SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Administrators can assign users or groups any of the following permissions to a file or folder:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Write
You should run vssadmin
vssadmin list shadowstorage
2. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
rootkits
encrypting
server running Win Srvr 2008 R2
removable flash drives
3. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
You should run wbadmin
.vhd
Access-based Enumeration (ABE)
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
4. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
in its current state
File Classification Infrastructure
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Read & Execute
5. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Enterprise and Ultimate
green
DFSDiag
read
6. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
User files - System files - Program files
read
wbadmin start systemstaterecovery
vssadmin create shadow /For=C:
7. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
BitLocker
Enterprise and Ultimate
Write
System Image Recovery
8. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
full control
in use
.vhd
wbadmin start backup -backupTarget:L: -allCritical -quiet
9. With the ______ permissions - in addition to the Read permission - users can run applications.
Read & Execute
wbadmin start backup -backupTarget:L: -allCritical -quiet
vssadmin list shadows
Read
10. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
rootkits
Enterprise and Ultimate
BitLocker Drive
read - but not write
11. What command should you run to configure shadow copies?
removable flash drives
You should run vssadmin
wbadmin start systemstaterecovery
BitLocker
12. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
vssadmin list shadows
full control
Enterprise and Ultimate
administrators
13. With the ______ permissions - users can read - edit - and delete files and folders.
clients
Modify
full control
read access
14. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
removable flash drives
Data Recovery Agents (DRAs)
encryption certificates
read - but not write
15. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
BitLocker
client-server
dfsutil domain <domain_name>
DFSDiag
16. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
vssadmin list shadowstorage
User files - System files - Program files
dfsutil domain <domain_name>
DFSDiag
17. EFS protects files and folders by ______ them on the disk.
clients
wbadmin start systemstatebackup
rootkits
encrypting
18. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
DFSDiag
User files - System files - Program files
Write
encrypting
19. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
System Image Recovery
in use
icacls
read
20. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
BitLocker
You should run wbadmin
wbadmin start systemstaterecovery
Full Control
21. To encrypt entire volumes and protect system files - use ______ Encryption.
rootkits
BitLocker Drive
DFSDiag
You should run wbadmin
22. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
client-server
Windows 7 or Windows Server 2008 R2
wbadmin start systemstaterecovery
Read & Execute
23. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
removable flash drives
in use
DFSDiag
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
24. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
User files - System files - Program files
in its current state
Advanced
peer-to-peer
25. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
Access-based Enumeration (ABE)
Full Control
read access
BranchCache
26. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
List Folder Contents
System Image Recovery
clients
Distributed Cache and Hosted Cache
27. To perform a backup of the system state - run:
peer-to-peer
client-server
wbadmin start systemstatebackup
green
28. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
wbadmin start systemstaterecovery
File Classification Infrastructure
DFS
vssadmin create shadow /For=C:
29. BranchCache can operate in two modes: ______.
You should run wbadmin
client-server
Distributed Cache and Hosted Cache
green
30. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
Modify
server running Win Srvr 2008 R2
read - but not write
wbadmin delete systemstatebackup
31. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
wbadmin start backup -backupTarget:L: -include:C: -quiet
Access-based Enumeration (ABE)
in its current state
peer-to-peer
32. Shadow copies allow backup software to access files that are ______.
green
clients
in use
List Folder Contents
33. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
Advanced
client-server
Windows 7 or Windows Server 2008 R2
Modify
34. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
DFS
rootkits
Data Recovery Agents (DRAs)
full control
35. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
wbadmin start systemstatebackup
green
List Folder Contents
36. To create a hard limit of 100 MB - run the following command:
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
wbadmin start backup -backupTarget:L: -allCritical -quiet
Windows 7 or Windows Server 2008 R2
removable flash drives
37. With the ______ permissions - users can create files in a folder but not necessarily read them.
Read & Execute
Write
read access
BitLocker Drive
38. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
vssadmin list shadows
Data Recovery Agents (DRAs)
Write
read access
39. BranchCache clients must be running ______ or ______.
Write
Windows 7 or Windows Server 2008 R2
Data Recovery Agents (DRAs)
wbadmin start backup -backupTarget:L: -allCritical -quiet
40. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -include:C: -quiet
File Classification Infrastructure
wbadmin start backup -backupTarget:L: -allCritical -quiet
Distributed Cache and Hosted Cache
41. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
read
File Classification Infrastructure
vssadmin create shadow /For=C:
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
42. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
removable flash drives
System Image Recovery
Full Control
clients
43. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
wbadmin start backup -backupTarget:L: -include:C: -quiet
green
vssadmin list shadowstorage
encrypting
44. To configure NTFS file permissions from a command prompt or script - use the ______ command.
wbadmin start systemstaterecovery
icacls
read - but not write
wbadmin start backup -backupTarget:L: -allCritical -quiet
45. To view the storage currently allocated to shadow copies - run the following command:
clients
You should run wbadmin
Access-based Enumeration (ABE)
vssadmin list shadowstorage
46. To troubleshoot DFS - use the ______ command-line tool.
server running Win Srvr 2008 R2
Full Control
DFSDiag
Access-based Enumeration (ABE)
47. To restore a system state backup - run:
BitLocker Drive
encrypting
wbadmin start systemstaterecovery
system files
48. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
clients
full control
File Classification Infrastructure
green
49. What command should you run to initiate a backup?
client-server
in its current state
You should run wbadmin
wbadmin start systemstatebackup
50. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
read access
in use
system files
wbadmin start backup -backupTarget:L: -allCritical -quiet
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests