• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back
Which of the following statements correctly describe NTFS file and
folder permissions? (Choose all correct answers.)
b and c. NTFS security is effective at all times for data stored on an
NTFS volume. It controls which users can access objects and what
operations they can perform on the objects.
Which of the following NTFS folder permissions allows you to delete
the folder?
c. Only the Modify and Full Control permissions include the Delete special
permission.
3. Which of the following users can assign permissions to user accounts
and groups? (Choose all correct answers.)
a. Administrators
b. Power Users
c. Users with the Full Control permission
d. Owners of files and folders
a, c, and d. Members of the Power Users security group have permission
to install programs and do other administrative tasks, but they cannot
assign permissions unless they have been given the Full Control standard
permission or the Change Permissions special permission
What is an access control list (ACL) and what is the difference between
an ACL and an access control entry (ACE)?
An access control list is the part of an object’s security descriptor that
grants or denies specific users and groups permission to access the
object. The access control entry is the entry in the ACL that grants or
denies permission to the user or group.
What are a user’s effective permissions for a resource?
A user’s effective permissions are the most lenient of all the permissions
the user has, based on membership in groups that have been granted
permission unless one of the groups has been denied permission, which
would override all other permissions that have been granted.
By default, what inherits the permissions that you assign to the parent
folder?
All files, folders, and subfolders within the parent folder.
Which of the following tabs of the Properties dialog box for the file or
folder do you use to assign or modify NTFS permissions for a file or a
folder?
a. Advanced
b. Permissions
c. Security
d. General
Which of the following tabs of the Properties dialog box for the file or
folder do you use to assign or modify NTFS permissions for a file or a
folder?
a. Advanced
b. Permissions
c. Security
d. General
Which of the following statements about copying a file or folder are
correct? (Choose all correct answers.)
a. When you copy a file from one folder to another folder on the
same volume, the permissions on the file do not change.
b. When you copy a file from a folder on an NTFS volume to a folder
on a FAT volume, the permissions on the file do not change.
c. When you copy a file from a folder on an NTFS volume to a folder
on another NTFS volume, the permissions on the file match those
of the destination folder.
d. When you copy a file from a folder on an NTFS volume to a folder
on a FAT volume, the permissions are lost.

ANSWER
c and d. A copy operation always results in the files being assigned the
permissions of the destination, even when the destination does not
support permission assignment (FAT).

9. Which of the following statements about moving a file or folder are
correct? (Choose all correct answers.)
a. When you move a file from one folder to another folder on the
same volume, the permissions on the file do not change.
b. When you move a file from a folder on an NTFS volume to a
folder on a FAT volume, the permissions on the file do not
change.
c. When you move a file from a folder on an NTFS volume to a
folder on another NTFS volume, the permissions on the file
match those of the destination folder.
d. When you move a file from a folder on an NTFS volume to a
folder on the same volume, the permissions on the file match
those of the destination folder.
a and c. A move within a volume is the only operation that retains the
original permissions. A file or folder that is moved to another volume
adopts the destination’s permissions, and a move to FAT results in
permissions being lost
You are attempting to copy a large number of files from one NTFS
volume to another and want to avoid having to re-create all the original
permissions once the copy operation is completed. How can you
accomplish this with minimal effort?
It is possible to record the permissions and reassign them with CACLS
or to modify the registry to force ACLs to be copied, but the simplest
way to copy the permissions is by using Xcopy.exe with the /O or the /X
switch to copy the files. This copies the files’ ACLs as well.
If you are using NTFS permissions to specify which users and groups
can access files and folders and what these permissions allow users to
do with the contents of the file or folder, why would you need to share
a folder or use shared folder permissions?
Shared folders allow users to access files across a network. Shared
folder permissions also offer additional control over access. Shared folders
can offer different levels of access than would be available to users if
they were to log on locally, or they can provide access controls where none
exist locally (FAT file systems).
Which of the following are valid shared folder permissions? (Choose
all correct answers.)
a. Read
b. Write
c. Modify
d. Full Control
a and d. Read, Change, and Full Control are shared folder permissions.
Write and Modify are NTFS permissions.
When you move a shared folder, the folder is _____________________
When you move a shared folder, the folder is no longer shared.
When you rename a shared folder, the folder is ___________________
When you rename a shared folder, the folder is no longer shared.
The system root folder, which is C:\Windows by default, is shared
as ____________.
Admin$
To assign permissions to user accounts and groups for a shared folder,
which of the following tabs do you use?
a. The Permissions tab of the Properties dialog box for the shared
folder
b. The Sharing tab of the Properties dialog box for the shared folder
c. The General tab of the Properties dialog box for the shared folder
d. The Security tab of the Properties dialog box for the shared folder
You use the Sharing tab to control the sharing and shared folder
permissions for a shared folder.
By default, how much of the available disk space is allocated for the
cache for making shared folders available offline?
The default cache size is 10 percent of the available disk space
8. To assign permissions to user accounts and groups for a shared folder,
which of the following tabs do you use?
a. The Permissions tab of the Properties dialog box for the shared
folder
b. The Sharing tab of the Properties dialog box for the shared folder
c. The General tab of the Properties dialog box for the shared folder
d. The Security tab of the Properties dialog box for the shared folder
You use the Sharing tab to control the sharing and shared folder
permissions for a shared folder.
Which of the following statements about combining shared folder
permissions and NTFS permissions are true? (Choose all correct
answers.)
a. You can use shared folder permissions on all shared folders.
b. The Change shared folder permission is more restrictive than the
Read NTFS permission.
c. You can use NTFS permissions on all shared folders.
d. The Read NTFS permission is more restrictive than the Change
shared folder permission.
a and d. NTFS Read is more restrictive than the shared folder Change
permission. NTFS permissions are not always used because some shared
folders are on FAT volumes.
Which of the following statements about shared folder permissions
and NTFS permissions are true? (Choose all correct answers.)
a. NTFS permissions apply only when the resource is accessed over
the network.
b. NTFS permissions apply whether the resource is accessed locally
or over the network.
c. Shared folder permissions apply only when the resource is
accessed over the network.
d. Shared folder permissions apply whether the resource is accessed
locally or over the network.
b and c. NTFS permissions always apply; shared folder permissions apply
only when you access the folder across a network connection.
How do you determine which users have a connection to open files on
a computer and which files they have a connection to?
By using the Open Files folder under the Shared Folders snap-in in
Computer Management.
13. How can you disconnect a specific user from a file?
Right-click the open file under Open Files in the Shared Folders snap-in in
Computer Management, and select Close Open File.
14. Which of the following statements are true about Web folders?
(Choose all correct answers.)
a. Web folders are designed to allow Internet file sharing.
b. Web folders work with all browsers.
c. Web folders use the FTP protocol to transfer files.
d. Web folders use WebDAV to transfer files.
a and d. Web folders do not yet work with all browsers. They do not use
FTP to transfer files.
1. You are installing an application that should be available to specific
users wherever they use a computer. The application should be
installed when they execute it for the first time or open an associated
application. You are planning to implement a software installation
policy, and you have placed the users into an organizational unit. What
method of software policy implementation should you use to ensure
that only the users in this OU receive the application?
a. Assign the software to the users in the OU
b. Publish the software to the users in the OU
c. Assign the software to the computers in the OU
d. Publish the software to the computers in the OU
a. If you assign the application to the users, they will receive an icon to
execute the application and it will be installed at the first use. It can also
be installed when they open an associated application. Publishing the
application to the users would advertise it in Add/Remove Programs but
it would not be readily apparent to the users. Assigning the application
to computers would make it available to all users of that system. Applications
cannot be published to computers.
2. You are distributing an application to all computers in your organization.
You want to install it with different settings for one department in
your home office. How can you configure software installation Group
Policy settings to accomplish this?

