• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
A user would like to secure files stored on a floppy disk. Which file system should they
select to format the disk?

a. NTFS
b. UDF
c. FAT
d. CDFS
c. FAT
A hard link can point to a folder on a different computer. True or False?
False
When assigning NTFS permissions, an ACE entry can explicitly define who is denied access
to a resource. True or False?
True
A user would like to secure files stored on a hard disk. Which file system should they select
to format the disk?

a. NTFS
b. UDF
c. FAT16
d. FAT32
e. SECF
a. NTFS
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then copied to a folder on the same NTFS-formatted volume where the user has been given Full Control permission for that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file?

a. Read
b. Full control
c. No access
d. Modify
e. none of the above
b. Full control
A user has been granted Full control to an NTFS folder on your computer in which she has
created all the documents that exist in it. Another administrator accidentally adds a permission
setting denying the Write Permission to her. The next time she logs in, opens the file, and tries to save her changes to it, will she notice?

a. The changes to the file are written as expected
b. Access to save the changes is denied
c. User Access Control will prompt her to allow administrative access
d. The permissions will automatically update to allow her access
e. A shadow copy is created
b. Access to save the changes is denied
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a folder on the same NTFS-formatted volume where the user has been given Modify permission to that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the
file?

a. Read
b. Full control
c. No access
d. Modify
e. none of the above
a. Read
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Full Control permission to that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file?

a. Read
b. Full control
c. No access
d. Modify
e. none of the above
b. Full control
A portable flash memory device with 64 GB of storage is attached to a computer through
a USB connection. The device allows the user to store music and other media files in its internal memory by presenting it to the user as a hard disk. Which file system would be appropriate when formatting the device?

a. NTFS
b. CDFS
c. WMA
d. FAT
e. exFAT
e. exFAT
A large database file containing 100 MB of data is reported as taking up only 64 MB of disk space. The difference in size is likely due to .

a. compression
b. encryption
c. cluster size
d. file corruption
a. compression
A 40 GB partition can be formatted with which file systems? (Choose all that apply.)

a. FAT12
b. FAT16
c. FAT32
d. NTFS
d. NTFS
A 4 GB partition can be formatted with which file systems? (Choose all that apply.)

a. FAT12
b. FAT16
c. FAT32
d. NTFS
b. FAT16
c. FAT32
d. NTFS
A volume formatted with NTFS must be converted to FAT32. To preserve the files it currently
contains, you must .

a. do nothing at all, volume conversions do not alter volume contents
b. run the command convert <drive letter>/FS:NTFS
c. manually trigger a shadow copy
d. run the command convert <drive letter>/FS:FAT32
e. back up the volume’s contents
e. back up the volume’s contents
A user is assigned Read permission to the NTFS folder C:\ACCOUNTING. They must not have access to C:\ACCOUNTING\ADMIN. This can be accomplished by .

a. blocking permission inheritance at C:\ACCOUNTING\ADMIN and not assigning the
user any permission to C:\ACCOUNTING\ADMIN

b. blocking permission inheritance at C:\ACCOUNTING and not assigning the user any
permission to C:\ACCOUNTING\ADMIN

c. assigning the user deny Read permission to C:\ACCOUNTING\ADMIN

d. assigning the user deny Read permission to C:\ACCOUNTING and setting the
permission scope to apply to subfolders

e. not possible
a. blocking permission inheritance at C:\ACCOUNTING\ADMIN and not assigning the
user any permission to C:\ACCOUNTING\ADMIN
When assigning a new NTFS permission what two factors must first be considered? (Select
two.)

a. permission
b. compression
c. inheritance
d. permission scope
e. ownership
a. permission
d. permission scope
A user checks the free space in a folder, Y:\BusReports, and notices that 3 GB of disk space
is reported as available. When the user checks free space in Y:\BusReports\Archive, he notices that 5 GB of disk space is reported as available. The difference in available disk space is probably because the folder Y:\BusReports\Archive is .

a. archived
b. compressed
c. encrypted
d. dynamic
e. mount point
e. mount point
A user is assigned Read permission to the NTFS folder C:\ACCOUNTING. They require full access to C:\ACCOUNTING\FORMS. This can be accomplished by .

a. not possible

b. blocking permission inheritance at
C:\ACCOUNTING\FORMS and assigning the
user Full control to C:\ACCOUNTING\FORMS

c. assigning the user Full control to C:\ACCOUNTING

d. blocking permission inheritance at
C:\ACCOUNTING and assigning the user Full
control to C:\ACCOUNTING\FORMS

e. assigning the user Full control to C:\ACCOUNTING\FORMS
e. assigning the user Full control to C:\ACCOUNTING\FORMS
A user has been granted Read permission to an NTFS folder. It is discovered that they can
update a text file in that folder even though they have not been given explicit permission to
do so. The reason for the is most likely because .

a. the user cannot update the file
b. the permission is marked as hidden
c. the user is the owner of the file
d. the user is the administrator of the local computer
c. the user is the owner of the file
You can reliably use shadow copies to replace a system backup. True or False?
False
A computer running Windows 95 cannot access a UDF-formatted DVD disk. This is
because .

a. compatibility mode was not selected during the creation of the DVD
b. Windows 95 does not support UDF
c. the disk is corrupt
d. the UDF file system must first be converted to CDFS
b. Windows 95 does not support UDF
A user is given read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Modify permission for that folder. The file is then moved to a folder on a FAT32-formatted volume. When the user logs on to the computer holding the file and accesses it via a drive letter, what is the user’s effective permission to the file?

a. Read
b. Change
c. Full control
d. Modify
e. No permissions apply
e. No permissions apply
In addition to shadow copies, previous versions of files can be restored from a ____________
Back-up
A file stored on an NTFS-formatted volume is currently compressed. For security reasons, the file is required to be encrypted. The file can be both compressed and encrypted. True or
False?
False
A backup program will only back up those files that have recently changed. You do not want a large accounting database to be backed up on the next backup job. What file attribute should you modify?

a. read only
b. compress
c. backup allowed
d. archive
d. archive
Which of the following are attributes only of NTFS files and folders and not FAT files and
folders? (Select all that apply.)

a. owner
b. security
c. compress
d. encrypt
a. owner
b. security
c. compress
d. encrypt