SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
vssadmin list shadows
vssadmin create shadow /For=C:
in its current state
DFS
2. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
icacls
Access-based Enumeration (ABE)
BitLocker
BitLocker Drive
3. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
read access
read - but not write
Access-based Enumeration (ABE)
Data Recovery Agents (DRAs)
4. With the ______ permissions - users can create files in a folder but not necessarily read them.
wbadmin start backup -backupTarget:L: -include:C: -quiet
User files - System files - Program files
Write
read access
5. With the ______ permissions - users can read - edit - and delete files and folders.
peer-to-peer
vssadmin list shadows
Modify
BitLocker Drive
6. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
wbadmin start systemstatebackup
peer-to-peer
wbadmin delete systemstatebackup
File Classification Infrastructure
7. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
wbadmin start systemstatebackup
Data Recovery Agents (DRAs)
full control
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
8. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
You should run wbadmin
vssadmin list shadows
encryption certificates
9. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
system files
read access
BranchCache
encryption certificates
10. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
wbadmin start backup -backupTarget:L: -include:C: -quiet
in use
dfsutil domain <domain_name>
File Classification Infrastructure
11. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
administrators
Write
Data Recovery Agents (DRAs)
in its current state
12. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
in its current state
Read & Execute
icacls
system files
13. What command should you run to configure shadow copies?
File Classification Infrastructure
full control
BitLocker Drive
You should run vssadmin
14. To restore a system state backup - run:
dfsutil domain <domain_name>
Access-based Enumeration (ABE)
encrypting
wbadmin start systemstaterecovery
15. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
read - but not write
client-server
vssadmin list shadowstorage
rootkits
16. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
encryption certificates
Full Control
clients
Windows 7 or Windows Server 2008 R2
17. BranchCache can operate in two modes: ______.
Distributed Cache and Hosted Cache
Write
wbadmin delete systemstatebackup
Read
18. To view the storage currently allocated to shadow copies - run the following command:
You should run wbadmin
vssadmin list shadowstorage
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
19. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
BranchCache
in use
clients
vssadmin create shadow /For=C:
20. With the ______ permissions - users can view the contents of a folder and open files.
Read
BitLocker
Access-based Enumeration (ABE)
full control
21. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
Advanced
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Full Control
Modify
22. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
System Image Recovery
full control
client-server
BitLocker
23. With the ______ permissions - in addition to the Read permission - users can run applications.
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Write
You should run wbadmin
Read & Execute
24. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
vssadmin create shadow /For=C:
peer-to-peer
Windows 7 or Windows Server 2008 R2
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
25. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
encrypting
Enterprise and Ultimate
User files - System files - Program files
DFSDiag
26. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
Read & Execute
system files
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
read
27. To view available shadow copies and the time they were created - run the following command:
vssadmin list shadows
Enterprise and Ultimate
BitLocker Drive
full control
28. To encrypt entire volumes and protect system files - use ______ Encryption.
BitLocker Drive
dfsutil domain <domain_name>
vssadmin create shadow /For=C:
.vhd
29. Shadow copies allow backup software to access files that are ______.
in use
vssadmin create shadow /For=C:
Read & Execute
vssadmin list shadows
30. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
Read
client-server
vssadmin list shadows
BranchCache
31. To troubleshoot DFS - use the ______ command-line tool.
DFS
BitLocker Drive
DFSDiag
System Image Recovery
32. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
read access
wbadmin start backup -backupTarget:L: -allCritical -quiet
system files
green
33. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
DFS
server running Win Srvr 2008 R2
DFSDiag
clients
34. BranchCache clients must be running ______ or ______.
vssadmin create shadow /For=C:
Read & Execute
Windows 7 or Windows Server 2008 R2
clients
35. EFS protects files and folders by ______ them on the disk.
dfsutil domain <domain_name>
wbadmin start backup -backupTarget:L: -include:C: -quiet
green
encrypting
36. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
system files
clients
Access-based Enumeration (ABE)
wbadmin delete systemstatebackup
37. What command should you run to initiate a backup?
client-server
You should run wbadmin
vssadmin list shadowstorage
Full Control
38. To delete a system state backup - run:
.vhd
List Folder Contents
client-server
wbadmin delete systemstatebackup
39. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
green
File Classification Infrastructure
clients
List Folder Contents
40. To perform a backup of the system state - run:
peer-to-peer
green
wbadmin start systemstatebackup
dfsutil domain <domain_name>
41. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
.vhd
User files - System files - Program files
Write
vssadmin list shadows
42. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
in use
BranchCache
server running Win Srvr 2008 R2
File Classification Infrastructure
43. To configure NTFS file permissions from a command prompt or script - use the ______ command.
icacls
removable flash drives
.vhd
BitLocker
44. Administrators can assign users or groups any of the following permissions to a file or folder:
wbadmin start backup -backupTarget:L: -allCritical -quiet
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
wbadmin start systemstaterecovery
encryption certificates
45. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
green
dfsutil domain <domain_name>
rootkits
read
46. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
List Folder Contents
User files - System files - Program files
wbadmin start systemstaterecovery
full control
47. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
.vhd
read access
wbadmin start systemstaterecovery
removable flash drives
48. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
Enterprise and Ultimate
full control
.vhd
Advanced
49. Run the following command to back up all critical files to the L drive
vssadmin list shadowstorage
system files
wbadmin start backup -backupTarget:L: -allCritical -quiet
dfsutil domain <domain_name>
50. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
List Folder Contents
BitLocker Drive
Enterprise and Ultimate
Write