Module 5 Review Quiz Flashcards
Which of the following occurs when you encrypt a file using EFS within a domain environment? (Choose all that apply.)
a. An asymmetric private key is generated and used to encrypt the file contents
b. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key
c. A symmetric encryption key is generated and used to encrypt the file contents
d. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent’s public key
b. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key
c. A symmetric encryption key is generated and used to encrypt the file contents
d. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent’s public key
Only the NTFS filesystem supports all of the basic and advanced attributes for folders and files.
a. True
b. False
a. True
Which of the following can be used to set the compress attribute for an NTFS file? (Choose all that apply.)
a. Set-ItemProperty
b. cipher.exe
c. compress.exe
d. compact.exe
a. Set-ItemProperty
d. compact.exe
Which of the following basic NTFS/ReFS permissions allows you to delete a file? (Choose all that apply.)
a. Full control
b. Modify
c. Write
d. Read and execute
a. Full control
b. Modify
You wish to grant a specific user the ability to view the read-only attribute on files within a particular folder on the system, but do not wish to grant any other access. What advanced permission should you assign to this user?
a. Traverse folder/execute file
b. Read attributes
c. Read extended attributes
d. Read permissions
b. Read attributes
You can use the Set-ACL cmdlet within Windows PowerShell to configure entries within a DACL or SACL.
a. True
b. False
a. True
Your organization maintains a shared folder called PrivateHR that only the HumanResources-G and Domain Admins groups have access to. You wish to audit each time a member of the HumanResources-G group successfully modifies or deletes a file within this folder. What must you do? (Choose all that apply.)
a. Configure an audit entry within the SACL of the PrivateHR folder that allows the Modify permission for the HumanResources-G group
b. Configure the audit attribute on the PrivateHR folder
c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group
d. Enable success auditing for the system using an audit policy
c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group
d. Enable success auditing for the system using an audit policy
Which of the following Windows logs stores auditing events?
a. System
b. Application
c. Security
d. Auditing
c. Security
You are about to move an EFS-encrypted file called SecureData.xml from a folder on an NTFS volume to a folder on a ReFS volume. Which of the following statements are true regarding the permissions and encryption on the file following the move operation? (Choose all that apply.)
a. SecureData.xml will retain its original permissions following the move operation
b. SecureData.xml will remain encrypted following the move operation
c. SecureData.xml will inherit the permissions from the target folder following the move operation
d. The SecureData.xml will be not be encrypted following the move operation
c. SecureData.xml will inherit the permissions from the target folder following the move operation
d. The SecureData.xml will be not be encrypted following the move operation
The View effective access tab within the Advanced Security Settings window for a folder or file can be used to view the groups that have access to a particular folder or file.
a. True
b. False
b. False
You have shared a folder using SMB and assigned members of the Accounting group Full Control shared folder permission. One of the members of the Accounting group complains that they get an access denied message when attempting to access files within the shared folder. What are two possible causes of this issue? (Choose two answers.)
a. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files denies access to a group to which the user belongs
b. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files does not allow the user access
c. The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs
d. The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access
c. The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs
d. The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access
Windows systems that have the Client for NFS installed can access an NFS shared folder by browsing the network or specifying the shared folder’s UNC.
a. True
b. False
a. True
You would like to share a folder that uses the access-based enumeration feature. What must you do?
a. Share the folder using SMB by accessing folder properties.
b. Share the folder using SMB using Server Manager.
c. Share the folder using NFS by accessing folder properties.
d. Share the folder using NFS using Server Manager.
b. Share the folder using SMB using Server Manager.
Which of the following NFS shared folder permissions allows computers to access an NFS shared folder and modify content?
a. Full Control b. Change c. Read-Write d. Modify
c. Read-Write
Both NFS and SMB shared folders can be published to Active Directory.
a. True
b. False
a. True