Module 5 Review Quiz Flashcards

1
Q

Which of the following occurs when you encrypt a file using EFS within a domain environment? (Choose all that apply.)

a. An asymmetric private key is generated and used to encrypt the file contents

b. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key

c. A symmetric encryption key is generated and used to encrypt the file contents

d. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent’s public key

A

b. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key

c. A symmetric encryption key is generated and used to encrypt the file contents

d. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Only the NTFS filesystem supports all of the basic and advanced attributes for folders and files.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following can be used to set the compress attribute for an NTFS file? (Choose all that apply.)

a. Set-ItemProperty
b. cipher.exe
c. compress.exe
d. compact.exe

A

a. Set-ItemProperty
d. compact.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following basic NTFS/ReFS permissions allows you to delete a file? (Choose all that apply.)
a. Full control
b. Modify
c. Write
d. Read and execute

A

a. Full control
b. Modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You wish to grant a specific user the ability to view the read-only attribute on files within a particular folder on the system, but do not wish to grant any other access. What advanced permission should you assign to this user?

a. Traverse folder/execute file

b. Read attributes

c. Read extended attributes

d. Read permissions

A

b. Read attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You can use the Set-ACL cmdlet within Windows PowerShell to configure entries within a DACL or SACL.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your organization maintains a shared folder called PrivateHR that only the HumanResources-G and Domain Admins groups have access to. You wish to audit each time a member of the HumanResources-G group successfully modifies or deletes a file within this folder. What must you do? (Choose all that apply.)

a. Configure an audit entry within the SACL of the PrivateHR folder that allows the Modify permission for the HumanResources-G group

b. Configure the audit attribute on the PrivateHR folder

c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group

d. Enable success auditing for the system using an audit policy

A

c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group

d. Enable success auditing for the system using an audit policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following Windows logs stores auditing events?

a. System
b. Application
c. Security
d. Auditing

A

c. Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are about to move an EFS-encrypted file called SecureData.xml from a folder on an NTFS volume to a folder on a ReFS volume. Which of the following statements are true regarding the permissions and encryption on the file following the move operation? (Choose all that apply.)

a. SecureData.xml will retain its original permissions following the move operation

b. SecureData.xml will remain encrypted following the move operation

c. SecureData.xml will inherit the permissions from the target folder following the move operation

d. The SecureData.xml will be not be encrypted following the move operation

A

c. SecureData.xml will inherit the permissions from the target folder following the move operation

d. The SecureData.xml will be not be encrypted following the move operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The View effective access tab within the Advanced Security Settings window for a folder or file can be used to view the groups that have access to a particular folder or file.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have shared a folder using SMB and assigned members of the Accounting group Full Control shared folder permission. One of the members of the Accounting group complains that they get an access denied message when attempting to access files within the shared folder. What are two possible causes of this issue? (Choose two answers.)

a. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files denies access to a group to which the user belongs

b. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files does not allow the user access

c. The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs

d. The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access

A

c. The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs

d. The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Windows systems that have the Client for NFS installed can access an NFS shared folder by browsing the network or specifying the shared folder’s UNC.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You would like to share a folder that uses the access-based enumeration feature. What must you do?

a. Share the folder using SMB by accessing folder properties.

b. Share the folder using SMB using Server Manager.

c. Share the folder using NFS by accessing folder properties.

d. Share the folder using NFS using Server Manager.

A

b. Share the folder using SMB using Server Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following NFS shared folder permissions allows computers to access an NFS shared folder and modify content?

a. Full Control	
b. Change	
c. Read-Write	
d. Modify
A

c. Read-Write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Both NFS and SMB shared folders can be published to Active Directory.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You would like to provide a central shared folder that users can access to view all other shared folders within the organization. What must you do? (Choose all that apply.)

a. Install the DFS Namespaces role and configure a DFS namespace

b. Configure a replication group

c. Add targets to the DFS namespace for each shared folder

d. Install the DFS Replication role on each file server

A

a. Install the DFS Namespaces role and configure a DFS namespace

c. Add targets to the DFS namespace for each shared folder

17
Q

You are configuring a DFS replication group to synchronize folder contents between four file servers. To minimize the network bandwidth used by DFS replication, you should choose a Full mesh topology for your replication group.

a. True
b. False

A

b. False

18
Q

You have a large number of users that access the same files within a shared folder that is replicated to another shared folder on the network using DFS replication. Users often report problems with missing content in the files that they access within the shared folder, and that changes take a long time to propagate from one shared folder to the other. What two actions can you take to address these issues? (Choose two answers.)

a. Add a shared folder on a third file server to the replication group

b. Disable remote differential compression (RDC) on the connections within the replication group

c. Increase the size limit of the DFS staging folder for each member of the replication group

d. Modify the replication group settings to use a Full mesh topology for replication

A

b. Disable remote differential compression (RDC) on the connections within the replication group

c. Increase the size limit of the DFS staging folder for each member of the replication group

19
Q

Which of the following features are provided by the File Server Resource Manager server role? (Choose all that apply.)

a. File screens
b. Access-based enumeration
c. Folder quotas
d. User quotas

A

a. File screens
c. Folder quotas

20
Q

You can use soft quotas to provide warnings to users that exceed folder quotas, while not restricting their ability to add content to a folder.

a. True
b. False

A

a. True