backup - run:
wbadmin start backup -backupTarget:L: -allCritical -quiet
You should run wbadmin
wbadmin start systemstaterecovery
server running Win Srvr 2008 R2
3. To view available shadow copies and the time they were created - run the following command:
Enterprise and Ultimate
vssadmin list shadows
Data Recovery Agents (DRAs)
BitLocker
4. To perform a backup of the system state - run:
rootkits
wbadmin start systemstatebackup
vssadmin list shadowstorage
List Folder Contents
5. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Distributed Cache and Hosted Cache
wbadmin delete systemstatebackup
vssadmin create shadow /For=C:
Write
6. To create a hard limit of 100 MB - run the following command:
server running Win Srvr 2008 R2
Modify
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
You should run wbadmin
7. With the ______ permissions - users can read - edit - and delete files and folders.
Read & Execute
Modify
wbadmin start systemstaterecovery
full control
8. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -allCritical -quiet
read access
wbadmin start systemstatebackup
rootkits
9. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
clients
BitLocker Drive
vssadmin create shadow /For=C:
removable flash drives
10. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
in its current state
read
rootkits
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
11. To view the storage currently allocated to shadow copies - run the following command:
vssadmin list shadowstorage
icacls
Access-based Enumeration (ABE)
Read
12. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
icacls
.vhd
full control
wbadmin start backup -backupTarget:L: -include:C: -quiet
13. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
Full Control
peer-to-peer
User files - System files - Program files
read access
14. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
Data Recovery Agents (DRAs)
administrators
DFSDiag
.vhd
15. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
in its current state
wbadmin start backup -backupTarget:L: -allCritical -quiet
read access
16. Shadow copies allow backup software to access files that are ______.
in use
wbadmin start backup -backupTarget:L: -include:C: -quiet
BranchCache
Read & Execute
17. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
vssadmin create shadow /For=C:
User files - System files - Program files
full control
icacls
18. BranchCache can operate in two modes: ______.
Distributed Cache and Hosted Cache
File Classification Infrastructure
vssadmin list shadows
dfsutil domain <domain_name>
19. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
DFS
Write
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
full control
20. BranchCache clients must be running ______ or ______.
Windows 7 or Windows Server 2008 R2
read - but not write
vssadmin create shadow /For=C:
administrators
21. To encrypt entire volumes and protect system files - use ______ Encryption.
in its current state
vssadmin create shadow /For=C:
BitLocker Drive
green
22. With the ______ permissions - users can create files in a folder but not necessarily read them.
.vhd
Distributed Cache and Hosted Cache
Write
Enterprise and Ultimate
23. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
in use
vssadmin list shadowstorage
Read
24. What command should you run to configure shadow copies?
dfsutil domain <domain_name>
You should run vssadmin
server running Win Srvr 2008 R2
Write
25. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Distributed Cache and Hosted Cache
Enterprise and Ultimate
Advanced
List Folder Contents
26. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
File Classification Infrastructure
DFS
wbadmin start systemstatebackup
Advanced
27. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
rootkits
BitLocker
DFS
Read
28. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
BranchCache
Advanced
wbadmin delete systemstatebackup
clients
29. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
BitLocker
system files
read
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
30. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
File Classification Infrastructure
green
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Windows 7 or Windows Server 2008 R2
31. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
Enterprise and Ultimate
peer-to-peer
vssadmin create shadow /For=C:
You should run vssadmin
32. What command should you run to initiate a backup?
You should run wbadmin
BranchCache
peer-to-peer
Data Recovery Agents (DRAs)
33. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
removable flash drives
Read
read access
You should run vssadmin
34. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
server running Win Srvr 2008 R2
DFS
removable flash drives
Access-based Enumeration (ABE)
35. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
Full Control
You should run wbadmin
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
System Image Recovery
36. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
server running Win Srvr 2008 R2
administrators
clients
rootkits
37. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
wbadmin delete systemstatebackup
read - but not write
peer-to-peer
User files - System files - Program files
38. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
server running Win Srvr 2008 R2
read access
Data Recovery Agents (DRAs)
You should run wbadmin
39. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
dfsutil domain <domain_name>
encryption certificates
read
in its current state
40. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
Windows 7 or Windows Server 2008 R2
User files - System files - Program files
wbadmin delete systemstatebackup
DFS
41. Administrators can assign users or groups any of the following permissions to a file or folder:
administrators
Distributed Cache and Hosted Cache
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
encryption certificates
42. To troubleshoot DFS - use the ______ command-line tool.
wbadmin start backup -backupTarget:L: -allCritical -quiet
read access
clients
DFSDiag
43. To configure NTFS file permissions from a command prompt or script - use the ______ command.
Full Control
read access
icacls
system files
44. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
dfsutil domain <domain_name>
full control
administrators
green
45. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
vssadmin list shadowstorage
read
.vhd
icacls
46. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
Write
client-server
wbadmin start systemstaterecovery
User files - System files - Program files
47. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
wbadmin start backup -backupTarget:L: -allCritical -quiet
in its current state
.vhd
rootkits
48. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
client-server
vssadmin list shadows
wbadmin start backup -backupTarget:L: -include:C: -quiet
green
49. With the ______ permissions - users can view the contents of a folder and open files.
Read
File Classification Infrastructure
Distributed Cache and Hosted Cache
client-server
50. To delete a system state backup - run:
BitLocker
vssadmin list shadows
administrators
wbadmin delete systemstatebackup