Final Flashcards

1
Q

T/F An organizational unit is a logical subgroup within Active Directory that you can
employ to locate resources used by a single workgroup, section, or department in a
company and apply policies that apply to only these resources.

A

True—An easily managed OU structure reflects some aspects of your company’s
internal organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F The main purpose of a security group is to create a distribution list for email
purposes. These groups have security information, such as unique security identifiers
(SIDs).

A

False—A distribution group is used to create a distribution list. These groups do
not possess SIDs and cannot be assigned permission to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F When you assign a single user or group full control of the entire domain, of a single
OU, or limited rights to a set of OUs, the permissions are not inheritable.

A

False—When you delegate control, the default behavior of AD DS is to make
such permissions inheritable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F Account operators, server operators, print operators, and backup operators are built-in
security groups that enable members to perform limited administrative capabilities
within the domain in which they are located.

A

True—AD DS provides several built-in security groups. You can add members to
these groups when their defined rights match the administrative capabilities you
want to confer to these users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F Some machine-local groups are similar in usage and membership to domain local
groups. These types of local groups do not exist in AD DS and grant users access to
resources on the local computer only.

A

True–For access to resources located on more than one computer in the domain,
always use domain local groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F To create an OU, you must be a member of the Account Operators group.

A

False–To create an OU, you must be a member of the Account Operators,
Domain Admins, or Enterprise Admins groups by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F There is a GUI version of the Active Directory Recycle Bin feature. By default, the
Recycle Bin is disabled, but you can enable it from within AD Administrative Center.
After the recycle bin is enabled, you cannot disable it.

A

True– When enabled, you have the ability to restore recently deleted items from
Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F You have the capability to assign a single user or group full control of the entire
domain, of a single OU, or limited rights to a set of OUs.

A

True–When you delegate control, keep in mind that the default behavior of AD
DS is to make such permissions inheritable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F If you run the Delegation of Control Wizard multiple times, permissions granted for
the OU are replaced each time with the new permissions.

A

False—Permissions are cumulative rather than having the wizard replace prior
permissions each time you run it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F In Active Directory Users and Computers to view the effective OU permissions
granted to a user or group, the Effective Permissions tab shows all granted
permissions, including inherited permissions.

A

True–This includes all permissions inherited through membership in other
Groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not one of the three types of user accounts present in an AD
DS network?

A

Enterprise user accounts
User accounts embody specific information pertinent to a user, such
as username, password, and specific logon limitations. User accounts can be
either built-in accounts or self-generated. Each user account has a comprehensive
set of configurable properties associated with it. Among these are group
memberships, logon scripts, logon hours, account expiration, user profile, and
dial-in permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Windows Server 2012 R2 group scope can be used to include users, computers,
and groups from any domain in the forest but cannot be employed to grant permissions to
any resource in the forest?

A

Domain local
Domain local groups can include users, computers, and groups from
any domain in the forest. They are most often utilized to grant permissions for
resources and can be used to provide access to any resource in the domain in
which they are located. It is thus logical for a domain local group to include
global groups that contain all users with a common need for a given resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You can organize your domain into logical subgroups called ________that enable you
to collect users, computers, and other resources for simplified local administration
according to your company’s organizational chart of departments, sections, work units,
and so on.

A

Organizational units
You can change this grouping of OUs easily if your company
reorganizes; such a task is much easier than attempting to re-create child domains
according to a new corporate structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A(n) _______ is used to collect a set of users who need to share a particular set of
permissions to a resource, such as a file, folder, or printer.

A

Group

. The available membership depends on the group scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A recommended group nesting strategy is ________________.

A

None of the above
Microsoft continues to recommend the same strategy for nesting
groups that it has supported since Windows NT 4.0. Place accounts (A) into
global groups (G). Add the global groups to domain local groups (DL). Assign
permissions (P) to the domain local groups. In short, this strategy is known as
AGDLP (Accounts to Global groups to Domain Local groups to Permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these is a built-in security group designed to enable members to perform
limited administrative tasks within the domain in which they are located?

