Cengage Windows Server 2019 - Module 5 - Configuring Resource Access (Exam Notes)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?

Add KettleApp as a keyword in the folder's properties. Explanation: This is the most efficient method. Windows Server allows associating keywords with shared folder objects. To ensure that the KettleProgram folder shows up when users search for KettleApp, Iqbal can supply KettleApp as a keyword in the folder's properties.

Which of the following statements is true of the ownership of a file or folder?

An administrator can take ownership of a file or folder without being granted the permission to do so. Explanation: An administrator can take ownership of a file or folder without being granted the permission to do so. By default, the owner of a resource, the local Administrator user account (within a workgroup) and members of the Domain Admins group (within a domain) can change folder and file ownership.

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

Another group has the Deny box checked for Read access. Explanation: From the given information, it is highly likely that the restriction placed on Pavel's ability to open the file comes from the permission settings of another group. One of the other groups that he belongs to might have the Deny box checked for the Read access.

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

Configure passive screening Explanation: Fayola can configure passive screening to maintain a log whenever a video file is saved on the drive. Configuring passive screening will log an event every time a video file is saved on the drive.

Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?

Configuring user quota Explanation: Configuring user quota will help Barry limit employees' space usage. User quotas can be configured to limit the space that users can consume on the drive.

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

Distributed File System (DFS) replication Explanation: Distributed File System (DFS) replication can synchronize folder contents between different servers. DFS is an optional component provided by Windows Server 2019.

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?

Edit the Default Domain Policy object to enable auditing functionality Explanation: Hasad should enable auditing functionality on every computer within the domain by editing the settings of the Default Domain Policy object. Folder and file auditing allows one to track activities, such as a read or write activity, on a folder or file. Some organizations configure auditing to see which users access or modify information.

Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?

FAT32 on a Windows 7 system Explanation: The copy of the file on FAT32 on the Windows 7 system is most vulnerable to theft. When an encrypted file is copied or moved from an NTFS filesystem to a filesystem that does not support Encrypting File System (EFS), such as ReFS or FAT32 on a Windows 7 system, the file is automatically decrypted.

Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default.

False Explanation: Access-based enumeration is enabled for this DFS namespace, but this feature is not enabled by default. This feature was most likely turned on after the namespace was created.

The DFS Replication role needs to be installed to configure folder quotas and file screens.

False Explanation: The File Server Resource Manager server role needs to be installed to configure folder quotas and file screens.

Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group.

False Explanation: Within a workgroup environment, if EFS keys are not backed up, you cannot recover the files because there is no recovery agent.

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file?

Full control Explanation: Since Mach-3 assigns Full control permissions to the Editor group, the copied file will inherit these permissions.

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

LDAP Explanation: LDAP is a component of the Active Directory that enables users to search and locate folders.

Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder?

MSmark is a computer name and not Mark's user account name. Explanation: In NFS, shared folder permissions are granted to computers and not to users. If it is true that MSmark is a computer name, then Laurel has shared the folder with this computer. Laurel should find out the name of Mark's computer and share it with that computer.

Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?

Modify Explanation: Denji most likely has the permission to modify the folder. Modify grants permission to read, add, delete, execute, and modify files. However, it does not allow the user to change permissions or take ownership. In order to change the folder permission for his colleague, Denji must have ownership of the folder.

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Natalie did not enable the archive attribute on the folder. Explanation: The archive attribute indicates that a file or folder needs to be backed up. Newly created folders do not have the archive attribute enabled by default. The most likely cause for the issue is that Natalie did not enable the archive attribute on the folder.

A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?

Read Explanation: The user will only be able to read the file because the Read permission at the share level overrides the Full control permission at the NTFS level.

Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.

Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button. Explanation: Full control is an advanced shared folder permission that is only available under the Advanced Sharing option in folder properties window. There are three advanced shared folder permissions—Read, Change, and Full control.

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

The Windows Search Service Explanation: The Windows Search Service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019.

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

The file is decrypted and placed onto the FAT32 volume. Explanation: When an encrypted file is moved to a FAT32 partition on a Windows 7 system, Encrypting File System (EFS) decrypts the file and stores an unencrypted version on the FAT32 partition.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions. Explanation: FAT filesystems do not support NTFS permissions. However, the folder retains the share permissions.

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. ​ Which of the following attributes should Nora deactivate to exclude the data files from searches?

The index attribute Explanation: Nora should deactivate the index attribute for the data files to exclude them from searches.

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. Explanation: Users with the List folder contents permission can list (traverse) files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files. However, they cannot view file contents.

Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission.

True Explanation: Enabling access-based enumeration prevents users from viewing shared folders (and subfolders and files) for which they do not have at least Read share and NTFS/ ReFS permissions.

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.

True Explanation: You must be granted both shared folder permissions and NTFS/ReFS permissions to access files within a shared folder on an NTFS or ReFS filesystem. For example, if you have a Read/Write share access to a shared folder and a Read NTFS/ReFS permission to a file within the shared folder, you will only be able to read the contents of the file even though you have a Write access to the folder.

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?

Write extended attributes Explanation: The administrator should give Write extended attributes permission to the project manager. Write extended attributes permission allows the user to add or remove the archive, index, compress, and encrypt attributes.

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?

cipher.exe Explanation: Imala can use the command "cipher.exe." This command is used in a Command Prompt window to configure the encrypt attribute.


Conjuntos de estudio relacionados

Final Exam Review for Foundations

View Set

Social Psychology - Chapter 10 - Final Exam!

View Set

Mr. Bean est en retard à son rendez-vous

View Set

(1) Assignment 4: Growth and Development

View Set

Chapter 10 Criminal Justice Methods in Research

View Set

Chapter 13 Diseases of the Ear and Mastoid Process

View Set