Deck 5: Configuring, managing, and Troubleshooting Resource Access
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 5: Configuring, managing, and Troubleshooting Resource Access
1
Windows Search Service by default is installed to start automatically each time the server is booted.
True
2
The share permission ____ enables groups and users to read,execute,and add files,but can only modify and delete files provided by them.
A) reader
B) co-owner
C) contributor
D) administrator
A) reader
B) co-owner
C) contributor
D) administrator
C
3
The ____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.
A) Encrypted File System
B) Distributed File System
C) Dispersed File System
D) Extended File System
A) Encrypted File System
B) Distributed File System
C) Dispersed File System
D) Extended File System
B
4
Windows Server 2008 uses two types of ACLs: discretionary and non-discretionary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.
A) NTFS compress
B) hidden
C) NTFS encrypt
D) privacy
A) NTFS compress
B) hidden
C) NTFS encrypt
D) privacy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
To ____ an object means to make it available for users to access when they view Active Directory contents.
A) inherit
B) control
C) present
D) publish
A) inherit
B) control
C) present
D) publish
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
SUA supports more than 400 native UNIX/Linux commands and utilities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A(n)____ is a list of privileges given to an account or security group granting access to an object,such as a shared folder or shared printer.
A) ACL
B) ACE
C) attribute list
D) GPO
A) ACL
B) ACE
C) attribute list
D) GPO
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The share permission ____ permits groups or users to read and execute files,but cannot add or delete files and folders and cannot modify files.
A) reader
B) contributor
C) co-owner
D) administrator
A) reader
B) contributor
C) co-owner
D) administrator
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The share permission ____ permits groups or users to read,execute,add,delete,and modify files,and to create and delete subfolders and manage share permissions.
A) reader
B) contributor
C) co-owner
D) administrator
A) reader
B) contributor
C) co-owner
D) administrator
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Taking ____ is the only way to shift control from one account to another.
A) ownership
B) control
C) possession
D) permissions
A) ownership
B) control
C) possession
D) permissions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Creating accounts and groups are the final steps for sharing resources,such as folders,files,and printers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ portion of EFS uses a single key to encrypt the file or folder.
A) asymmetric
B) public
C) symmetric
D) private
A) asymmetric
B) public
C) symmetric
D) private
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
____ mean that the same permissions on a parent object apply to the child objects,such as files and subfolders within the parent folder.
A) Copied permissions
B) Inherited permissions
C) Overridden permissions
D) Instantiated permissions
A) Copied permissions
B) Inherited permissions
C) Overridden permissions
D) Instantiated permissions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
When configuring folder and file permissions,use the ____ button on the folder properties Security tab to change which groups and users have permissions to a folder.
A) General
B) Edit
C) Modify
D) Tools
A) General
B) Edit
C) Modify
D) Tools
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ attribute is checked to indicate that the folder or file needs to be backed up because it is new or changed.
A) read-only
B) system
C) backup
D) archive
A) read-only
B) system
C) backup
D) archive
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Disk quotas can be set on any local or shared volume.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
An encrypted folder or file uses the Microsoft ____,which sets up a unique,private encryption key associated with the user account that encrypted the folder or file.
A) Encrypting File System
B) Advanced Encryption Standard
C) Data Encryption Standard
D) Block Encryption System
A) Encrypting File System
B) Advanced Encryption Standard
C) Data Encryption Standard
D) Block Encryption System
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Accessing folders and files can be tracked by setting up ____,which in Windows Server 2008 enables you to track activity on a folder or file,such as read or write activity.
A) archiving
B) logging
C) tracking
D) auditing
A) archiving
B) logging
C) tracking
D) auditing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
____ are stored as header information with each folder and file,along with other characteristics including volume label,designation as a subfolder,date of creation,and time of creation.
