SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To encrypt entire volumes and protect system files - use ______ Encryption.
Access-based Enumeration (ABE)
BitLocker Drive
List Folder Contents
administrators
2. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
wbadmin start systemstatebackup
vssadmin create shadow /For=C:
BitLocker
.vhd
3. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
File Classification Infrastructure
Data Recovery Agents (DRAs)
Access-based Enumeration (ABE)
clients
4. With the ______ permissions - users can create files in a folder but not necessarily read them.
Write
in its current state
dfsutil domain <domain_name>
You should run vssadmin
5. To create a hard limit of 100 MB - run the following command:
peer-to-peer
Enterprise and Ultimate
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
read access
6. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
read
DFSDiag
Full Control
Read & Execute
7. What command should you run to configure shadow copies?
You should run vssadmin
rootkits
vssadmin list shadowstorage
BranchCache
8. With the ______ permissions - users can read - edit - and delete files and folders.
Modify
Full Control
Read & Execute
Data Recovery Agents (DRAs)
9. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
encrypting
system files
clients
10. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Write
encryption certificates
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
System Image Recovery
11. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
wbadmin delete systemstatebackup
full control
Access-based Enumeration (ABE)
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
12. Shadow copies allow backup software to access files that are ______.
system files
encryption certificates
in use
List Folder Contents
13. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
System Image Recovery
Enterprise and Ultimate
.vhd
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
14. EFS protects files and folders by ______ them on the disk.
Advanced
DFS
Read & Execute
encrypting
15. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
User files - System files - Program files
wbadmin start systemstatebackup
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
16. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
green
server running Win Srvr 2008 R2
Data Recovery Agents (DRAs)
wbadmin delete systemstatebackup
17. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
Enterprise and Ultimate
in its current state
wbadmin start backup -backupTarget:L: -allCritical -quiet
wbadmin start backup -backupTarget:L: -include:C: -quiet
18. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
Full Control
vssadmin list shadowstorage
Access-based Enumeration (ABE)
wbadmin delete systemstatebackup
19. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
in use
administrators
.vhd
Advanced
20. With the ______ permissions - users can view the contents of a folder and open files.
read access
Read
DFSDiag
encrypting
21. BranchCache can operate in two modes: ______.
System Image Recovery
Write
Distributed Cache and Hosted Cache
DFSDiag
22. To delete a system state backup - run:
wbadmin delete systemstatebackup
peer-to-peer
BitLocker Drive
Enterprise and Ultimate
23. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
List Folder Contents
User files - System files - Program files
green
24. With the ______ permissions - in addition to the Read permission - users can run applications.
Read & Execute
peer-to-peer
DFSDiag
encrypting
25. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
wbadmin start systemstaterecovery
BitLocker
icacls
Full Control
26. To troubleshoot DFS - use the ______ command-line tool.
DFSDiag
User files - System files - Program files
Data Recovery Agents (DRAs)
List Folder Contents
27. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
wbadmin start backup -backupTarget:L: -include:C: -quiet
read - but not write
system files
DFS
28. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Write
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
read
29. What command should you run to initiate a backup?
removable flash drives
dfsutil domain <domain_name>
in use
You should run wbadmin
30. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
wbadmin delete systemstatebackup
in use
User files - System files - Program files
vssadmin create shadow /For=C:
31. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Read & Execute
You should run wbadmin
BranchCache
32. BranchCache clients must be running ______ or ______.
BitLocker
server running Win Srvr 2008 R2
Windows 7 or Windows Server 2008 R2
full control
33. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
You should run vssadmin
encrypting
read access
Data Recovery Agents (DRAs)
34. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
encryption certificates
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Data Recovery Agents (DRAs)
rootkits
35. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
vssadmin list shadows
green
File Classification Infrastructure
You should run wbadmin
36. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
server running Win Srvr 2008 R2
DFS
rootkits
icacls
37. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
clients
wbadmin start backup -backupTarget:L: -include:C: -quiet
full control
File Classification Infrastructure
38. Run the following command to back up all critical files to the L drive
BitLocker Drive
Advanced
read - but not write
wbadmin start backup -backupTarget:L: -allCritical -quiet
39. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
User files - System files - Program files
encryption certificates
in its current state
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
40. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
User files - System files - Program files
You should run vssadmin
Advanced
DFSDiag
41. To configure NTFS file permissions from a command prompt or script - use the ______ command.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
wbadmin start backup -backupTarget:L: -include:C: -quiet
icacls
full control
42. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
read - but not write
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
dfsutil domain <domain_name>
client-server
43. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
.vhd
Advanced
Data Recovery Agents (DRAs)
wbadmin start backup -backupTarget:L: -include:C: -quiet
44. To restore a system state backup - run:
Distributed Cache and Hosted Cache
green
wbadmin start systemstaterecovery
Access-based Enumeration (ABE)
45. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
client-server
Advanced
BitLocker Drive
rootkits
46. Administrators can assign users or groups any of the following permissions to a file or folder:
User files - System files - Program files
removable flash drives
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Modify
47. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
dfsutil domain <domain_name>
Distributed Cache and Hosted Cache
administrators
.vhd
48. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
BitLocker
server running Win Srvr 2008 R2
encryption certificates
Distributed Cache and Hosted Cache
49. To view the storage currently allocated to shadow copies - run the following command:
vssadmin list shadowstorage
System Image Recovery
BitLocker Drive
encrypting
50. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
Write
peer-to-peer
You should run vssadmin
system files