Deck 5: Configuring Resource Access

Full screen (f)
exit full mode
Question
Which of the following statements is true of the ownership of a file or folder?

A) An administrator can take ownership of a file or folder without being granted the permission to do so.
B) The account that creates a file or a folder gets its ownership only when the administrator grants ownership to that account.
C) Ownership of individual files and folders cannot be transferred by anyone with the Take ownership permission.
D) The owner of a file or folder cannot modify all the permissions for that file or folder.
Use Space or
up arrow
down arrow
to flip the card.
Question
Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?

A) Read and execute
B) Modify
C) Full control
D) Write
Question
Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default.
Question
Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?

A) FAT32 on a Windows 10 system
B) Windows Server 2019
C) Windows Server 2016
D) FAT32 on a Windows 7 system
Question
Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group.
Question
A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?

A) Read attributes
B) Write extended attributes
C) Write attributes
D) Read extended attributes
Question
Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?

A) Assign the hidden attribute to the folder
B) Use a pair of public and private keys that are uniquely generated for a system
C) Modify the folder permissions for each user through Advanced Security Settings
D) Edit the Default Domain Policy object to enable auditing functionality
Question
What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

A) The folder loses all NTFS and share permissions associated with it.
B) The folder inherits the share permissions but loses the NTFS permissions.
C) The folder is copied along with all NTFS and share permissions.
D) The folder is set to read-only until the user performing the move changes the attribute.
Question
A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?

A) Full control
B) Modify
C) Read
D) Read/Write
Question
Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

A) The software does not back up files larger than 500 MB.
B) Natalie did not enable the archive attribute on the folder.
C) Natalie did not enable the index attribute on the folder.
D) NTFS filesystems do not support the backup of large files.
Question
Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

A) Another group has the Deny box checked for Read access.
B) The Developer group restricts Pavel's ability to view the file.
C) The Project Manager group restricts Pavel's ability to view the file.
D) The group permissions override permissions granted to Pavel's user account.
Question
The DFS Replication role needs to be installed to configure folder quotas and file screens.
Question
Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.
Question
Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

A) Common Internet File System
B) The Windows Search Service
C) Windows Run
D) A discretionary access control list
Question
Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?

A) fsutil.exe
B) dfsutil.exe
C) compact.exe
D) cipher.exe
Question
What are users who only have the List folder contents permission allowed to do?

A) They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.
B) They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership.
C) They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files.
D) They can traverse folders, view file contents, view attributes and permissions, and execute files.
Question
Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file?

A) Read
B) Modify
C) Full control
D) No access
Question
Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission.
Question
What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

A) The file transfer does not occur because FAT32 cannot store encrypted files.
B) The file encryption is maintained on the new location.
C) The file is moved but is only visible to Windows systems that can see EFS files.
D) The file is decrypted and placed onto the FAT32 volume.
Question
Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches?

A) The index attribute
B) The compress attribute
C) The archive attribute
D) The hidden attribute
Question
Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

A) Configure passive screening
B) Configure active screening
C) Enable the encrypt attribute
D) Enable the archive attribute
Question
Sheryl is configuring an SMB shared folder using Server Manager. She notices that there is an option that allows her to "Encrypt data access." Is this the same as encrypting a file or folder ?
Question
Enoch is a system administrator who is configuring DFS replication. One of the replication groups has six servers. What topology should Enoch use and why?
Question
As the system administrator, you have enabled DFS replication. After a while, users complain that they are facing synchronization issues with a file. When troubleshooting, you find that several users are using the file simultaneously. What steps will you take to resolve this issue?
Question
Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?

A) Rename the shared folder to KettleProgram/KettleApp.
B) Create an empty file called KettleApp within the folder.
C) Add KettleApp as a keyword in the folder's properties.
D) Transfer ownership of the folder to a user called KettleApp.
Question
What are the three ways in which a shared folder can be cached?
Question
Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.

A) Right-click the folder, click Properties, highlight the Sharing tab, and click the Share button.
B) Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.
C) Click File and Storage Services, highlight Shares, select the Tasks drop-down box, and click New Share.
D) Click File and Storage Services, select SMB Share - Quick, select Type a custom path, and specify the path to an existing shared folder that must be shared.
Question
Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder?

A) The default permission is Read-Only, but Mark needs the Read-Write permission.
B) MSmark is a computer name and not Mark's user account name.
C) Laurel forgot to click the Allow root access option for Mark.
D) The ReFS permission is Read/Write, whereas the NFS permission is Read.
Question
If Active Directory did not provide centralized user authentication using Kerberos, what would be the implications for NFS?
Question
Explain with an example how access to a DFS namespace works when two or more shares are specified for a target.
Question
Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

A) LDAP
B) RAP
C) SMB
D) NFS
Question
What are the two different types of ACLs used by Windows Server 2019?
Question
Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

A) Distributed File System (DFS) namespaces
B) Distributed File System (DFS) replication
C) Client for Network File System (NFS)
D) File Server Resource Manager (FSRM)
Question
What are the effects on file and folder permissions when a file or folder is created, copied, or moved?
Question
Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?

A) Configuring user quota
B) Configuring folder quota
C) Configuring active screening
D) Configuring passive screening
Question
Serena configures user quotas on a regularly accessed filesystem with hundreds of users. Some users complain that their quotas are exhausted even though they have not created any files on the system, while other users complain that the filesystem is slower than other filesystems. How would you explain this?
Question
Explain the different server roles that comprise the Distributed File System (DFS) component in Windows Server 2019.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/37
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Configuring Resource Access
1
Which of the following statements is true of the ownership of a file or folder?