A) Labels
B) Settings
C) Attributes
D) Components
A) Labels
B) Settings
C) Attributes
D) Components
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
A path in the Universal Naming Convention (UNC)format
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
A path in the Universal Naming Convention (UNC)format
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)____________________ group is a set of shared folders that is replicated or copied to one or more servers in a domain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A folder and its contents can be stored on the disk in ____________________ format,which is an option that enables you to reduce the amount of disk space used for files,particularly in situations in which disk space is limited or for folders that are accessed infrequently.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Contain program code that can be called and run by Windows applications
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Contain program code that can be called and run by Windows applications
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
In DFS,access to shared folders can be distributed across many servers,resulting in the ability to perform ____,so that one server does not experience more load than others.
A) distribution
B) replication
C) load balancing
D) redundancy
A) distribution
B) replication
C) load balancing
D) redundancy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
When using SUA in ____,every process that is run is treated as a Windows process.
A) native mode
B) transitional mode
C) mixed mode
D) hybrid mode
A) native mode
B) transitional mode
C) mixed mode
D) hybrid mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The most frequently used resources on a server are folders and ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
An ACL that is configured by a server administrator or owner of an object
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
An ACL that is configured by a server administrator or owner of an object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
UNIX/Linux server administrators and programmers rely on the popular UNIX/Linux ____ editor for creating scripts,writing program source code,editing data files,and many more functions.
A) vi
B) notepad
C) txt
D) vin
A) vi
B) notepad
C) txt
D) vin
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The hierarchical structure of DFS in the domain-based model is called the DFS ____.
A) topology
B) hierarchy
C) design
D) schema
A) topology
B) hierarchy
C) design
D) schema
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
In a namespace,a(n)____________________ is simply a shared folder that you add to (or link to)the namespace root.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
An interface between the user and the operating system
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
An interface between the user and the operating system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
A program that reads lines of program code in a source file and converts the code into machine-language instructions the computer can execute
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
A program that reads lines of program code in a source file and converts the code into machine-language instructions the computer can execute
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
____ is a naming convention that designates network servers,computers,and shared resources.
A) Universal Resource Locator
B) Universal Naming Convention
C) Universal Naming Connection
D) Uniform Naming Convention
A) Universal Resource Locator
B) Universal Naming Convention
C) Universal Naming Connection
D) Uniform Naming Convention
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Provides a naming system for shared resources on a UNIX/Linux network
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Provides a naming system for shared resources on a UNIX/Linux network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Contains information used to audit the access to an object
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Contains information used to audit the access to an object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A UNIX/Linux ____________________ consists of lines of commands that are executed when you run the script,similar to the use of scripts in Windows Server 2008.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
A main container (top-level folder)in Active Directory that holds links to shared folders that can be accessed from the root
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
A main container (top-level folder)in Active Directory that holds links to shared folders that can be accessed from the root
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each term with the correct statement below.
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Control access to an object,such as a folder or file
a.Network Information Services
b.folder target
c.permissions
d.discretionary ACL
e.shell
f.namespace root
g.system control ACL
h.compiler
i.Dynamic-link library (DLL) files
Control access to an object,such as a folder or file
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ provides interoperability between Windows Server 2008 and UNIX and Linux systems.
A) Subsystem for POSIX-based Applications
B) Subsystem for Apple-based Applications
C) Subsystem for Third-party Applications
D) Subsystem for UNIX-based Applications
A) Subsystem for POSIX-based Applications
B) Subsystem for Apple-based Applications
C) Subsystem for Third-party Applications
D) Subsystem for UNIX-based Applications
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the purpose of the option configure namespace polling when tuning a namespace.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the disadvantage of using compressed files on a server?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss delegating the management of a DFS namespace.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List two things that you can do when you install SUA in Windows Server 2008.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List and describe two of the general parameters that can be configured for disk quota management.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List two new features Windows Server 2008 offers for SUA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What are the two basic attributes that remain in NTFS that are still compatible with FAT in older Windows operating systems?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain how NIS is used on a UNIX/Linux network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the difference between the index attribute and the Windows search service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List two advantages of using disk quotas.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck