Assignment 10 - File and Share Access and Print Services Flashcards

1
Q
  1. What is the difference between NTFS permissions and Share Permissions?
A

NTFS permissions apply to files and folders on NTFS partitions through the network or locally.

NTFS permissions have more options.

Share permissions apply to share folders over the network only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Identify and describe the 6 common NTFS permissions that can be configured.
A

Read – view folder details and attributes

Write – Change folder or file data and attributes

List folder contents – Includes all Read actions and adds the ability to view a folder’s contents

Read & Execute – Includes all Read actions and adds the ability to run programs

Modify – Includes all Read and Execute and Write actions and adds the ability to add or delete files

Full Control – Includes all other actions and adds the ability to take ownership of and change permissions on the folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is the difference between an explicit permission and an inherited permission?
A

An explicit permission is one that has been assigned by the administrator on a specific object. An inherited permission is set on a parent object such as a folder and applies to all objects in the folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which permission Allow or Deny takes precedence if both are applied?
A

Deny overrides Allow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is the result of moving a file or folder that has NTFS permissions assigned to a non-NTFS partition?
A

All permissions are removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What are some of the NTFS Special Permissions that can be assigned?
A

Some Special Permissions include Traverse Folder / Execute file, List Folder / Read Data, Read Attributes, Read Extended Attributes, Create Files / Write Data, Create Folders /Append Data, Write Attributes, Write Extended Attributes, Delete Subfolders and Files, Delete, Read Permissions, Change Permissions, Take Ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What are some best practices when applying permissions?
A

Assign permissions as high up in the folder structure as possible.

Assign permissions to groups rather than individual users.

Use Domain groups to set permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What are NTFS quotas?
A

NTFS quotas set limits on how much information a user can store on a partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Describe the difference between a Soft Quota and a Hard Quota?
A

A Soft Quota allows the user to exceed a quota limit and the administrator is notified about it.

A Hard Quota prevents the user from exceeding a quota limit and the administrator is notified about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which Windows Server feature is used to better manage disk quotas?
A

The File Server Resource Manager (FSRM) is an available feature to manage disk quotas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is ABE?
A

ABE is Access-Based Enumeration which restricts users from seeing files and folders to which they do not have access to when browsing content on a file server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is Volume Shadow Copy and how does it work?
A

VSC is a feature that makes copies of user files at regular intervals and is useful for recovering deleted files or folders, recovering previous versions of modified files, and compare files with previous versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is meant by ‘effective permissions’ with respect to files and folders?
A

Effective permissions refers to the overall access a user has to a file or folder. This is the cumulative effect of all permissions that have been applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is a common strategy for assigning permissions to files and folders?
A

Assign Share permissions to Everyone, restrict using NTFS permissions.

Assign shares to groups rather than individual users.

Add only necessary groups and assign only necessary permissions.

Do not create nested shares.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What are the differences between simple file sharing and advanced file sharing?
A

Simple File Sharing uses the name of the folder as the share name. Folder names should be short, contain no spaces, and uses the universal naming convention (UNC) to identify the location of the share.

Advanced File Sharing allows for a custom name for the share, allows multiple share names with different permissions to be assigned, and allows the use of offline files with Caching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is the basic format for a network share?
A

For locating network shares, use the Universal Naming Convention of \SERVER\SHARE.

You can also use the IP address of the server if the name is not known or a naming service is unavailable.

17
Q
  1. What is the effect of adding a $ to a share name?

.

A

The $ hides the share name from browsing

18
Q
  1. What does Caching allow users to do with shares?
A

Caching allows users to access shared files and folders when the server is offline.

19
Q
  1. What are the three advanced share permissions?
A

Read,
Change,
Full control

20
Q
  1. What is meant by permissions being cumulative?
A

If more than one permission is configured, the sum of all permissions determines the user’s access.

21
Q
  1. What is the Network File System (NFS) protocol?
A

The NFS protocol was the most commonly used file sharing protocol for UNIX systems. NFS allows users to mount the file systems of a remote computer and access the contents as if they were stored locally.

22
Q
  1. What sources are used to determine the effective permissions a user will have on a file or folder?
A

Sources used to determine the overall permission a user has include the explicit assignment, the group membership, and the inheritance setting.

23
Q
  1. What are some suggestions then planning NTFS permissions for files and folders?
A

Identify the users and their access needs.

Create groups for multiple users with similar needs.

Assign each group the permissions appropriate and necessary to the group’s data access needs.

Set permissions as high as possible on the parent container and allow each child container to inherit the permissions.

Override inheritance on a case-by-case basis.

Use the Deny permission carefully – remember Deny overrides Allow.

24
Q
  1. What role needs to be installed to configure and manage a shared printer in Windows Server 2016?
A

Install the Print and Document Services role.

25
Q
  1. What four services are available under the Print and Document Services role?
A

Print Server – installs the Print Management snap-in to manage multiple printers or print servers.

LPD Service – Line Printer Daemon Service which allows for UNIX based machines to print to shared printers.

Internet Printing – this service allows you to use a Web site to print to, share, and manage printers through a Web browser.

Distributed Scan Service – adds the Scan Management Snap-in used to manage network scanners and configure scan processes.

26
Q
  1. What are some features of the Print Management utility in Windows Server 2016?
A

The print management utility allows for the automatic installation of drivers, the establishment of printer queues, and the sharing of printers. In addition, you can set custom filters, printer permissions, printer pooling, deploy with Group Policy, manage print drivers, and manage documents in the print queue.

27
Q
  1. What three types of printer types can be configured in terms of location, printer type, and port type?
A

Directly connected as a local printer through LPT, USB, or COM port.
Directly connected as a local printer through a NIC using a TCP/IP address.
Network connected as a shared printer configured on a remote computer using a UNC path (\computername\sharename)

28
Q

What is the difference between a regular forwarder like the one just configured and a conditional
forwarder?

A

A regular forwarder tells the DNS server which addresses to forward unknown DNS name resolutions towards by default.

A conditional forwarder can be configured for specific DNS name resolutions rather than just a default – can be faster for some queries.