A

Backup operators
AD DS provides several built-in security groups that enable members
to perform limited administrative capabilities within the domain in which they are
located. These include account operators, server operators, print operators, and
backup operators. You can add members to these groups when their defined rights
match the administrative capabilities you want to confer to these users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ________ group can include users and groups from any domain in the AD DS forest
and can be employed to grant permissions to any resource in the forest.

A

universal.
A universal group can include users, computers, and global groups
from any domain in the forest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Window Server 2012 R2 security group that is granted full rights to manage the
entire domain is the ________ group.

A

Domain Admins.
This group is automatically made a member of each member
server’s, member computer’s, and domain controller’s Administrators local groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Windows Server 2012 R2 security group that has full rights to manage the domain
controllers but not the entire domain is the ________group.

A

Administrators

This group is in the Built-in container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The group scope that can include users, computers, and other global groups from the
same domain is ________.

A

universal.
You can use universal groups to organize users who have similar
functions and therefore similar requirements on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Windows Server 2012 R2 includes the ________ feature, which provides guaranteed
message delivery, efficient routing, security, and priority-based messaging between
applications, including those that run on different operating systems.

A

Message Queuing.
You can install Message Queuing from the Add Roles and
Features Wizard in Server Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In determining a nesting strategy in a ________-domain forest, you do not need to use
universal groups.

A

single.

Use the AGDLP strategy only with a single-domain forest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The command-line command to add an OU to your domain would begin with
________.

A

dsadd.
In addition to the traditional tools, Windows Server 2012 R2 enables
you to perform this task from the Active Directory Administrative Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The __________ Wizard enables you to delegate administrative tasks.

A

Delegation of Control.
You access the wizard either through Active Directory
Users and Computers or Active Directory Administrative Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Domain local group

A

Can include users, computers, and groups from any domain in the forest but cannot be
employed to grant permissions to any resource in the forest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Global group

A

Can contain users from the same domain in which the global group is located, and
global groups can be added to domain local groups to control access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Universal group

A

Security group that can be used anywhere within a domain tree or forest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

AGDLP

A

Recommended group nesting strategy when universal groups are not involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Built-in group

A

Created by default when Windows or Active Directory is installed on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

AGUDLP

A

Nesting strategy involving universal groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Nesting

A

Act of creating a hierarchy of groups to provide users from different containers
(domains, OUs, and so on) access to the resources they require for their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Active Directory Administrative Center

A

Snap-in in Windows Server 2012 R2 that enables the administration of most Active
Directory functions from a single console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Security groups

A

Used to assign rights and permissions, and which have a SID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Distribution groups

A

Used for functions such as email, and which do not have SIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

T/F Group Policy is a set of configuration settings that can be applied to one or more
Active Directory Domain Services (AD DS) objects to define the behavior of the
object and its child objects

A

True—Group Policy is a set of configuration settings that can be applied to one
or more Active Directory Domain Services (AD DS) objects to define the
behavior of the object and its child objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

T/F The GPMC is installed when you install AD DS.

A

True—You can also install the GPMC on a member server by accessing the Add
Features Wizard in Server Manager. GPMC is also included in the Remote Server
Administration Tools package, which you can install on a client computer running
Windows 8.1 Pro or higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

T/F The Block Policy setting enables you to prevent GPOs that are linked to parent
containers from being applied at the lower level.

A

False—The Block Inheritance setting accomplishes this. A situation in which this
might be useful is where the administrator of an OU wants to control all GPOs
that apply to computers or users in the OU without inheriting settings from the
site or parent domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

T/F All Group Policy Objects are identified by their PolicyIDs.

A

False—Group Policy Objects are identified by their GUIDS. A GUID is a unique
128-bit number assigned when the GPO is first created. This number is stored as
an attribute of the object and is used to identify it within the AD DS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

T/F Group Policy Management Console is included by default with Windows Server 2012
R2 and is the sole location for managing all aspects of Group Policy.

