SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What command should you run to configure shadow copies?
green
You should run vssadmin
DFS
in its current state
2. With the ______ permissions - users can read - edit - and delete files and folders.
You should run vssadmin
System Image Recovery
read access
Modify
3. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
BitLocker
Write
You should run vssadmin
Read
4. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Write
vssadmin list shadows
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Enterprise and Ultimate
5. To view available shadow copies and the time they were created - run the following command:
vssadmin list shadows
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
read
in use
6. Administrators can assign users or groups any of the following permissions to a file or folder:
You should run vssadmin
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
BitLocker
clients
7. With the ______ permissions - users can view the contents of a folder and open files.
icacls
Read
BitLocker Drive
removable flash drives
8. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
BitLocker
Windows 7 or Windows Server 2008 R2
dfsutil domain <domain_name>
User files - System files - Program files
9. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
read access
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
green
read - but not write
10. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
DFS
green
List Folder Contents
administrators
11. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
full control
.vhd
List Folder Contents
Advanced
12. EFS protects files and folders by ______ them on the disk.
dfsutil domain <domain_name>
encrypting
read - but not write
vssadmin create shadow /For=C:
13. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
removable flash drives
administrators
rootkits
14. To perform a backup of the system state - run:
clients
wbadmin start systemstatebackup
List Folder Contents
vssadmin list shadowstorage
15. BranchCache can operate in two modes: ______.
Distributed Cache and Hosted Cache
vssadmin list shadowstorage
in use
Modify
16. What command should you run to initiate a backup?
vssadmin create shadow /For=C:
You should run wbadmin
Data Recovery Agents (DRAs)
List Folder Contents
17. To delete a system state backup - run:
icacls
wbadmin delete systemstatebackup
Write
wbadmin start systemstatebackup
18. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Access-based Enumeration (ABE)
Full Control
19. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
clients
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Access-based Enumeration (ABE)
Modify
20. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
system files
Read
DFSDiag
Advanced
21. To encrypt entire volumes and protect system files - use ______ Encryption.
BitLocker Drive
User files - System files - Program files
green
Read & Execute
22. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
Distributed Cache and Hosted Cache
System Image Recovery
server running Win Srvr 2008 R2
You should run vssadmin
23. Shadow copies allow backup software to access files that are ______.
File Classification Infrastructure
DFS
encryption certificates
in use
24. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
List Folder Contents
read - but not write
Enterprise and Ultimate
read access
25. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
system files
Enterprise and Ultimate
in its current state
read access
26. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
client-server
icacls
vssadmin create shadow /For=C:
dfsutil domain <domain_name>
27. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
Access-based Enumeration (ABE)
wbadmin delete systemstatebackup
read access
clients
28. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
vssadmin create shadow /For=C:
read access
wbadmin delete systemstatebackup
.vhd
29. To view the storage currently allocated to shadow copies - run the following command:
vssadmin list shadowstorage
peer-to-peer
Access-based Enumeration (ABE)
You should run wbadmin
30. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
vssadmin create shadow /For=C:
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
client-server
31. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
Read & Execute
You should run wbadmin
Full Control
32. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
.vhd
wbadmin start systemstatebackup
peer-to-peer
Advanced
33. To troubleshoot DFS - use the ______ command-line tool.
server running Win Srvr 2008 R2
icacls
DFSDiag
wbadmin start backup -backupTarget:L: -allCritical -quiet
34. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
icacls
Enterprise and Ultimate
Advanced
green
35. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
wbadmin start systemstaterecovery
vssadmin create shadow /For=C:
wbadmin delete systemstatebackup
BranchCache
36. With the ______ permissions - users can create files in a folder but not necessarily read them.
wbadmin start systemstatebackup
Windows 7 or Windows Server 2008 R2
Write
client-server
37. To create a hard limit of 100 MB - run the following command:
wbadmin start systemstatebackup
File Classification Infrastructure
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
encryption certificates
38. Run the following command to back up all critical files to the L drive
You should run wbadmin
wbadmin start backup -backupTarget:L: -allCritical -quiet
Write
removable flash drives
39. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
BitLocker Drive
read
Distributed Cache and Hosted Cache
peer-to-peer
40. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
system files
Enterprise and Ultimate
removable flash drives
encrypting
41. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
List Folder Contents
Write
in its current state
wbadmin start systemstaterecovery
42. To restore a system state backup - run:
wbadmin start systemstaterecovery
Read
.vhd
You should run wbadmin
43. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
System Image Recovery
Distributed Cache and Hosted Cache
server running Win Srvr 2008 R2
.vhd
44. To configure NTFS file permissions from a command prompt or script - use the ______ command.
Read
removable flash drives
icacls
wbadmin start systemstatebackup
45. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Data Recovery Agents (DRAs)
icacls
File Classification Infrastructure
full control
46. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
in use
rootkits
BitLocker
client-server
47. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
green
wbadmin start backup -backupTarget:L: -include:C: -quiet
Data Recovery Agents (DRAs)
BranchCache
48. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
encryption certificates
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Read & Execute
Distributed Cache and Hosted Cache
49. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
administrators
dfsutil domain <domain_name>
wbadmin start systemstatebackup
peer-to-peer
50. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
DFS
List Folder Contents
DFSDiag