C04.Managing Data Access Flashcards
- You are hired by a friend to set up a network in their home. They have four machines in their home that are all connected by an ISP wireless router. The systems can’t share documents because there is currently no network sharing in place. They want to be able to share audio and video files among their family. How can you easily set up a network? Choose two.
A. Install a Windows Server 2008 R2 domain controller.
B. Create a HomeGroup.
C. All audio and video files should be moved to the HomeGroup libraries.
D. Move all audio and video files to a shared folder on the Windows Server 2008 R2 machine.
B. Create a HomeGroup.
C. All audio and video files should be moved to the HomeGroup libraries.
- B, C. Create a new HomeGroup and set the password. Use that password and join all computers to the same HomeGroup. By default, all files in the HomeGroup libraries are available to all members of the HomeGroup.
- You are the network administrator for a large organization. You have a Windows 10 machine that needs to prevent any user for copying unencrypted files from the Windows 10 machine to any removable disk. How do you accomplish this task?
A. Within the System icon in Control Panel, set the BitLocker Drive encryption.
B. Within the Hardware icon in Control Panel, set the BitLocker Drive encryption.
C. Within the Device Manager icon in Control Panel, set the BitLocker Drive encryption.
D. Within a Local Group Policy, set the BitLocker Drive encryption.
D. Within a Local Group Policy, set the BitLocker Drive encryption.
- D. Windows 10 come with a feature called BitLocker Drive Encryption. BitLocker encrypts the entire system drive. New files added to this drive are encrypted automatically. To configure BitLocker, you must either use a Local Group Policy or use the BitLocker icon in Control Panel.
- Which editions of Windows 10 can you enable BitLocker? Choose all that apply.
A. Windows 10 Education Edition
B. Windows 10 Basic Edition
C. Windows 10 Professional Edition
D. Windows 10 Enterprise Edition
A. Windows 10 Education Edition
C. Windows 10 Professional Edition
D. Windows 10 Enterprise Edition
- A, C, D. BitLocker Drive Encryption is a data protection feature available in Windows Education, Enterprise, and Professional editions of Windows 10.
- You have a network folder that resides on an NTFS partition on a Windows 10 computer. NTFS permissions and share permissions have been applied. Which of the following statements best describes how share permissions and NTFS permissions work together if they have been applied to the same folder?
A. The NTFS permissions will always take precedence.
B. The share permissions will always take precedence.
C. The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is less restrictive will be applied.
D. The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is more restrictive will be applied.
D. The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is more restrictive will be applied.
- D. When both NTFS and share permissions have been applied, the system looks at the effective rights for NTFS and share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permissions.
- You are the network administrator for a medium-sized company. Rick was the head of HR and recently resigned. John has been hired to replace Rick and has been given Rick’s laptop. You want John to have access to all of the resources to which Rick had access. What is the easiest way to manage the transition?
A. Rename Rick’s account to John.
B. Copy Rick’s account and call the copied account John.
C. Go into the Registry and do a search and replace to replace all of Rick’s entries with John’s name.
D. Take ownership of all of Rick’s resources and assign John Full Control to the resources.
A. Rename Rick’s account to John.
- A. The easiest way to manage this transition is to simply rename Rick’s account to John. It is very important to remember that rights and permissions get associated to a user’s SID number and not a username. By renaming Rick’s account to John, John will automatically have all of the rights and permissions to any resource that Rick had access to.
- Jeff, the IT manager for Stormwind, has been asked to give Tom the rights to read and change documents in the Stormwind Documents folder. The following table shows the current permissions on the shared folder:
Group/User -NTFS- Shared Sales - Read - Change Marketing -Modify- Change R&D -Deny- Full Control Finance -Read- Read Tom -Read- Change
Tom is a member of the Sales and Finance groups. When Tom accesses the Stormwind Documents folder, he can read all the files, but the system won’t let him change or delete files. What do you need to do to give Tom the minimum amount of rights to do his job?
A. Give Sales Full Control to shared permissions.
B. Give Tom Full Control to NTFS security.
C. Give Finance Change to shared permissions.
D. Give Finance Modify to NTFS security.
E. Give Tom Modify to NTFS security.
E. Give Tom Modify to NTFS security.
- E. By giving Tom Modify on the NTFS security setting, you’re giving him just enough to do his job. You could also give Sales or Finance the Modify permission, but then everyone in those groups would be able to delete, change, and do more than they all need. Also, Tom does not need Full Control to change or delete files.
- You are the IT manager for your company. You have been asked to give the Admin group the rights to read, change, and assign permissions to documents in the Stormwind Documents folder. The following table shows the current permissions on the Stormwind Documents shared folder:
Group/User -NTFS- Shared Sales - Read - Change Marketing -Modify- Change R&D -Deny- Full Control Finance -Read- Read Admin -Change- Change
What do you need to do to give the Admin group the rights to do their job? (Choose all that apply.)
A. Give Sales Full Control to shared permissions.
B. Give Full Control to NTFS security.
C. Give Admin Full Control to shared permissions.
D. Give Finance Modify to NTFS security.
E. Give Admin Full Control to NTFS security.
C. Give Admin Full Control to shared permissions.
E. Give Admin Full Control to NTFS security.
- C, E. The Admin group needs Full Control on the NTFS security and shared permission settings in order to do their job. To be able to give other users permissions, you must have the Full Control permission.
- Vincent is an instructor for Stormwind, and he is talking to Jeff, the company’s IT manager. Vince asks Jeff to implement some type of two-factor authentication. What can Jeff install to complete this request?
A. Passwords and usernames
B. Retina scanners
C. Fingerprint scanners
D. Smart cards
D. Smart cards
- D. Smart cards are plastic cards (the size of a credit card) that can be used in combination with other methods of authentication. This process of using a smart card along with another authentication method is called two-factor authentication or multifactor authentication.
- You are using Windows 10 and you have created a file with called “my text” in Notepad and has a .txt extension type. You need to change the extension type from .txt to .vbx. What setting do you need to change on the folder so that you can see the extension types?
A. Uncheck Hide Extensions For Known File Types
B. Check Unhide Extensions For Files
C. Check show Extensions For Files
D. Uncheck Hide All File Types
A. Uncheck Hide Extensions For Known File Types
- A. File extensions for known files are hidden by default. If you want to be able to see the file extension for all files, you must uncheck the Hide Extensions For Known File Types box.
- The owner of your company has come to you and stated that they want all of the hardware on all systems to use BitLocker and BitLocker To Go. What utility should you install to help manage and maintain BitLocker and BitLocker To Go?
A. MAAM
B. MBAM
C. MNBM
D. MABM
B. MBAM
- B. Microsoft BitLocker Administration and Monitoring (MBAM) will allow the IT department to use enterprise-based utilities for managing and maintaining BitLocker and Bit-Locker To Go.