SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. BranchCache clients must be running ______ or ______.
wbadmin start systemstatebackup
DFS
in use
Windows 7 or Windows Server 2008 R2
2. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
wbadmin start backup -backupTarget:L: -allCritical -quiet
BranchCache
server running Win Srvr 2008 R2
administrators
3. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
DFSDiag
in its current state
green
.vhd
4. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
BitLocker Drive
vssadmin list shadows
vssadmin create shadow /For=C:
full control
5. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Advanced
wbadmin start systemstatebackup
Data Recovery Agents (DRAs)
removable flash drives
6. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Windows 7 or Windows Server 2008 R2
You should run vssadmin
File Classification Infrastructure
Advanced
7. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
wbadmin delete systemstatebackup
Modify
system files
List Folder Contents
8. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
Write
List Folder Contents
wbadmin start backup -backupTarget:L: -include:C: -quiet
Data Recovery Agents (DRAs)
9. To delete a system state backup - run:
wbadmin delete systemstatebackup
User files - System files - Program files
DFS
in use
10. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
removable flash drives
client-server
List Folder Contents
in its current state
11. To perform a backup of the system state - run:
wbadmin start backup -backupTarget:L: -include:C: -quiet
wbadmin start systemstatebackup
Distributed Cache and Hosted Cache
Read & Execute
12. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Write
Full Control
encrypting
Read
13. What command should you run to configure shadow copies?
You should run wbadmin
File Classification Infrastructure
You should run vssadmin
List Folder Contents
14. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
Distributed Cache and Hosted Cache
in use
Advanced
DFS
15. To configure NTFS file permissions from a command prompt or script - use the ______ command.
Full Control
icacls
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Enterprise and Ultimate
16. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
client-server
Full Control
rootkits
You should run wbadmin
17. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
dfsutil domain <domain_name>
clients
in its current state
System Image Recovery
18. EFS protects files and folders by ______ them on the disk.
BranchCache
encrypting
Write
clients
19. BranchCache can operate in two modes: ______.
DFSDiag
Distributed Cache and Hosted Cache
vssadmin list shadows
clients
20. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
BitLocker
dfsutil domain <domain_name>
administrators
green
21. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
in use
vssadmin list shadowstorage
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
wbadmin start systemstaterecovery
22. Shadow copies allow backup software to access files that are ______.
in use
Distributed Cache and Hosted Cache
List Folder Contents
Enterprise and Ultimate
23. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
clients
You should run vssadmin
encrypting
Access-based Enumeration (ABE)
24. With the ______ permissions - users can view the contents of a folder and open files.
Enterprise and Ultimate
Read
vssadmin create shadow /For=C:
wbadmin start systemstatebackup
25. To encrypt entire volumes and protect system files - use ______ Encryption.
BitLocker Drive
clients
read access
.vhd
26. Administrators can assign users or groups any of the following permissions to a file or folder:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
DFS
system files
dfsutil domain <domain_name>
27. With the ______ permissions - users can read - edit - and delete files and folders.
Modify
System Image Recovery
Read & Execute
DFS
28. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
You should run wbadmin
read
Read
encryption certificates
29. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
Write
Write
server running Win Srvr 2008 R2
BitLocker
30. What command should you run to initiate a backup?
Advanced
You should run wbadmin
wbadmin delete systemstatebackup
system files
31. To create a hard limit of 100 MB - run the following command:
wbadmin start backup -backupTarget:L: -allCritical -quiet
clients
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Windows 7 or Windows Server 2008 R2
32. To restore a system state backup - run:
vssadmin create shadow /For=C:
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
wbadmin start systemstaterecovery
administrators
33. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
full control
wbadmin start backup -backupTarget:L: -allCritical -quiet
wbadmin start systemstatebackup
34. With the ______ permissions - in addition to the Read permission - users can run applications.
clients
Read & Execute
client-server
System Image Recovery
35. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
wbadmin start backup -backupTarget:L: -include:C: -quiet
Write
vssadmin list shadows
BranchCache
36. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
peer-to-peer
DFS
User files - System files - Program files
rootkits
37. With the ______ permissions - users can create files in a folder but not necessarily read them.
vssadmin list shadowstorage
encrypting
Write
in use
38. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
clients
encryption certificates
read access
administrators
39. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
client-server
wbadmin delete systemstatebackup
User files - System files - Program files
read - but not write
40. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
BranchCache
read - but not write
File Classification Infrastructure
system files
41. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
Enterprise and Ultimate
System Image Recovery
wbadmin start systemstatebackup
Write
42. To troubleshoot DFS - use the ______ command-line tool.
vssadmin create shadow /For=C:
clients
File Classification Infrastructure
DFSDiag
43. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -allCritical -quiet
BitLocker Drive
User files - System files - Program files
client-server
44. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
wbadmin start backup -backupTarget:L: -allCritical -quiet
administrators
clients
Read
45. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Enterprise and Ultimate
icacls
peer-to-peer
encrypting
46. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
peer-to-peer
administrators
List Folder Contents
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
47. To view the storage currently allocated to shadow copies - run the following command:
vssadmin list shadowstorage
Read & Execute
encrypting
.vhd
48. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
in its current state
Modify
wbadmin delete systemstatebackup
BranchCache
49. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
Windows 7 or Windows Server 2008 R2
read
You should run vssadmin
.vhd
50. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
List Folder Contents
client-server
BranchCache
wbadmin delete systemstatebackup