Test your basic knowledge |

MCTS: Managing Files

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. BranchCache can operate in two modes: ______.






2. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.






3. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.






4. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:






5. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.






6. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.






7. With the ______ permissions - in addition to the Read permission - users can run applications.






8. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.






9. With the ______ permissions - users can view the contents of a folder and open files.






10. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.






11. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.






12. Shadow copies allow backup software to access files that are ______.






13. With the ______ permissions - users can browse a folder but not necessarily open the files in it.






14. With the ______ permissions - users can create files in a folder but not necessarily read them.






15. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.






16. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.






17. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:






18. EFS protects files and folders by ______ them on the disk.






19. To restore a system state backup - run:






20. To perform a backup of the system state - run:






21. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.






22. What command should you run to configure shadow copies?






23. Run the following command to back up all critical files to the L drive






24. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box






25. To delete a system state backup - run:






26. To view available shadow copies and the time they were created - run the following command:






27. With the ______ permissions - users can read - edit - and delete files and folders.






28. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.






29. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.






30. Any new folders or files created in the root of a disk will grant ______ full control and users read access.






31. Administrators can assign users or groups any of the following permissions to a file or folder:






32. To troubleshoot DFS - use the ______ command-line tool.






33. To encrypt entire volumes and protect system files - use ______ Encryption.






34. What command should you run to initiate a backup?






35. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.






36. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.






37. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.






38. To create a hard limit of 100 MB - run the following command:






39. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.






40. BranchCache clients must be running ______ or ______.






41. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.






42. To configure NTFS file permissions from a command prompt or script - use the ______ command.






43. To view the storage currently allocated to shadow copies - run the following command:






44. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:






45. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.






46. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.






47. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.






48. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.






49. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.






50. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.