A

True—You perform all Group Policy administrative activities, including creating,
editing, and applying GPOs from the GPMC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

T/F Group Policy Templates are objects that are defined within AD DS and are used to
store the properties of GPOs, including attributes and version information.

A

False—This describes Group Policy Containers, which contain subcontainers for
user and computer Group Policy data. Information as to whether the GPO is
enabled or disabled is also stored here. Being stored in AD DS, computers can
access GPCs to locate GPTs, and domain controllers can access them to obtain
version information, which verifies that they have the most recent edition of
GPOs. .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

T/F The Administrative Templates subcontainer is found under both the Computer and
User Configuration Policies containers and holds most of the settings that control the
appearance of the desktop environment.

A

True— There is an All Settings subnode that provides a comprehensive list of all
policy settings that you can sort according to name, state, comment, or path, or
filter according to several criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

T/F The folder hierarchy composed of the Group Policy Containers folder at the top and
subfolders under it holds all the information for a given GPO.

A

False—This describes the Group Policy Templates folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

T/F Group Policy Containers are sets of Group Policies.

A

False—A Group Policy Object is a set of Group Policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

T/F Computer policies are computer-specific and are applied when the computer starts up,
and user policies are user-specific and are applied when the user logs on to the
computer.

A

True— Group Policy can be applied to server and client computers running
Windows 2000 and up and includes both computer and user settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Group policy is a group of policies that are applied together. It is a set of
configuration settings that can be applied to one or more Active Directory Domain
Services (AD DS) objects to define the behavior of the object and its
______________.

A

Child objects
The policies are contained in sets known as Group Policy objects
(GPOs). In turn, the content of GPOs is stored in two different locations: Group
Policy containers (GPCs), which are Directory Services objects that include
subcontainers for machine and user Group Policy information, and Group Policy
templates (GPTs), which are folder structures including a GPT folder and its
subfolders that together contain all the Group Policy information including the
actual policy settings for any particular GPO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

All GPOs are identified by their ________.

A

Globally Unique Identifier (GUID)
A GUID is a unique 128-bit number assigned when the GPO is first
created. This number is stored as an attribute of the object and is used to identify
it within the AD DS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Group Policy __________are objects that are defined within AD DS and are used to
store the properties of GPOs, including attributes and version information.

A

Containers
Group Policy Containers contain subcontainers for user and computer
Group Policy data. Information as to whether the GPO is enabled or disabled is
also stored here. Being stored in AD DS, computers can access GPCs to locate
GPTs, and domain controllers can access them to obtain version information,
which verifies that they have the most recent edition of GPOs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The folder hierarchy is composed of the Group Policy __________ folder at the top
and subfolders under it. This structure holds all the information for a given GPO.

A

Templates
Every domain has associated with it a folder hierarchy found in the
domain controllers at the shared folder
%systemroot%\SYSVOL\sysvol\Policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

________ is the sole location for managing all aspects of Group Policy.

A

Group Policy Management Console
You perform all Group Policy administrative activities, including
creating, editing, and applying GPOs from the GPMC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The subcontainer found under both the Computer and User Configuration Policies
containers that holds most of the settings that control the appearance of the desktop
environment is called ___________.

A

Administrative templates
There is an All Settings subnode that provides a comprehensive list of
all policy settings that you can sort according to name, state, comment, or path, or
filter according to several criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The subcontainer found under both the subcontainer found under both the Computer
and User Configuration Policies and Preferences containers that holds script and
security settings is called _________.

A

Windows Settings
The Windows Settings subcontainer contains other policy settings that
affect the behavior of the Windows environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

When you create a new GPO or edit an existing one, and if you have configured new
settings in the Computer Configuration node, users affected by the GPO must
_______.

A

Reboot their computers
If you have configured new settings in the Computer Configuration
node, users must reboot their computers to receive the new settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

When you create a new GPO or edit an existing one, users affected by the GPO must
_______.

A

Log off and log back on again
Users need only log off and log on for new settings to apply. If you
have configured new settings in the Computer Configuration node, users must
reboot their computers to receive the new settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

By default, only members of the Domain Admins and Group Policy Creator Owners
groups have permissions to ________.

