SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
DFSDiag
encryption certificates
BitLocker
Distributed Cache and Hosted Cache
2. To troubleshoot DFS - use the ______ command-line tool.
DFSDiag
Windows 7 or Windows Server 2008 R2
Advanced
Read & Execute
3. EFS protects files and folders by ______ them on the disk.
read
encrypting
rootkits
read - but not write
4. To delete a system state backup - run:
green
vssadmin list shadows
wbadmin delete systemstatebackup
Data Recovery Agents (DRAs)
5. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
User files - System files - Program files
Enterprise and Ultimate
rootkits
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
6. BranchCache can operate in two modes: ______.
Distributed Cache and Hosted Cache
clients
read
Access-based Enumeration (ABE)
7. Administrators can assign users or groups any of the following permissions to a file or folder:
BranchCache
Access-based Enumeration (ABE)
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
full control
8. Shadow copies allow backup software to access files that are ______.
Read
You should run vssadmin
administrators
in use
9. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
system files
in use
peer-to-peer
.vhd
10. To configure NTFS file permissions from a command prompt or script - use the ______ command.
icacls
wbadmin start systemstatebackup
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
read - but not write
11. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Write
Read
removable flash drives
User files - System files - Program files
12. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
encryption certificates
User files - System files - Program files
icacls
Access-based Enumeration (ABE)
13. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
wbadmin start backup -backupTarget:L: -allCritical -quiet
Read & Execute
in its current state
vssadmin create shadow /For=C:
14. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
Full Control
BitLocker Drive
BranchCache
Windows 7 or Windows Server 2008 R2
15. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
You should run wbadmin
User files - System files - Program files
rootkits
read
16. To restore a system state backup - run:
You should run vssadmin
green
wbadmin start systemstaterecovery
wbadmin delete systemstatebackup
17. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
BitLocker
administrators
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
File Classification Infrastructure
18. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
Write
wbadmin delete systemstatebackup
read
Advanced
19. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
Data Recovery Agents (DRAs)
wbadmin start systemstaterecovery
vssadmin list shadows
read
20. With the ______ permissions - in addition to the Read permission - users can run applications.
Read & Execute
vssadmin create shadow /For=C:
wbadmin delete systemstatebackup
.vhd
21. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
BitLocker
Write
vssadmin list shadows
client-server
22. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
User files - System files - Program files
wbadmin delete systemstatebackup
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
read access
23. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
clients
Enterprise and Ultimate
wbadmin start backup -backupTarget:L: -include:C: -quiet
BranchCache
24. What command should you run to initiate a backup?
Modify
List Folder Contents
You should run wbadmin
read access
25. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
read access
server running Win Srvr 2008 R2
administrators
Read
26. With the ______ permissions - users can read - edit - and delete files and folders.
full control
Write
Modify
icacls
27. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
rootkits
System Image Recovery
BitLocker Drive
full control
28. What command should you run to configure shadow copies?
You should run vssadmin
.vhd
peer-to-peer
System Image Recovery
29. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
Read & Execute
in use
System Image Recovery
BitLocker
30. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
Advanced
read access
removable flash drives
encrypting
31. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
vssadmin list shadows
vssadmin list shadowstorage
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
wbadmin start backup -backupTarget:L: -allCritical -quiet
32. BranchCache clients must be running ______ or ______.
DFS
removable flash drives
read - but not write
Windows 7 or Windows Server 2008 R2
33. To encrypt entire volumes and protect system files - use ______ Encryption.
File Classification Infrastructure
.vhd
wbadmin start systemstaterecovery
BitLocker Drive
34. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Windows 7 or Windows Server 2008 R2
in its current state
clients
35. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
client-server
server running Win Srvr 2008 R2
peer-to-peer
green
36. To perform a backup of the system state - run:
wbadmin start systemstatebackup
server running Win Srvr 2008 R2
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
37. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
File Classification Infrastructure
clients
full control
Windows 7 or Windows Server 2008 R2
38. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
Data Recovery Agents (DRAs)
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
Full Control
client-server
39. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
Full Control
Read
User files - System files - Program files
Advanced
40. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
encryption certificates
User files - System files - Program files
DFS
read - but not write
41. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
Data Recovery Agents (DRAs)
in use
wbadmin start backup -backupTarget:L: -include:C: -quiet
system files
42. To create a hard limit of 100 MB - run the following command:
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
encryption certificates
DFSDiag
43. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
in use
Distributed Cache and Hosted Cache
You should run vssadmin
44. Run the following command to back up all critical files to the L drive
full control
dfsutil domain <domain_name>
Write
wbadmin start backup -backupTarget:L: -allCritical -quiet
45. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
Windows 7 or Windows Server 2008 R2
Write
Access-based Enumeration (ABE)
.vhd
46. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
You should run wbadmin
Read
Enterprise and Ultimate
List Folder Contents
47. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
You should run wbadmin
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Read & Execute
administrators
48. To view available shadow copies and the time they were created - run the following command:
wbadmin start systemstaterecovery
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
clients
vssadmin list shadows
49. To view the storage currently allocated to shadow copies - run the following command:
Write
vssadmin list shadowstorage
vssadmin create shadow /For=C:
in use
50. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
BranchCache
wbadmin start backup -backupTarget:L: -allCritical -quiet
DFS
User files - System files - Program files