a. Create an OU for users requiring the special settings. Create a
transform for the special settings. Assign the Windows Installer
package to the users in the domain. Assign the package, along
with the transform for the special settings, to users in the special
settings OU.
b. Create an OU for users requiring the special settings. Create two
Windows Installer packages to support the different settings.
Assign the default package to the domain users, and assign the
other to the users in the special settings OU.
c. Create an OU for users requiring the special settings. Assign the
application’s Windows Installer package to the computers in the
domain. Create a transform for the special settings, and assign it
to the users in the special settings OU.
d. Create a transform for the special settings. Assign the Windows
Installer package to the computers in the domain. Instruct the
users who require special settings in how to reinstall the application
with the special settings transform.
By assigning the package to users, you ensure that they will receive
only the package you have assigned. Users in the special settings OU
will be specifically associated with the special settings policy. Two packages
are not necessary. A transform cannot be assigned without being
attached to a Windows Installer package. Manually reinstalling the application
would be too labor intensive.
Which of the following Msiexec.exe commands would uninstall the
program.msi package?
a. msiexec /r program.msi
b. msiexec /x program.msi
c. msiexec /i program.msi
d. msiexec /f program.msi
b. The /x switch uninstalls the specified package.
You are purchasing a new accounting application for your small business.
You want to make sure the application is compatible with Windows
XP. Which of the following compatibility logos would you look for?
a. Designed for Windows 98
b. Designed for Windows XP
c. Compatible with Windows XP
d. Designed for Windows Server 2003
“Designed for Windows XP” is the most compatible logo on the list.
“Designed for Windows 98” might have legacy compatibility issues.
“Compatible with Windows XP” will function but might not be completely
compatible. “Designed for Windows Server 2003” might take advantages
of technologies not available in Windows XP.
You are configuring a legacy business application to run on Windows
XP. It presents several errors on startup, and you have tried several
compatibility modes in your attempt to find a solution. Windows 95
mode works best but still has a few issues. The manufacturer has
gone out of business, and you cannot find any other information
about compatibility upgrades. Which of the following tools might
help you?
a. Compatibility Analyzer
b. Program Compatibility Wizard
c. Compatibility Administrator
d. Msiexec.exe
The Compatibility Administrator tool can apply the end-user compatibility
modes and add other compatibility fixes. Users can then test the
resulting mode using the tool. The Compatibility Analyzer looks for known
application compatibility issues but does not fix any applications. The
Program Compatibility Wizard can apply only the end-user compatibility
modes. Msiexec is the Windows Installer executable and does not manage
application compatibility.