Sunteți pe pagina 1din 2

chapter 9

1. a, c, d
2. d
3. c, d, f
4. b, d
5. a, b, d
6. d

1. which of the following tools allows you to administer a share on a remote


server? select all that apply.
a. the shared folders snap-in.
b. windows explorer running on the local machine, connected to the remote server�s
share or hidden drive share.
c. windows explorer running on the remote machine in a terminal services or remote
desktop session.
d. the file server management console.

2. what are the minimum ntfs permissions required to allow users to open documents
and run programs stored in a shared folder?
a. full control
b. modify
c. write
d. read & execute
e. list folder contents

3. bill complains that he is unable to access the department plan. you open the
security tab for the plan and you find that all permissions on the document are
inherited from the plan�s parent folder. there is a deny read permission assigned
to a group to which bill belongs. which of the following methods would enable bill
to access the plan?
a. modify the permissions on the parent folder by adding the permission bill:allow
full control.
b. modify the permissions on the parent folder by adding the permission bill:allow
read.
c. modify the permissions on the plan by adding the permission: bill:allow read.
d. modify the permissions on the plan by deselecting allow inheritable
permissions, choosing copy, and removing the deny permission.
e. modify the permissions on the plan by deselecting allow inheritable
permissions, choosing copy, and adding the permission bill:allow full control.
f. remove bill from the group that is assigned the deny permission.

4. which of the following must be done to generate a log of resource access for a
file or folder? select all that apply.
a. configure ntfs permissions to allow the system account to audit resource
access.
b. configure audit entries to specify the types of access to audit.
c. enable the audit privilege use policy.
d. enable the audit object access policy.

5. which of the following are valid criteria for a security log filter to identify
specific file and folder access events? select all that apply.
a. the date of the event
b. the user that generated the event
c. the type of object access that generated the event
d. success or failure audit

6. users at contoso ltd. use microsoft office applications to access resources on


server01. your job is to monitor server01 to ensure that permissions are not too
restrictive, so that users are not prevented from achieving their assignments.
which log, and which type of event, will provide the information you require?
a. application log; success event
b. application log; failure event
c. security log; success event
d. security log; failure event
e. system log; success event
f. system log; failure event

S-ar putea să vă placă și