A

Create GPOs
You can delegate control of Group Policy objects to users and groups
to enable partial administrative control and ease the overall burden of
administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

It is possible to edit a GPO from any writable domain controller, or even to connect to
a writable domain controller from a client computer running ________.

A

Both Windows 8.1 Pro and Windows 8.1 Enterprise
When you connect, you might want to specify which domain
controller you are working against.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

By default, which GPO is applied first?

A

Local
Because all computer-specific settings are applied before user logon
and user-specific settings are applied after logon, any user-specific setting, even a
local one, would override a conflicting computer-specific setting applied at any
level.

57
Q

If you can create a nested hierarchy of OUs, when more than one level of OU is
present, policies linked to the parent OU are applied first, followed by
a. Sites, Domains, and Child OUs in order
b. Domains, Sites, and Child OUs in order
c. Child OUs in order
d. None of the above

A

None of the above
Consequently, the lowest-level OU policy becomes the determining
factor should conflicts in the various GPOs arise.

58
Q

The Block _________ setting enables you to prevent GPOs that are linked to parent
containers from being applied at the lower level.

A

Inheritance
A situation in which this might be useful is where the administrator of
an OU wants to control all GPOs that apply to computers or users in the OU
without inheriting settings from the site or parent domain.

59
Q

The section of Group Policy from which administrators can configure settings that are
applied to users’ desktops, specify programs that users can run, and so on is called
________.

A

Administrative Templates

They apply changes to client computer Registry settings.

60
Q

Administrative templates

A

The principal means of administering the user environment and controlling the end
user interface

61
Q

Block Inheritance

A

Setting that enables you to prevent GPOs that are linked to parent containers from
being applied at the lower level

62
Q

Globally Unique Identifier (GUID)

A

Used to identify GPOs

63
Q

Group Policy Containers

A

Objects that are defined within AD DS and are used to store the properties of GPOs,
including attributes and version information

64
Q

Local, Site, Domain, OU

A

Order in which Group Policy is applied

65
Q

Windows Settings

A

Subcontainer found under both the subcontainer found under both the Computer and
User Configuration Policies and Preferences containers that holds script and security
settings

66
Q

Group Policy Management Console

A

The sole location for managing all aspects of Group Policy

67
Q

Group Policy Templates

A

The top of the folder hierarchy with subfolders under it. This structure holds all the
information for a given GPO

68
Q

Root Container

A

Defines the focus of the Group Policy Management Editor by showing the GPO being
edited plus the fully qualified domain name (FQDN) of the domain controller from which
you are working

69
Q

Group Policy Object

A

Collection of policies that apply to a specific target, such as the domain itself (Default
Domain Policy) or an OU

70
Q

T/F The File and Storage Services role is installed by default in Windows Server 2012
and Windows Server 2012 R2.

A

True—The role is installed and cannot be removed.

71
Q
T/F The Distributed File System (DFS) feature enables file sharing among servers running
Windows and UNIX. Added in Windows Server 2012 R2 is an NFS module for
Windows PowerShell with several new cmdlets specific to NFS.
A

False—This describes Services for Network File System (NFS).

72
Q

T/F To share files with other users across the network, you must manually do so for each
folder containing the files that you want to share.

A

True—Shared folders are folders on the local hard drive that other users on a
network can connect to.

73
Q

T/F You should always grant the most restrictive permissions necessary for a network
user to conduct work on those files.

A

True—Granting just enough permission without being too lenient requires careful
consideration. If you are too stringent, users can’t get their jobs done. If you are
too lenient, the data is at risk.

74
Q

T/F Share permissions are more granular than Security permissions.

A

False—There is a greater range of Security permissions.

75
Q

T/F Offline files are stored on the local computer in a special area of the hard drive called
a cache.

A

True—Specifically, the cache is located at %systemroot%\CSC, where CSC
stands for client-side caching.

