SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
in its current state
system files
Write
in use
2. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
Write
wbadmin start backup -backupTarget:L: -allCritical -quiet
BranchCache
BitLocker
3. To view the storage currently allocated to shadow copies - run the following command:
dfsutil domain <domain_name>
encrypting
You should run vssadmin
vssadmin list shadowstorage
4. Shadow copies allow backup software to access files that are ______.
in use
wbadmin start systemstaterecovery
Modify
server running Win Srvr 2008 R2
5. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
in use
List Folder Contents
Read & Execute
Full Control
6. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
green
peer-to-peer
wbadmin start backup -backupTarget:L: -include:C: -quiet
Write
7. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
dfsutil domain <domain_name>
DFS
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
full control
8. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Write
Modify
wbadmin start systemstatebackup
9. With the ______ permissions - users can create files in a folder but not necessarily read them.
Distributed Cache and Hosted Cache
full control
removable flash drives
Write
10. With the ______ permissions - in addition to the Read permission - users can run applications.
Write
full control
wbadmin start backup -backupTarget:L: -allCritical -quiet
Read & Execute
11. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
green
encrypting
Distributed Cache and Hosted Cache
DFS
12. With the ______ permissions - users can view the contents of a folder and open files.
Read
You should run wbadmin
dfsutil domain <domain_name>
green
13. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
vssadmin list shadowstorage
Advanced
DFSDiag
server running Win Srvr 2008 R2
14. To troubleshoot DFS - use the ______ command-line tool.
read - but not write
DFSDiag
.vhd
Distributed Cache and Hosted Cache
15. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
.vhd
administrators
in its current state
dfsutil domain <domain_name>
16. With the ______ permissions - users can read - edit - and delete files and folders.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
clients
encrypting
Modify
17. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
server running Win Srvr 2008 R2
vssadmin list shadows
Modify
clients
18. To create a hard limit of 100 MB - run the following command:
read access
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
vssadmin create shadow /For=C:
19. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
Access-based Enumeration (ABE)
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
in its current state
You should run vssadmin
20. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
Access-based Enumeration (ABE)
Enterprise and Ultimate
full control
system files
21. Run the following command to back up all critical files to the L drive
rootkits
read - but not write
wbadmin start backup -backupTarget:L: -allCritical -quiet
Modify
22. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
peer-to-peer
icacls
Modify
in use
23. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
clients
Full Control
green
read - but not write
24. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
green
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
You should run vssadmin
vssadmin list shadows
25. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
wbadmin start backup -backupTarget:L: -include:C: -quiet
Enterprise and Ultimate
Windows 7 or Windows Server 2008 R2
dfsutil domain <domain_name>
26. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
peer-to-peer
BranchCache
DFSDiag
DFS
27. BranchCache clients must be running ______ or ______.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
full control
system files
Windows 7 or Windows Server 2008 R2
28. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
read
removable flash drives
Advanced
wbadmin delete systemstatebackup
29. To view available shadow copies and the time they were created - run the following command:
vssadmin list shadows
BitLocker Drive
icacls
wbadmin start backup -backupTarget:L: -include:C: -quiet
30. EFS protects files and folders by ______ them on the disk.
wbadmin start backup -backupTarget:L: -include:C: -quiet
rootkits
System Image Recovery
encrypting
31. To restore a system state backup - run:
Enterprise and Ultimate
green
wbadmin start systemstaterecovery
encrypting
32. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
in its current state
removable flash drives
User files - System files - Program files
read
33. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
BitLocker Drive
icacls
green
rootkits
34. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
vssadmin list shadowstorage
File Classification Infrastructure
dfsutil domain <domain_name>
35. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
server running Win Srvr 2008 R2
Advanced
Read
You should run vssadmin
36. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
DFS
Read & Execute
Read
37. Administrators can assign users or groups any of the following permissions to a file or folder:
Full Control
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
in use
dfsutil domain <domain_name>
38. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
You should run vssadmin
Data Recovery Agents (DRAs)
Full Control
Write
39. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
wbadmin start systemstatebackup
DFS
You should run wbadmin
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
40. What command should you run to configure shadow copies?
in use
Distributed Cache and Hosted Cache
You should run vssadmin
Windows 7 or Windows Server 2008 R2
41. To perform a backup of the system state - run:
wbadmin start systemstatebackup
wbadmin delete systemstatebackup
Advanced
Read & Execute
42. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
System Image Recovery
system files
in its current state
read
43. To configure NTFS file permissions from a command prompt or script - use the ______ command.
icacls
DFS
DFSDiag
wbadmin start systemstatebackup
44. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
DFS
removable flash drives
vssadmin create shadow /For=C:
server running Win Srvr 2008 R2
45. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
You should run wbadmin
Access-based Enumeration (ABE)
Enterprise and Ultimate
encryption certificates
46. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
Write
dfsutil domain <domain_name>
wbadmin start backup -backupTarget:L: -allCritical -quiet
removable flash drives
47. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
wbadmin delete systemstatebackup
You should run wbadmin
removable flash drives
read access
48. To delete a system state backup - run:
full control
System Image Recovery
wbadmin delete systemstatebackup
administrators
49. To encrypt entire volumes and protect system files - use ______ Encryption.
BitLocker Drive
green
dfsutil domain <domain_name>
wbadmin start backup -backupTarget:L: -include:C: -quiet
50. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Read
encrypting
.vhd
File Classification Infrastructure