SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
peer-to-peer
Advanced
2. What command should you run to initiate a backup?
You should run wbadmin
BitLocker
green
in its current state
3. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Access-based Enumeration (ABE)
removable flash drives
User files - System files - Program files
File Classification Infrastructure
4. Administrators can assign users or groups any of the following permissions to a file or folder:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
icacls
encryption certificates
Write
5. To restore a system state backup - run:
DFSDiag
Read
Write
wbadmin start systemstaterecovery
6. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
BranchCache
administrators
BitLocker
You should run vssadmin
7. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
Write
Enterprise and Ultimate
vssadmin create shadow /For=C:
wbadmin start systemstatebackup
8. To encrypt entire volumes and protect system files - use ______ Encryption.
DFSDiag
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
clients
BitLocker Drive
9. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
Read
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
DFSDiag
dfsutil domain <domain_name>
10. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
removable flash drives
wbadmin start systemstatebackup
read access
.vhd
11. To view the storage currently allocated to shadow copies - run the following command:
vssadmin list shadowstorage
BitLocker
rootkits
Write
12. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
Read & Execute
BitLocker
read access
encryption certificates
13. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
vssadmin list shadows
Write
Access-based Enumeration (ABE)
full control
14. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
.vhd
BitLocker
wbadmin start backup -backupTarget:L: -allCritical -quiet
15. To configure NTFS file permissions from a command prompt or script - use the ______ command.
icacls
BitLocker Drive
DFS
Read & Execute
16. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
in its current state
File Classification Infrastructure
Write
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
17. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
dfsutil domain <domain_name>
wbadmin start systemstatebackup
read - but not write
BranchCache
18. With the ______ permissions - in addition to the Read permission - users can run applications.
Windows 7 or Windows Server 2008 R2
BitLocker
wbadmin start systemstaterecovery
Read & Execute
19. EFS protects files and folders by ______ them on the disk.
Write
encrypting
client-server
wbadmin start backup -backupTarget:L: -allCritical -quiet
20. With the ______ permissions - users can create files in a folder but not necessarily read them.
Read & Execute
You should run vssadmin
Write
encrypting
21. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
wbadmin start backup -backupTarget:L: -include:C: -quiet
in its current state
You should run wbadmin
22. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
dfsutil domain <domain_name>
peer-to-peer
vssadmin list shadows
rootkits
23. To delete a system state backup - run:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
dfsutil domain <domain_name>
vssadmin create shadow /For=C:
wbadmin delete systemstatebackup
24. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
peer-to-peer
administrators
wbadmin delete systemstatebackup
DFS
25. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
read access
in use
You should run wbadmin
System Image Recovery
26. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
in use
green
vssadmin list shadows
administrators
27. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
BitLocker
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
system files
You should run vssadmin
28. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
server running Win Srvr 2008 R2
administrators
in use
rootkits
29. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
List Folder Contents
in its current state
icacls
BitLocker
30. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
in its current state
removable flash drives
encryption certificates
Write
31. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
wbadmin start systemstatebackup
DFS
Full Control
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
32. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
System Image Recovery
Write
read
.vhd
33. To troubleshoot DFS - use the ______ command-line tool.
DFSDiag
wbadmin delete systemstatebackup
server running Win Srvr 2008 R2
BitLocker Drive
34. BranchCache clients must be running ______ or ______.
System Image Recovery
Write
Windows 7 or Windows Server 2008 R2
DFS
35. To view available shadow copies and the time they were created - run the following command:
List Folder Contents
Write
vssadmin list shadows
Windows 7 or Windows Server 2008 R2
36. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
encrypting
in its current state
peer-to-peer
administrators
37. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
Access-based Enumeration (ABE)
clients
File Classification Infrastructure
Full Control
38. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
Full Control
read - but not write
dfsutil domain <domain_name>
BitLocker
39. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
removable flash drives
clients
wbadmin start systemstatebackup
Access-based Enumeration (ABE)
40. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
rootkits
full control
client-server
green
41. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Enterprise and Ultimate
Modify
Access-based Enumeration (ABE)
client-server
42. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
Advanced
full control
wbadmin start backup -backupTarget:L: -include:C: -quiet
Write
43. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
Distributed Cache and Hosted Cache
rootkits
read
clients
44. To perform a backup of the system state - run:
Data Recovery Agents (DRAs)
wbadmin start systemstatebackup
DFSDiag
server running Win Srvr 2008 R2
45. With the ______ permissions - users can view the contents of a folder and open files.
BranchCache
wbadmin start systemstatebackup
Read
in its current state
46. Shadow copies allow backup software to access files that are ______.
System Image Recovery
clients
Full Control
in use
47. What command should you run to configure shadow copies?
You should run vssadmin
File Classification Infrastructure
BranchCache
Windows 7 or Windows Server 2008 R2
48. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -include:C: -quiet
System Image Recovery
Write
wbadmin start backup -backupTarget:L: -allCritical -quiet
49. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
vssadmin create shadow /For=C:
wbadmin start backup -backupTarget:L: -include:C: -quiet
System Image Recovery
green
50. BranchCache can operate in two modes: ______.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
vssadmin create shadow /For=C:
Distributed Cache and Hosted Cache
read