76
Q

T/F Whoever creates a file or folder automatically becomes the owner and, by default, has
Full Control permissions on that file or folder.

A

True– If that person is a member of the Administrators group, the Administrators
group becomes the owner.

77
Q

T/F All NTFS permissions are inherited, that is, they pass down through the folder
hierarchy from parent to child.

A

True— Permissions assigned to a parent folder are inherited by all the files in that
folder and by the subfolders contained in the parent folder as well.

78
Q

T/F If the user is accessing a shared folder on the computer where it exists, shared folder
permissions apply.

A

False—Shared folder permissions apply only remotely, not locally.

79
Q

T/F If a file is copied from an NTFS partition to a FAT partition, the file loses its NTFS
permissions completely.

A

True—NTFS permissions cannot apply anywhere else but on an NTFS partition.

80
Q

. __________ is a set of tools that enable you to manage resources used by files and
folders on your server by performing such tasks as limiting the amount of space used
by users, restricting the types of files being saved, and monitoring the amount of
storage used

A

File Server Resource Manager (FSRM)
Updates to FSRM in Windows Server 2012 R2 include improvements in
file classification and management, customized Access Denied messages for
Windows 8/8.1 clients, and Dynamic Access Control.

81
Q

Share permissions can be assigned to ____________.

A

Both users and groups
When a directory (folder) is shared, you can grant each user and each
group one of the three types of permissions for the share and all its subdirectories and
files or choose to specifically deny them those permissions.

82
Q

Share permissions apply __________.

A

Over the network only
. Share permissions apply only over the network (remotely). Security
permissions apply both locally and remotely.

83
Q

The NTFS ________ permission enables the user to delete a folder as well as grant a
user the Read permission and the List Folder Contents permission.

A

Modify
Modify permission also enables a user to modify a file’s contents and
delete the file as well as perform all actions allowed by Write permission and Read
and Execute permission.

84
Q

If you copy a file or folder that is configured with NTFS permissions within the same
partition __________.

A

The copy inherits the NTFS permissions of the destination folder
If you copy a file or folder from one NTFS partition to another NTFS
partition, the copy loses its NTFS permissions completely.

85
Q

The __________ feature of File and Storage Services in Windows Server 2012 and
Windows Server 2012 R2 enables users to store and access work data on personal
computers, tablets, smartphones, and other devices.

A

Work Folders.

Users can then access this data in a consistent manner.

86
Q

The Advanced sharing setting that enables the computer to locate other computers
and devices on the network and enables these computers to locate your computer is
____________.

A

Network discovery
. It is expected that you would never turn this option off
on a server.

87
Q

Associating a shared folder on another computer with an available drive letter on your
computer is called ________ a drive.

A

mapping.

You may use any available letter to map the resource.

88
Q

The concept of _________ enables client computers to temporarily cache files
obtained across a slow WAN link more aggressively, thereby reducing the number of
times the client might have to retrieve the file across the slow link

A

transparent file caching.
Use of transparent caching also serves to reduce
bandwidth consumption across the WAN link.

89
Q

The owner of a file or folder may deny Administrators access to a resource. But an
administrator can exercise the optional right to take ________of any resource to gain
access to it.

A

ownership.
By taking ownership, the Administrator may then apply or
change permissions on a folder or file.

90
Q

Your _________NTFS permissions are a combination of all permissions configured
for your user account and for the groups of which you are a member.

A

effective.
In other words, the effective permission is the least restrictive of
all permissions that you have.

91
Q

If a user is accessing a shared folder over the network and it has both shared folder
and NTFS permissions applied to it, the ________restrictive permission is the
effective permission.

A

most .
For example, if a user has Full Control NTFS permission on a folder
but accesses it across the network where he has Read shared folder permission, his
effective permission is Read.

92
Q

When you move a file or folder from one NTFS partition to another NTFS partition,
the file or folder _________ the NTFS permissions of the destination folder

A

inherits.
This is the same behavior as if you copied a file from one NTFS
partition to another

93
Q

You can enable disk and volume quotas from File Explorer or from the FSRM
console. Enabling quotas from __________ permits you to set different quotas for
different users

A

File Explorer.
The quotas apply to all folders within the specified volume.
Enabling quotas from FSRM permits you to set quotas that apply to given folders
(such as shares) on the server; however, you cannot specify different quota levels for
different users when using FSRM.

94
Q

Volume Shadow Copy Services (VSS) creates point-in-time copies, known as
snapshots, of user files located on server shares. With just a few clicks, users can roll
back to previous versions of the files.

A

snapshots.
Shadow copies are created based on configurable intervals. The
amount of copies stored on the server depends on available storage and the rate of file
change.

95
Q

Always offline mode

A

A new Offline Files mode in Windows Server 2012 R2 that enables faster access to
cached files and redirected folders in an AD DS environment

96
Q

File and Storage Services role

A

A server role that provides utilities that enable you to manage files, folders, and other
shared resources. It’s installed by default when you install Windows Server 2012 R2.

97
Q

Network File System (NFS)

A

Technology that enables UNIX to share files and applications across the network

98
Q

New Technology File System (NTFS)

A

The file system originally provided with Windows NT and present in modern server
versions that supports volume mounting, compression, encryption, and security

99
Q

Offline files

A

Enables you to cache locally stored copies of shared files and folders, so that you can
work with them while offline and resynchronize your changes when you go back online

100
Q

Server Message Block (SMB)

A

A network file sharing protocol that enables applications to read and write data and
request information from programs on network servers

101
Q

Volume Shadow Services (VSS)

A

The infrastructure required to create copies of files on your server for the purpose of
quick restores of previous versions

102
Q

Work folders

A

Role service in the Windows Server 2012 R2 File and Storage Services server role that
enables users to access data on a file server from any remote location without the need for
a VPN connection

103
Q

Shared folders

A

Folders that are made available for access by users who are working at another
computer on the network

104
Q

Snapshot

A

The concept of creating a point-in-time copy of a file or virtual machine

105
Q

T/F A print driver is the program that converts graphics commands into instructions a
given type of print device can understand.

A

True—New in Windows Server 2012 is the V4 print driver model, which
includes changes to printer sharing called Enhanced Point and Print.

106
Q

T/F A printer is the physical (hardware) device that produces the printed output.

A

False—A printer is the software (logical) interface between the operating system
and the print device. In other words, a printer is part of the software, and a print
device is hardware.

107
Q

T/F By itself, Windows Server 2012 R2 cannot act as a print server.

A

False—Windows Server 2012 R2 is a capable print server that provides a large
range of capabilities for working with printers and documents, much like the
capabilities that were included with previous Windows Server versions.

108
Q

T/F You can install a printer on your Windows Server 2012 R2 computer from Control
Panel even without installing the Print and Document Services server role.

A

True–If you’ve installed this role, you can also install a printer from the Print
Management snap-in.

109
Q

T/F You can configure printer sharing at any time.

A

True—You can also share a printer at the time you install it.

110
Q

T/F Branch Office Direct Printing is a new technology included in Windows Server 2012
and updated in Windows Server 2012 R2.

A

True–It was designed to help reduce bandwidth costs by reducing the amount of
printing traffic that would traverse WAN links.

111
Q

T/F Branch Office Direct Printing is supported only by Windows 8/8.1 and Windows
Server 2012/R2 clients.

A

True– Any clients prior can still use the print server but not take advantage of the
Client Side Rendering functionality.

112
Q

T/F You can configure only Easy Print Driver settings using Group Policy, not local
policy.

A

False—You can use local or Group Policy, and when dealing with multiple
servers, Group Policy is a more suitable approach.

113
Q

T/F You can assign permissions to printers, but not audit their usage.

A

False—Like any other shared resources, you can assign permissions, and audit
their usage.

114
Q

T/F A printer pool is a group of print devices that are connected to a single printer through
multiple ports on the print server.

A

True–These print devices should be the same make and model so that they use
the same printer driver.

115
Q

The software interface (such as LPT1) between the computer and the print device is
the _________.

