SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. BranchCache can operate in two modes: ______.
Read
wbadmin delete systemstatebackup
clients
Distributed Cache and Hosted Cache
2. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
Windows 7 or Windows Server 2008 R2
read
System Image Recovery
system files
3. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
Write
Full Control
encrypting
server running Win Srvr 2008 R2
4. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
Distributed Cache and Hosted Cache
You should run vssadmin
peer-to-peer
dfsutil domain <domain_name>
5. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
read access
List Folder Contents
DFSDiag
BitLocker
6. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
vssadmin create shadow /For=C:
.vhd
wbadmin start backup -backupTarget:L: -allCritical -quiet
7. With the ______ permissions - in addition to the Read permission - users can run applications.
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Read & Execute
You should run vssadmin
rootkits
8. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
vssadmin create shadow /For=C:
icacls
system files
in use
9. With the ______ permissions - users can view the contents of a folder and open files.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
system files
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Read
10. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
Enterprise and Ultimate
client-server
User files - System files - Program files
removable flash drives
11. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
System Image Recovery
full control
rootkits
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
12. Shadow copies allow backup software to access files that are ______.
Enterprise and Ultimate
in use
wbadmin start backup -backupTarget:L: -include:C: -quiet
client-server
13. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
Read & Execute
wbadmin start systemstaterecovery
Write
14. With the ______ permissions - users can create files in a folder but not necessarily read them.
Write
DFSDiag
Access-based Enumeration (ABE)
full control
15. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
DFS
removable flash drives
Full Control
server running Win Srvr 2008 R2
16. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Advanced
Enterprise and Ultimate
Write
wbadmin start backup -backupTarget:L: -include:C: -quiet
17. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Data Recovery Agents (DRAs)
green
wbadmin start backup -backupTarget:L: -allCritical -quiet
18. EFS protects files and folders by ______ them on the disk.
green
encrypting
read
BranchCache
19. To restore a system state backup - run:
System Image Recovery
wbadmin start systemstaterecovery
wbadmin start backup -backupTarget:L: -include:C: -quiet
.vhd
20. To perform a backup of the system state - run:
DFSDiag
Write
server running Win Srvr 2008 R2
wbadmin start systemstatebackup
21. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
client-server
Data Recovery Agents (DRAs)
DFSDiag
encrypting
22. What command should you run to configure shadow copies?
removable flash drives
You should run vssadmin
peer-to-peer
BitLocker Drive
23. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -allCritical -quiet
wbadmin delete systemstatebackup
encrypting
BranchCache
24. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
vssadmin list shadows
removable flash drives
Advanced
wbadmin start systemstatebackup
25. To delete a system state backup - run:
system files
administrators
wbadmin delete systemstatebackup
Read
26. To view available shadow copies and the time they were created - run the following command:
BitLocker
in use
vssadmin list shadows
wbadmin start backup -backupTarget:L: -allCritical -quiet
27. With the ______ permissions - users can read - edit - and delete files and folders.
read
Advanced
clients
Modify
28. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
Full Control
System Image Recovery
List Folder Contents
encryption certificates
29. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
rootkits
wbadmin delete systemstatebackup
Data Recovery Agents (DRAs)
Enterprise and Ultimate
30. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
Access-based Enumeration (ABE)
read access
administrators
File Classification Infrastructure
31. Administrators can assign users or groups any of the following permissions to a file or folder:
Read
server running Win Srvr 2008 R2
Write
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
32. To troubleshoot DFS - use the ______ command-line tool.
DFSDiag
.vhd
clients
removable flash drives
33. To encrypt entire volumes and protect system files - use ______ Encryption.
wbadmin start systemstatebackup
BitLocker Drive
Modify
full control
34. What command should you run to initiate a backup?
You should run wbadmin
wbadmin start systemstaterecovery
administrators
File Classification Infrastructure
35. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Modify
read access
File Classification Infrastructure
vssadmin list shadowstorage
36. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
peer-to-peer
BitLocker Drive
Data Recovery Agents (DRAs)
You should run wbadmin
37. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
Data Recovery Agents (DRAs)
encryption certificates
Enterprise and Ultimate
in its current state
38. To create a hard limit of 100 MB - run the following command:
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
full control
vssadmin list shadows
DFS
39. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
Write
Distributed Cache and Hosted Cache
Windows 7 or Windows Server 2008 R2
BitLocker
40. BranchCache clients must be running ______ or ______.
Read
vssadmin list shadowstorage
full control
Windows 7 or Windows Server 2008 R2
41. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
green
Write
rootkits
Windows 7 or Windows Server 2008 R2
42. To configure NTFS file permissions from a command prompt or script - use the ______ command.
.vhd
system files
encrypting
icacls
43. To view the storage currently allocated to shadow copies - run the following command:
Modify
vssadmin list shadowstorage
administrators
green
44. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
vssadmin list shadowstorage
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Data Recovery Agents (DRAs)
vssadmin create shadow /For=C:
45. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
Read
You should run wbadmin
BranchCache
Data Recovery Agents (DRAs)
46. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
read
client-server
Modify
47. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
client-server
BranchCache
clients
Enterprise and Ultimate
48. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
vssadmin create shadow /For=C:
Access-based Enumeration (ABE)
Windows 7 or Windows Server 2008 R2
BranchCache
49. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
administrators
System Image Recovery
vssadmin list shadows
removable flash drives
50. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
BranchCache
Enterprise and Ultimate
System Image Recovery
encrypting