SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
rootkits
vssadmin list shadows
encryption certificates
removable flash drives
2. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
Windows 7 or Windows Server 2008 R2
dfsutil domain <domain_name>
system files
vssadmin create shadow /For=C:
3. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
rootkits
in its current state
wbadmin start backup -backupTarget:L: -include:C: -quiet
read
4. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
system files
administrators
BitLocker Drive
Read & Execute
5. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
read access
client-server
Access-based Enumeration (ABE)
full control
6. Administrators can assign users or groups any of the following permissions to a file or folder:
wbadmin start backup -backupTarget:L: -allCritical -quiet
Windows 7 or Windows Server 2008 R2
List Folder Contents
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
7. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Full Control
BitLocker
8. BranchCache can operate in two modes: ______.
removable flash drives
Distributed Cache and Hosted Cache
vssadmin list shadowstorage
Write
9. To restore a system state backup - run:
wbadmin start systemstaterecovery
peer-to-peer
client-server
Enterprise and Ultimate
10. With the ______ permissions - users can view the contents of a folder and open files.
Read
read access
System Image Recovery
Write
11. What command should you run to configure shadow copies?
vssadmin list shadows
You should run vssadmin
encrypting
full control
12. Shadow copies allow backup software to access files that are ______.
in use
You should run vssadmin
wbadmin delete systemstatebackup
DFS
13. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
peer-to-peer
Full Control
clients
wbadmin start backup -backupTarget:L: -include:C: -quiet
14. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
read access
full control
encryption certificates
administrators
15. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
removable flash drives
.vhd
Read
16. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
Advanced
System Image Recovery
encrypting
User files - System files - Program files
17. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
rootkits
wbadmin start backup -backupTarget:L: -allCritical -quiet
Read
18. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
File Classification Infrastructure
BitLocker Drive
Access-based Enumeration (ABE)
read
19. To troubleshoot DFS - use the ______ command-line tool.
peer-to-peer
clients
DFSDiag
wbadmin start backup -backupTarget:L: -include:C: -quiet
20. To encrypt entire volumes and protect system files - use ______ Encryption.
full control
in its current state
in use
BitLocker Drive
21. Run the following command to back up all critical files to the L drive
BitLocker Drive
wbadmin start backup -backupTarget:L: -allCritical -quiet
peer-to-peer
Access-based Enumeration (ABE)
22. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
clients
Write
encrypting
green
23. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
Read
dfsutil domain <domain_name>
vssadmin create shadow /For=C:
You should run wbadmin
24. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
BitLocker
rootkits
wbadmin start systemstatebackup
Write
25. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
encryption certificates
read access
rootkits
vssadmin list shadowstorage
26. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
Advanced
BranchCache
full control
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
27. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
.vhd
Enterprise and Ultimate
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
28. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
encryption certificates
List Folder Contents
Read & Execute
read
29. To view available shadow copies and the time they were created - run the following command:
BitLocker Drive
administrators
rootkits
vssadmin list shadows
30. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
vssadmin list shadowstorage
.vhd
DFS
server running Win Srvr 2008 R2
31. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
full control
Distributed Cache and Hosted Cache
List Folder Contents
rootkits
32. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
removable flash drives
vssadmin create shadow /For=C:
You should run wbadmin
33. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
wbadmin start systemstatebackup
System Image Recovery
read
server running Win Srvr 2008 R2
34. What command should you run to initiate a backup?
List Folder Contents
You should run wbadmin
in its current state
read
35. To view the storage currently allocated to shadow copies - run the following command:
removable flash drives
You should run wbadmin
.vhd
vssadmin list shadowstorage
36. BranchCache clients must be running ______ or ______.
Access-based Enumeration (ABE)
icacls
Windows 7 or Windows Server 2008 R2
clients
37. To perform a backup of the system state - run:
DFS
system files
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
wbadmin start systemstatebackup
38. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
wbadmin start systemstaterecovery
Modify
icacls
client-server
39. EFS protects files and folders by ______ them on the disk.
encrypting
Modify
BitLocker Drive
Access-based Enumeration (ABE)
40. With the ______ permissions - users can read - edit - and delete files and folders.
encryption certificates
System Image Recovery
BranchCache
Modify
41. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Write
peer-to-peer
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Access-based Enumeration (ABE)
42. To configure NTFS file permissions from a command prompt or script - use the ______ command.
Modify
system files
icacls
in use
43. To delete a system state backup - run:
encrypting
dfsutil domain <domain_name>
Windows 7 or Windows Server 2008 R2
wbadmin delete systemstatebackup
44. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
BitLocker
Enterprise and Ultimate
vssadmin create shadow /For=C:
in use
45. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
wbadmin start backup -backupTarget:L: -include:C: -quiet
File Classification Infrastructure
BranchCache
vssadmin list shadowstorage
46. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
System Image Recovery
dfsutil domain <domain_name>
removable flash drives
read - but not write
47. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
You should run vssadmin
Write
Data Recovery Agents (DRAs)
User files - System files - Program files
48. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
dfsutil domain <domain_name>
clients
system files
DFS
49. With the ______ permissions - users can create files in a folder but not necessarily read them.
dfsutil domain <domain_name>
rootkits
Write
File Classification Infrastructure
50. With the ______ permissions - in addition to the Read permission - users can run applications.
Write
You should run vssadmin
User files - System files - Program files
Read & Execute