SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Write
You should run wbadmin
read access
Read
2. BranchCache clients must be running ______ or ______.
in use
wbadmin start backup -backupTarget:L: -include:C: -quiet
Access-based Enumeration (ABE)
Windows 7 or Windows Server 2008 R2
3. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
green
Write
System Image Recovery
Modify
4. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
rootkits
File Classification Infrastructure
full control
wbadmin start backup -backupTarget:L: -include:C: -quiet
5. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
read - but not write
Write
peer-to-peer
System Image Recovery
6. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
Full Control
system files
rootkits
.vhd
7. What command should you run to initiate a backup?
icacls
DFSDiag
Data Recovery Agents (DRAs)
You should run wbadmin
8. Run the following command to back up all critical files to the L drive
Full Control
read
BranchCache
wbadmin start backup -backupTarget:L: -allCritical -quiet
9. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
Full Control
File Classification Infrastructure
Enterprise and Ultimate
User files - System files - Program files
10. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
Modify
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
read access
DFSDiag
11. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
wbadmin delete systemstatebackup
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
in its current state
Write
12. With the ______ permissions - users can create files in a folder but not necessarily read them.
read
BranchCache
Write
read access
13. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
wbadmin start systemstatebackup
vssadmin create shadow /For=C:
administrators
vssadmin list shadows
14. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
wbadmin start systemstaterecovery
You should run vssadmin
administrators
File Classification Infrastructure
15. What command should you run to configure shadow copies?
You should run vssadmin
vssadmin create shadow /For=C:
DFS
encrypting
16. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
server running Win Srvr 2008 R2
client-server
System Image Recovery
List Folder Contents
17. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
Access-based Enumeration (ABE)
wbadmin start backup -backupTarget:L: -include:C: -quiet
read access
Enterprise and Ultimate
18. If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.
List Folder Contents
in use
encryption certificates
in its current state
19. To configure NTFS file permissions from a command prompt or script - use the ______ command.
icacls
clients
Read
dfsutil domain <domain_name>
20. EFS protects files and folders by ______ them on the disk.
read
You should run wbadmin
encrypting
administrators
21. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
dfsutil domain <domain_name>
vssadmin list shadows
administrators
You should run vssadmin
22. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
wbadmin delete systemstatebackup
List Folder Contents
removable flash drives
read - but not write
23. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
BitLocker Drive
File Classification Infrastructure
client-server
Access-based Enumeration (ABE)
24. To view the storage currently allocated to shadow copies - run the following command:
BitLocker
File Classification Infrastructure
read
vssadmin list shadowstorage
25. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
Distributed Cache and Hosted Cache
Write
client-server
vssadmin list shadowstorage
26. To encrypt entire volumes and protect system files - use ______ Encryption.
Write
in use
BitLocker Drive
Advanced
27. To restore a system state backup - run:
BitLocker Drive
wbadmin start systemstaterecovery
List Folder Contents
system files
28. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
encryption certificates
User files - System files - Program files
wbadmin start systemstatebackup
administrators
29. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
DFS
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
encryption certificates
removable flash drives
30. BranchCache can operate in two modes: ______.
DFS
read - but not write
Distributed Cache and Hosted Cache
Windows 7 or Windows Server 2008 R2
31. To perform a backup of the system state - run:
Access-based Enumeration (ABE)
wbadmin start systemstatebackup
encryption certificates
read - but not write
32. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
administrators
System Image Recovery
Advanced
Read
33. Administrators can assign users or groups any of the following permissions to a file or folder:
DFSDiag
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
in its current state
Write
34. With the ______ permissions - in addition to the Read permission - users can run applications.
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Modify
Data Recovery Agents (DRAs)
Read & Execute
35. To view available shadow copies and the time they were created - run the following command:
Modify
vssadmin create shadow /For=C:
in its current state
vssadmin list shadows
36. ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.
BitLocker Drive
DFS
Read
Data Recovery Agents (DRAs)
37. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
Write
BitLocker
icacls
BitLocker Drive
38. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
wbadmin start backup -backupTarget:L: -include:C: -quiet
BranchCache
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
client-server
39. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
wbadmin start systemstatebackup
dfsutil domain <domain_name>
User files - System files - Program files
client-server
40. To delete a system state backup - run:
Modify
encryption certificates
wbadmin delete systemstatebackup
read access
41. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
Windows 7 or Windows Server 2008 R2
encrypting
system files
42. To create a hard limit of 100 MB - run the following command:
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
client-server
User files - System files - Program files
wbadmin start backup -backupTarget:L: -allCritical -quiet
43. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
in its current state
clients
wbadmin start systemstatebackup
removable flash drives
44. To troubleshoot DFS - use the ______ command-line tool.
DFSDiag
encrypting
wbadmin start backup -backupTarget:L: -include:C: -quiet
vssadmin list shadows
45. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
Advanced
dfsutil domain <domain_name>
encryption certificates
.vhd
46. Shadow copies allow backup software to access files that are ______.
vssadmin list shadows
in use
Advanced
Enterprise and Ultimate
47. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
BitLocker Drive
removable flash drives
DFS
icacls
48. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
wbadmin start systemstatebackup
green
Advanced
vssadmin list shadowstorage
49. With the ______ permissions - users can read - edit - and delete files and folders.
peer-to-peer
in use
Modify
Enterprise and Ultimate
50. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
List Folder Contents
read
wbadmin start systemstaterecovery
Windows 7 or Windows Server 2008 R2