A) An administrator can take ownership of a file or folder without being granted the permission to do so.
B) The account that creates a file or a folder gets its ownership only when the administrator grants ownership to that account.
C) Ownership of individual files and folders cannot be transferred by anyone with the Take ownership permission.
D) The owner of a file or folder cannot modify all the permissions for that file or folder.
A
2
Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?

A) Read and execute
B) Modify
C) Full control
D) Write
B
3
Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default.
False
4
Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?

A) FAT32 on a Windows 10 system
B) Windows Server 2019
C) Windows Server 2016
D) FAT32 on a Windows 7 system
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
5
Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
6
A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?

A) Read attributes
B) Write extended attributes
C) Write attributes
D) Read extended attributes
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
7
Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?

A) Assign the hidden attribute to the folder
B) Use a pair of public and private keys that are uniquely generated for a system
C) Modify the folder permissions for each user through Advanced Security Settings
D) Edit the Default Domain Policy object to enable auditing functionality
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
8
What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

A) The folder loses all NTFS and share permissions associated with it.
B) The folder inherits the share permissions but loses the NTFS permissions.
C) The folder is copied along with all NTFS and share permissions.
D) The folder is set to read-only until the user performing the move changes the attribute.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
9
A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?

A) Full control
B) Modify
C) Read
D) Read/Write
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
10
Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

A) The software does not back up files larger than 500 MB.
B) Natalie did not enable the archive attribute on the folder.
C) Natalie did not enable the index attribute on the folder.
D) NTFS filesystems do not support the backup of large files.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
11
Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

A) Another group has the Deny box checked for Read access.
B) The Developer group restricts Pavel's ability to view the file.
C) The Project Manager group restricts Pavel's ability to view the file.
D) The group permissions override permissions granted to Pavel's user account.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
12
The DFS Replication role needs to be installed to configure folder quotas and file screens.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
13
Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
14
Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

A) Common Internet File System
B) The Windows Search Service
C) Windows Run
D) A discretionary access control list
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
15
Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?

A) fsutil.exe
B) dfsutil.exe
C) compact.exe
D) cipher.exe
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
16
What are users who only have the List folder contents permission allowed to do?

A) They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.
B) They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership.
C) They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files.
D) They can traverse folders, view file contents, view attributes and permissions, and execute files.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
17
Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file?

A) Read
B) Modify
C) Full control
D) No access
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
18
Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
19
What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

A) The file transfer does not occur because FAT32 cannot store encrypted files.
B) The file encryption is maintained on the new location.
C) The file is moved but is only visible to Windows systems that can see EFS files.
D) The file is decrypted and placed onto the FAT32 volume.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
20
Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches?

A) The index attribute
B) The compress attribute
C) The archive attribute
D) The hidden attribute
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
21
Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

A) Configure passive screening
B) Configure active screening
C) Enable the encrypt attribute
D) Enable the archive attribute
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
22
Sheryl is configuring an SMB shared folder using Server Manager. She notices that there is an option that allows her to "Encrypt data access." Is this the same as encrypting a file or folder ?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
23
Enoch is a system administrator who is configuring DFS replication. One of the replication groups has six servers. What topology should Enoch use and why?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
24
As the system administrator, you have enabled DFS replication. After a while, users complain that they are facing synchronization issues with a file. When troubleshooting, you find that several users are using the file simultaneously. What steps will you take to resolve this issue?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
25
Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?

A) Rename the shared folder to KettleProgram/KettleApp.
B) Create an empty file called KettleApp within the folder.
C) Add KettleApp as a keyword in the folder's properties.
D) Transfer ownership of the folder to a user called KettleApp.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
26
What are the three ways in which a shared folder can be cached?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
27
Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.

A) Right-click the folder, click Properties, highlight the Sharing tab, and click the Share button.
B) Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.
C) Click File and Storage Services, highlight Shares, select the Tasks drop-down box, and click New Share.
D) Click File and Storage Services, select SMB Share - Quick, select Type a custom path, and specify the path to an existing shared folder that must be shared.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
28
Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder?

A) The default permission is Read-Only, but Mark needs the Read-Write permission.
B) MSmark is a computer name and not Mark's user account name.
C) Laurel forgot to click the Allow root access option for Mark.
D) The ReFS permission is Read/Write, whereas the NFS permission is Read.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
29
If Active Directory did not provide centralized user authentication using Kerberos, what would be the implications for NFS?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
30
Explain with an example how access to a DFS namespace works when two or more shares are specified for a target.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

A) LDAP
B) RAP
C) SMB
D) NFS
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
32
What are the two different types of ACLs used by Windows Server 2019?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

A) Distributed File System (DFS) namespaces
B) Distributed File System (DFS) replication
C) Client for Network File System (NFS)
D) File Server Resource Manager (FSRM)
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
34
What are the effects on file and folder permissions when a file or folder is created, copied, or moved?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
35
Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?

A) Configuring user quota
B) Configuring folder quota
C) Configuring active screening
D) Configuring passive screening
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
36
Serena configures user quotas on a regularly accessed filesystem with hundreds of users. Some users complain that their quotas are exhausted even though they have not created any files on the system, while other users complain that the filesystem is slower than other filesystems. How would you explain this?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
37
Explain the different server roles that comprise the Distributed File System (DFS) component in Windows Server 2019.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 37 flashcards in this deck.