Sunteți pe pagina 1din 6

1. Which of the following file systems is supported by Windows Server 2008?

(Choose all
that apply.)
a. FAT
b. EXT2
c. NTFS
d. Reiser
2. Which of the following is true about the FAT32 file system? (Choose all that apply.)
a. Supports a maximum partition size of 2 GB
b. Supports a maximum file size of 4 GB
c. Was not available until Windows 98
d. Does not support file permissions
3. An image file of a full DVD can be stored on a FAT32 volume. True or False?
4. Which of the following is true about NTFS?
a. Its supported by Windows 98 and later.
b. Users can access older versions of a file.
c. Compressed files can be encrypted.
d. Volumes are accessible only by a drive letter.
5. Which of the following isnt true about disk quotas?
a. Users can be prevented from saving files on a volume.
b. An event can be generated when a user exceeds the quota limit.
c. Quotas can be overridden for groups.
d. Quotas can be set without denying disk space to users.
6. Mount points can be created only on an NTFS volume. True or False?
7. Terry stores all her files in the Documents folder on her C drive. She finds that the C drive
is getting low on disk space, so she has a new disk installed. She wants to continue using her
Documents folder as the location for organizing all her files, and most of her applications
use this folder as the default location for opening and saving files. What is the best course
of action for Terry to continue working as usual?
a. Create a folder named Documents on the new volume, and tell her to copy all her files
to the new volume.
b. Create a shortcut in her Documents folder that points to a folder on the new volume.
c. Create a new folder in the Documents folder, and mount the new volume in the folder.
d. Redirect Terrys Documents folder to a file server.
8. You have been getting quite a few calls with requests to restore files from a backup because
the file was accidentally deleted from a share or because the user needed a previous version
of a file that was overwritten. Restoring the files has become a burden, and sometimes you
need to repeat the process several times until you find the version the user needs. What can
you do to give users a way to access the files they need and reduce your administrative
burden?
a. Adjust permissions on the shares so that users cant delete files except their own. Tell
users to back up their own files to local backup media.
b. Enable shadow copies for each share.
c. Enable shadow copies on the volumes where the shares are hosted.
d. Give each user a backup program and an external hard drive.
9. Which of the following is true about file compression? (Choose all that apply.)
a. Files moved to a new location on the same volume always retain their compression
attribute.
b. Files copied to a new location on the same volume always retain their compression
attribute.
c. Files copied to a new location on the same volume inherit the compression attribute
from the parent container.
d. Files moved to a new location on the same volume inherit the compression attribute
from the parent container.
10. Shadow copies always keep 64 previous versions of a file. True or False?
11. Which of the following is true about EFS? (Choose all that apply.)
a. Unencrypted files that are moved or copied to a folder with the encryption attribute set
are always encrypted.
b. By default, encrypted files can be opened only by the user account that encrypted the
file.
c. Any user can be added to an encrypted files access list.
d. Encrypted files moved to a FAT volume become inaccessible.
12. Several users use the same computer. One user, Jim, has encrypted a file because it contains
sensitive information and needs Bill to have access to the encrypted file, too. When Jim tries
to add Bill to the list of users who can access the file, Bill isnt listed as a user that can be
added. How can Bill be added to the list of users allowed to access the encrypted file?
Have Bill encrypt a file on the system. This action creates a certificate for Bill on the computer, and he
can then be added to the access list of other encrypted files.
13. Which of the following is true about share and NTFS permissions?
a. NTFS permissions are applied only to interactive file access.
b. Share permissions take precedence over NTFS permissions.
c. Share permissions are applied to network and interactive file access.
d. NTFS permissions are applied to network access.
14. A user needs to create files and make changes to file contents. Aside from the Read permission,
what other permission should the user be granted without allowing more access than
is necessary?
a. Write
b. Full control
c. Modify
d. Create
15. The Tsmith user account has been granted the Read share permission. Tsmith is a member
of the Sales group, which has been granted the Change share permission. On the shared
folders Security tab, Sales has been granted Full control, and the Domain Users group has
been granted Read permission. Which of the following can Tsmith do in the share when
accessing it from the network? (Choose all that apply.)
a. Change permissions on all files.
b. Delete all files.
c. Take ownership of all files.
d. Create files.
16. Youre the administrator of a file server. Tom, who is on vacation, had created a file that
Mary needs access to, but neither her account nor the Administrator account has permission
to access the file. What is the best way to allow Mary to access the file?
As Administrator, take ownership of the file;Grant Mary the permission she needs, and then give
ownership back to Tom.
17. Which of the following can be used to create shares? (Choose all that apply.)
a. Advanced Sharing
b. Disk Management
c. File Sharing Wizard
d. Share and Storage Management
18. What is the maximum number of users who can simultaneously access a share created on a
Vista computer?
a. None (You cant create shares on a Vista computer.)
b. Unlimited
c. 16,777,216
d. 10
19. You need to prevent members of a group from accessing a subfolder of a folder to which the
group does have access. What is the best way to do this? (Choose two answers. Each correct
answer represents part of the solution.)
a. Disable permission inheritance on the subfolder, and copy existing permissions.
b. Add each member of the group to the subfolders DACL, and assign a Deny permission
to each member.
c. Create a new group, and add members of the existing group to this new group. Add the
new group to the subfolders DACL with a Deny permission.
d. Remove the group from the subfolders DACL.
20. You need to create a share containing confidential information that only a select group of
people should know about. You dont want this share to appear in users network browse
lists. What can you do that involves the least administrative effort and disruption?
a. Disable network discovery on all computers.
b. Disable network discovery on the computers of users who you dont want to see the share.
c. Put a $ character at the end of the share name.
d. Put a @ character at the beginning of the share name.
21. What command can you put in a batch file to allow users to access the Public share on the
ServPub1 server, using the drive letter P?
a. net share P: \\ServPub1\Public
b. net use P: \\ServPub1\Public
c. share \\ServPub1\Public P:
d. share P: \\ServPub1\Public
22. Over the years, your network has grown from 2 servers to 15 servers. Most of these servers
have shared folders on them. Users are having difficulty remembering which share is on
which server as well as the server names. You want to make access to the share simpler. What
is the best solution to this problem?
a. Install the Windows Search Service role service.
b. Install the File Server Resource Manager role service.
c. Install the Distributed File System role service.
d. Install the Services for Network File System role service.
23. A folder can be shared only with a single name and single set of share permissions. True or
False?
24. Youre seeing heavy use on one of your shared printers, and users often have to wait in line
to get their print jobs. What printing feature can you use to best alleviate the problem?
a. Printer prioritization
b. Change availability hours
c. Change spooling options
d. Printer pooling
25. You have installed a shared printer with the default permissions and want users to be able
to manage their own documents in the print queue. What do you need to do?
a. Do nothing.
b. Assign the Everyone special identity the Manage documents permission.
c. Assign the Everyone special identity the Manage printers permission.
d. Add Domain Users to the Printer Operators group.

S-ar putea să vă placă și