A

Distributed Scan Server
The Print Server role service is included by default. You can select any
of the listed role services.

116
Q

Group Policy enables you to deploy printers in an AD DS domain environment,
automatically making printer connections available to users and computers in the
domain or organizational unit (OU).

A

Assigning

You would add a printer to a Group Policy Object (GPO).

117
Q

The V_ printing model eliminated many of the previous struggles with printer drivers.

A

4
. Printing challenges became a bit easier with the release of Windows
Server 2008 and the V4 printing model.

118
Q

A ________ is a printer that is equipped with its own network adapter card and
connected to the network.

A

Network
When you try to add a Bluetooth, wireless, or network discoverable
printer, Windows searches for network.

119
Q

The waiting area where print jobs are stored and sequenced as they await the print
device is the print ________.

A

queue.
Jobs are sequenced according to the order in which they are received
as well as priority settings.

120
Q

Print ________ is the act of writing the contents of a print job to disk before sending
it on to the print device.

A

spooling.
This can improve performance by eliminating the print device as a
bottleneck that ties up the operating system or an application until the entire print job
is output by the print device.

121
Q

The Print Server role service that enables UNIX clients to use the LPR utility to print
documents to Windows-based printers on the network is ________

A

LPD Service
. Other role services are Distributed Scan Server and Internet
Printing.

122
Q

If the printer produces a series of unintelligible characters rather than the expected
output, the problem lies in the printer ________.

A

driver.

Unreadable output indicates incorrect printer drivers.

123
Q

If your print server is part of an Active Directory Domain Services (AD DS) domain,
you can ________ the printer to facilitate the task of users locating printers installed
on the server.

A

publish

You can do this in the Print Management snap-in

124
Q

Similar to the concept of the enhanced Point and Print driver, the ________ is used
with Remote Desktop Services, formerly known as Terminal Services. As client
computers connect, their local printers can be redirected into the Remote Desktop
session.

A

Easy Print Driver.
This means that printers configured on the client
computer are automatically carried into the remote desktop or Terminal Server
session.

125
Q

To client computers, the printer ________appears as though it were a single printer.

A

pool.
When users submit print jobs to the printer pool, the jobs are printed
on any available print device.

126
Q

The ________ printer permission enables users to connect to the printer to print
documents and control settings for their own documents only.

A

print.

Users can pause, delete, and restart their own jobs only.

127
Q

Introduced in Windows Server 2008 R2 and continued in Windows Server 2012 and
Windows Server 2012 R2 is the concept of location-________default printer settings.
Users with mobile computers running Windows 7 Professional, Enterprise, or
Ultimate; Windows 8 or 8.1 Pro; or Enterprise can configure a different default
printer according to the network to which they are connected.

A

aware.
For example, a user can specify a default printer when in the office
and a different default printer set for home

128
Q

You might notice that no print jobs are coming out and the hard drive on the print
server appears to be thrashing. If this happens, you need to stop and ________ the
spooler service.

A

restart.

Sometimes print jobs get stuck in the spooler

129
Q

Branch Office Direct Printing

A

A printer setting that is designed to conserve bandwidth and allow client printing if a
print server failure occurs

130
Q

Easy Printer Driver

A

A universal cross-platform-compatible used to simplify driver management when
using Remote Desktop Services

131
Q

Print device

A

The hardware device that produces the printed output

132
Q

Print driver

A

The program that converts graphics commands into instructions that a type of print
device can understand

133
Q

Print pooling

A

The act of setting up two or more physical printers (print devices), each associated with
a single printer

134
Q

Print spooler

A

An area on a computer’s hard drive where documents to be printed are stored while
awaiting printing

135
Q

Printer priority

A

A number from 1 to 99 that determines which document is printed first

136
Q

Local printer

A

A printer that is connected directly to a computer

137
Q

Location-aware printing

A

A printer setting that enables a user with a portable computer to print to a printer
physically located close to her computer

138
Q

Printer

A

The software interface between the operating system and the print device that
determines various aspects of the printing process