SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
client-server
green
DFSDiag
BitLocker Drive
2. BranchCache clients must be running ______ or ______.
Access-based Enumeration (ABE)
Windows 7 or Windows Server 2008 R2
administrators
wbadmin start backup -backupTarget:L: -include:C: -quiet
3. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
in its current state
.vhd
User files - System files - Program files
green
4. EFS protects files and folders by ______ them on the disk.
File Classification Infrastructure
encrypting
in its current state
wbadmin delete systemstatebackup
5. Shadow copies allow backup software to access files that are ______.
Read
Data Recovery Agents (DRAs)
You should run vssadmin
in use
6. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
server running Win Srvr 2008 R2
client-server
Read & Execute
vssadmin create shadow /For=C:
7. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
Read & Execute
read - but not write
icacls
Read
8. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
User files - System files - Program files
full control
rootkits
icacls
9. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
removable flash drives
vssadmin list shadows
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
DFSDiag
10. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
Enterprise and Ultimate
File Classification Infrastructure
Full Control
rootkits
11. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
dfsutil domain <domain_name>
read - but not write
wbadmin start systemstatebackup
Enterprise and Ultimate
12. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
BitLocker
dfsutil domain <domain_name>
administrators
Access-based Enumeration (ABE)
13. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
dfsutil domain <domain_name>
green
in use
rootkits
14. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
wbadmin start backup -backupTarget:L: -allCritical -quiet
You should run vssadmin
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
User files - System files - Program files
15. With the ______ permissions - users can view the contents of a folder and open files.
.vhd
List Folder Contents
client-server
Read
16. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
rootkits
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
in its current state
BranchCache
17. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
green
User files - System files - Program files
You should run wbadmin
BranchCache
18. Administrators can assign users or groups any of the following permissions to a file or folder:
icacls
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
BranchCache
read - but not write
19. BranchCache can operate in two modes: ______.
Distributed Cache and Hosted Cache
encrypting
User files - System files - Program files
administrators
20. To create a hard limit of 100 MB - run the following command:
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
BitLocker
dfsutil domain <domain_name>
21. With the ______ permissions - users can read - edit - and delete files and folders.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Full Control
Modify
system files
22. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Data Recovery Agents (DRAs)
Write
wbadmin start backup -backupTarget:L: -allCritical -quiet
Distributed Cache and Hosted Cache
23. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
Full Control
BitLocker Drive
system files
wbadmin delete systemstatebackup
24. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
Access-based Enumeration (ABE)
System Image Recovery
vssadmin list shadows
encryption certificates
25. To restore a system state backup - run:
wbadmin start systemstaterecovery
read access
Modify
server running Win Srvr 2008 R2
26. To perform a backup of the system state - run:
wbadmin start systemstatebackup
Full Control
Write
icacls
27. To encrypt entire volumes and protect system files - use ______ Encryption.
BitLocker Drive
Modify
wbadmin delete systemstatebackup
Read
28. What command should you run to initiate a backup?
removable flash drives
BranchCache
dfsutil domain <domain_name>
You should run wbadmin
29. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
wbadmin start systemstaterecovery
DFS
client-server
30. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
full control
Advanced
Modify
Enterprise and Ultimate
31. What command should you run to configure shadow copies?
administrators
Windows 7 or Windows Server 2008 R2
You should run vssadmin
dfsutil domain <domain_name>
32. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
You should run vssadmin
Write
DFS
removable flash drives
33. To view the storage currently allocated to shadow copies - run the following command:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
vssadmin list shadowstorage
vssadmin create shadow /For=C:
removable flash drives
34. To configure NTFS file permissions from a command prompt or script - use the ______ command.
in use
icacls
removable flash drives
read access
35. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
administrators
Advanced
encrypting
peer-to-peer
36. To troubleshoot DFS - use the ______ command-line tool.
encrypting
Distributed Cache and Hosted Cache
vssadmin create shadow /For=C:
DFSDiag
37. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
Read
green
dfsutil domain <domain_name>
read access
38. With the ______ permissions - in addition to the Read permission - users can run applications.
system files
Read & Execute
read access
removable flash drives
39. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
Data Recovery Agents (DRAs)
system files
wbadmin start systemstatebackup
40. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
You should run vssadmin
clients
system files
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
41. To view available shadow copies and the time they were created - run the following command:
wbadmin delete systemstatebackup
dfsutil domain <domain_name>
vssadmin list shadows
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
42. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
BitLocker
Read
icacls
Access-based Enumeration (ABE)
43. To delete a system state backup - run:
BranchCache
read - but not write
wbadmin delete systemstatebackup
icacls
44. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
dfsutil domain <domain_name>
wbadmin start systemstaterecovery
server running Win Srvr 2008 R2
clients
45. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
Write
You should run wbadmin
Advanced
List Folder Contents
46. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
Write
wbadmin start backup -backupTarget:L: -include:C: -quiet
.vhd
BitLocker Drive
47. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
system files
DFS
List Folder Contents
48. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
read - but not write
BitLocker
File Classification Infrastructure
Windows 7 or Windows Server 2008 R2
49. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
BitLocker
User files - System files - Program files
read access
rootkits
50. With the ______ permissions - users can create files in a folder but not necessarily read them.
read - but not write
client-server
Write
wbadmin start backup -backupTarget:L: -allCritical -quiet