Lesson 6: File and Print Services Flashcards
- What is used to grant access to objects such as NTFS files or Active Directory user accounts?
a) right
b) permission
c) certificate
d) template
Answer: b) permission
Difficulty: Easy
Section Reference: Introducing NTFS
Explanation: A permission is defined as the type of access granted to objects such as NTFS files and folders.
- Permissions assigned to an NTFS file are stored in a ______.
a) certificate
b) template
c) ACL
d) group
Answer: c) ACL
Difficulty: Medium
Section Reference: Introducing NTFS
Explanation: When files and folders are created on an NTFS volume, a security descriptor known as an Access Control List (ACL) is created.
- What is the minimum permission needed to change the attributes of a file?
a) Full Control
b) Modify
c) Read & Execute
d) Write
Answer: d) Write
Difficulty: Medium
Section Reference: Setting NTFS Permissions
Explanation: The Write permission allows the identity to write to a file, append to the file, and read or change the file’s attributes.
- What is the minimum permission needed to take ownership of a file or folder?
a) Full Control
b) Modify
c) Read & Execute
d) Write
Answer: a) Full Control
Difficulty: Medium
Section Reference: Setting NTFS Permissions
Explanation: The Full Control permission allows you to read, write, modify, and execute files in a folder; change attributes and permissions; and take ownership of a folder or the files within it.
- What permissions are directly assigned to a file or folder?
a) explicit permissions
b) inherited permissions
c) assigned permissions
d) booted permissions
Answer: a) explicit permissions
Difficulty: Easy
Section Reference: Looking at Effective NTFS Permissions
Explanation: Two types of permissions are used in NTFS. Explicit permissions are those granted directly to a file or folder.
- What permission always wins out?
a) Explicit Allow Full Control
b) Explicit Deny Full Control
c) Inherited Allow Full Control
d) Inherited Deny Full Control
Answer: b) Explicit Deny Full Control
Difficulty: Easy
Section Reference: Looking at Effective NTFS Permissions
Explanation: Besides granting the Allow permissions, you can also grant the Deny permission. The Deny permission always overrides other permissions that have been granted, including when a user or group has been given Full Control.
- What happens to a file’s permissions if you copy it from one volume to another?
a) The file will have the permissions as before.
b) The file will acquire the permissions of the target folder.
c) The file will acquire the permission of the source folder.
d) The file will have no permissions.
Answer: b) The file will acquire the permissions of the target folder.
Difficulty: Medium
Section Reference: Copying and Moving Files
Explanation: If a folder or file is copied, the new folder or file will automatically acquire the permissions of the drive or folder to which it is being copied.
- What happens to those permissions of a file if you move to a folder within the same volume?
a) The file will have the permissions as before.
b) The file will acquire the permissions of the target folder.
c) The file will acquire the permission of the source folder.
d) The file will have no permissions.
Answer: a) The file will have the permissions as before.
Difficulty: Medium
Section Reference: Copying and Moving Files
Explanation: If a folder or file is moved within the same volume, the folder or file will retain the same permissions that were already assigned.
- What technology is used to encrypt an individual file or folder?
a) DFS
b) EFS
c) CIFS
d) SMB
Answer: b) EFS
Difficulty: Easy
Section Reference: Encrypting Files with NTFS
Explanation: Encrypting File System (EFS) is a core file encryption technology used to store encrypted files on NTFS file system volumes. Encrypted files cannot be used unless a user has access to the keys required to decrypt the information. After a file is encrypted, you do not have to manually decrypt it before you can use it.
- What is the minimum share permission needed to modify files and its attributes?
a) Full Control
b) Change
c) Write
d) Read
Answer: b) Change
Difficulty: Easy
Section Reference: Sharing Drives and Folders
Explanation: The Change permission give users the Read permission and the additional capability to create files and subfolders, modify files, change attributes on files and subfolders, and delete files and subfolders.
