SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Managing Files
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.
vssadmin list shadows
server running Win Srvr 2008 R2
vssadmin create shadow /For=C:
encryption certificates
2. Any new folders or files created in the root of a disk will grant ______ full control and users read access.
administrators
dfsutil domain <domain_name>
client-server
Advanced
3. Windows Server Backup copies an entire disk volume to a ______ file on a second local disk.
You should run vssadmin
encrypting
wbadmin start systemstatebackup
.vhd
4. What command should you run to configure shadow copies?
Read
You should run vssadmin
in its current state
DFSDiag
5. The default NTFS file permissions for user and system folders are designed to meet basic needs. These default permissions for different file types are:
User files - System files - Program files
Enterprise and Ultimate
wbadmin delete systemstatebackup
DFS
6. With the ______ permissions - users can browse a folder but not necessarily open the files in it.
List Folder Contents
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
vssadmin list shadows
DFS
7. What command should you run to initiate a backup?
read access
BitLocker
You should run vssadmin
You should run wbadmin
8. With the ______ permissions - users can create files in a folder but not necessarily read them.
vssadmin create shadow /For=C:
system files
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Write
9. To perform a backup of the system state - run:
vssadmin list shadows
read access
wbadmin start systemstatebackup
system files
10. To troubleshoot DFS - use the ______ command-line tool.
wbadmin start systemstatebackup
Enterprise and Ultimate
DFSDiag
green
11. In Distributed Cache mode - BranchCache ______ cache a copy of remote files and share them with other clients in the same office.
Modify
System Image Recovery
Access-based Enumeration (ABE)
clients
12. To encrypt entire volumes and protect system files - use ______ Encryption.
BitLocker Drive
Access-based Enumeration (ABE)
DFS
Write
13. Administrators can assign users or groups any of the following permissions to a file or folder:
Enterprise and Ultimate
icacls
System Image Recovery
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
14. The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.
Write
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
wbadmin start systemstaterecovery
15. You can manage shadow copies from the command prompt by using the VSSAdmin tool. For example - to create a shadow copy of the C volume - run the following command with administrative privileges:
vssadmin create shadow /For=C:
dfsutil domain <domain_name>
Data Recovery Agents (DRAs)
wbadmin start systemstatebackup
16. If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.
read - but not write
green
vssadmin create shadow /For=C:
encryption certificates
17. You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:
full control
dfsutil domain <domain_name>
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
Write
18. A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.
BitLocker Drive
File Classification Infrastructure
read
in its current state
19. You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
You should run wbadmin
Modify
List Folder Contents
20. If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.
System Image Recovery
File Classification Infrastructure
You should run wbadmin
client-server
21. BranchCache clients must be running ______ or ______.
Write
encryption certificates
Windows 7 or Windows Server 2008 R2
File Classification Infrastructure
22. Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.
Data Recovery Agents (DRAs)
wbadmin start systemstatebackup
Full Control
client-server
23. Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.
peer-to-peer
wbadmin delete systemstatebackup
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
read - but not write
24. To restore a system state backup - run:
vssadmin list shadowstorage
wbadmin start systemstaterecovery
DFSDiag
Modify
25. To delete a system state backup - run:
wbadmin delete systemstatebackup
Read & Execute
Windows 7 or Windows Server 2008 R2
You should run wbadmin
26. With ______ - all shared folders can be accessible using a single network drive letter in Windows Explorer.
File Classification Infrastructure
wbadmin delete systemstatebackup
dfsutil domain <domain_name>
DFS
27. Run the following command to back up all critical files to the L drive
wbadmin start backup -backupTarget:L: -allCritical -quiet
DFS
Read & Execute
read access
28. Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.
DFSDiag
in use
wbadmin start backup -backupTarget:L: -allCritical -quiet
peer-to-peer
29. If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.
in use
peer-to-peer
full control
in its current state
30. Another data encryption technology - ______ - encrypts entire volumes and helps prevent operating system files from being maliciously modified.
icacls
DFSDiag
vssadmin create shadow /For=C:
BitLocker
31. BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.
Windows 7 or Windows Server 2008 R2
Enterprise and Ultimate
read access
administrators
32. To view available shadow copies and the time they were created - run the following command:
Read & Execute
vssadmin list shadows
You should run wbadmin
dfsutil domain <domain_name>
33. Additionally - there are more than a dozen special permissions that you can assign to a user or group. To assign special permissions - click the ______ button on the Security tab of the file or Administrator Properties dialog box
BitLocker Drive
icacls
Write
Advanced
34. To configure NTFS file permissions from a command prompt or script - use the ______ command.
User files - System files - Program files
icacls
List Folder Contents
clients
35. Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.
read access
DFS
Access-based Enumeration (ABE)
You should run vssadmin
36. BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.
read access
Modify
rootkits
read
37. With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.
Advanced
File Classification Infrastructure
You should run wbadmin
wbadmin start systemstatebackup
38. Windows 7 and Windows Server 2008 R2 support BitLocker-To-Go - which encrypts ______ by using a password.
Modify
removable flash drives
DFS
wbadmin start systemstatebackup
39. Shadow copies allow backup software to access files that are ______.
vssadmin create shadow /For=C:
Data Recovery Agents (DRAs)
Access-based Enumeration (ABE)
in use
40. You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:
system files
read
rootkits
wbadmin start backup -backupTarget:L: -include:C: -quiet
41. A user who does not have NTFS permissions to read a folder or file will not see it listed in the directory contents. This feature - known as ______ was introduced with Win Srvr 2003 SP1.
BranchCache
Access-based Enumeration (ABE)
encrypting
.vhd
42. Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.
wbadmin start backup -backupTarget:L: -allCritical -quiet
You should run vssadmin
dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard
full control
43. EFS protects files and folders by ______ them on the disk.
encrypting
read - but not write
system files
System Image Recovery
44. EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.
Read & Execute
Advanced
system files
File Classification Infrastructure
45. With the ______ permissions - users can perform any action on the file or folder - including creating and deleting it as well as modifying its permissions.
List Folder Contents
Full Control
removable flash drives
read
46. With the ______ permissions - users can read - edit - and delete files and folders.
User files - System files - Program files
Access-based Enumeration (ABE)
dfsutil domain <domain_name>
Modify
47. With the ______ permissions - users can view the contents of a folder and open files.
wbadmin start systemstaterecovery
List Folder Contents - Read - Read & Execute - Write - Modify - Full Control
Read
Full Control
48. To view the storage currently allocated to shadow copies - run the following command:
server running Win Srvr 2008 R2
vssadmin list shadowstorage
dirquota quota add /Path:C:\Shared /SourceTemplate:"200 MB Limit Reports To User"
read - but not write
49. ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.
You should run vssadmin
full control
File Classification Infrastructure
BranchCache
50. With the ______ permissions - in addition to the Read permission - users can run applications.
Write
DFS
Read & Execute
User files - System files - Program files