Test 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow full control to both

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

Su -

Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file?

The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.

Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?

C:\Users\username

Which file system path is the default location for system files in Windows 10?

C:\Windows

Where system root is the C: drive, where are fonts stored on a Windows 10 system?

C:\Windows\Fonts\

Which command would you use to change the current directory to the immediate parent directory?

CD ..

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following command should the technician use?

Chmod

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO).

more /var/log/auth.log less /var/log/auth.log

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e

You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

Which of the following are true of libraries? (Select TWO.)

*Each Library can contain multiple folders from different file system locations. *A single folder can be added to multiple Libraries

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? (Select THREE.)

*File Explorer *Network *Computer

Which of the following file extension types can be run from the command prompt? (Select THREE).

.bat // .com // .exe

Which of the following file extensions indicates a Windows system file? (Select TWO).

.vxd .dll

Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

Which of the following statements are true regarding administrative shares? (Select TWO).

1) By default, Windows automatically creates an administrative share for every volume 2) To connect to an administrative share, you must use the UNC path

Which commands can you use to create a new directory? (select two)

1) Mkdir 2) Md

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

Full control

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process?

Grep

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?

Include the D:\Reports folder in the library.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function?

Insert mode

Which of the following extensions identifies a program packaged for use by Windows Installer?

MSI

Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?

Make Manuel the owner of the file.

While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

Md

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the Netflix permission on the folder

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?

Modify the permissions on the document.

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

Net use

What command lets you see a list of valid command parameters for the net use command?

Net use /?

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

Network share

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfil Ben's needs?

Administration share

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow full control to both

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write change to the file

The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: • Allow Full Control to the D:\Reports folder. • Deny Full Control to the D:\Sales folder. • Deny Full Control to the D:\Reports\2010reports.doc file. • Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files?

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc.

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc.

Which Windows command displays a list of files and subdirectories in a directory?

Dir

Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?

Directory permission

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users?

Edit the properties for the file; assign Rachel the Deny Full Control permission.

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files.

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO).

Place the files on an NTFS partition. Configure both share and NTFS permissions.

You've just opened a text file in the vi editor, and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode? (Select THREE).

Press Insert and then press Insert again Press the 'i' key and then press Insert Press the S key and then press insert

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?

\\home\ pictures

Which file attribute identifies the file as having been modified since the last backup?

archive

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called that will give you the information you are looking for.

cat /proc/cpuinfo


Conjuntos de estudio relacionados

CHAPTER 8: MARKET SEGREGATION, TARGETING, AND POSITIONING

View Set

life insurance life exam practice !

View Set

MIDTERM QUESTIONS for FINAL Exam

View Set