- What shares are usually hidden and are used for administrative purposes?
a) denied view share
b) explicit share
c) magic share
d) administrative share
Answer: d) administrative share
Difficulty: Easy
Section Reference: Looking at Special and Administrative Shares
Explanation: An administrative share is a shared folder typically used for administrative purposes and usually hidden. To make any shared folder or drive hidden, the share name must have a $ at the end of it.
- By default, what port does a TCP/IP printer port use?
a) 443
b) 8080
c) 3128
d) 9100
Answer: d) 9100
Difficulty: Medium
Section Reference: Installing Printers
Explanation: A TCP/IP printer port is used to connect a printer directly to a network. It uses host port 9100 to communicate.
- What is the minimum permission needed to print to a printer and to manage your own print jobs?
a) Print
b) Manage this Printer
c) Manage Documents
d) Full Control
Answer: a) Print
Difficulty: Medium
Section Reference: Setting Printer Permissions
Explanation: The Print permission allows users to send documents to the printer. Users automatically have the permission to manage their print jobs.
- What port does Internet Printing use?
a) 80
b) 9100
c) 443
d) 1801
Answer: a) 80
Difficulty: Medium
Section Reference: Configuring Internet Printing
Explanation: When you print using Internet Printing, you are printing using HTTP commands. Therefore, you are using port 80.
- What is used to keep track of what a user does on a system?
a) authentication
b) auditing
c) permissions
d) user rights
Answer: b) auditing
Difficulty: Easy
Section Reference: Enabling Auditing
Explanation: Security can be divided into three areas:
• Authentication is used to prove the identity of a user.
• Authorization gives access to the user that was authenticated.
• To complete the security picture, you need to enable auditing so that you can have a record of the users who have logged in and what the user accessed or tried to access.
- How do you enable auditing on a Windows server?
a) Windows Explorer
b) Group policies
c) MS Configuration
d) Registry editor
Answer: b) Group policies
Difficulty: Medium
Section Reference: Enabling Auditing
Explanation: Auditing is not enabled by default. To enable auditing, you specify what types of system events to audit using Group Policy or the local security policy (Security Settings\Local Policies\Audit Policy).
Fill in the Blank
17. A(n) ________ permission is one that is granted on a higher folder level that flows into the folders below it.
Answer: inherited
Difficulty: Medium
Section Reference: Looking at Effective NTFS Permissions
Explanation: Inherited permissions are granted to a folder (parent object or container) and flow into child objects (subfolders or files inside the parent folder). When a folder is assigned permissions, by default, the permissions apply to both the folder and its subfolders and files.
Fill in the Blank
18. When you print a document using Microsoft Word, the document is sent to the printer as a _________.
Answer: print job
Difficulty: Medium
Section Reference: Looking at Printers
Explanation: When you print a document in Windows, the printer uses the logical printer and printer driver to format the document into a form that is understood by the printer, including rendering it into a printer language such as HP’s Printer Control Language or Adobe’s PostScript to create an enhanced metafile (EMF). The print job is then sent to the local spooler, which provides background printing, allowing you to print and queue additional documents while your first document is being printed.
Short Answer
19. What is the default path for the print spool folder?
Answer: C:\Windows\System32\Spool\Printers
Difficulty: Hard
Section Reference: Managing the Print Jobs
Explanation: When the print device is available, the spooler retrieves the next print job and sends it to the print device. By default, the spool folder is located at C:\Windows\System32\Spool\Printers. If you have a server that handles a large number of print jobs or several large print jobs, make sure the drive where the spool folder is has sufficient disk space.
Short Answer
20. What do you call permissions that that actually granted to a user when a user logs on and accesses the particular file or folder?
Answer: effective permissions
Difficulty: Medium
Section Reference: Looking at Effective NTFS Permissions
Explanation: Because users can be members of several groups, they can possibly have several sets of explicit permissions for a particular folder or file. When this occurs, the permissions are combined to form the effective permissions, which are the actual permissions when logging in and accessing a file or folder. These consist of explicit permissions plus any inherited permissions.