CTS1168C CHAPTER 3: Managing Data
Each Microsoft account is allocated how much storage that can be used for file storage on OneDrive?
5GB Correct. Each Microsoft account is allocated 5 GB of storage space that can be used for file storage on OneDrive.
Ruzwana creates a folder K:\Test. She edits the permissions of the folder to explicitly deny modify permissions to the folder.Which of the following actions will Ruzwana be able to perform on the folder as its owner?
Change permissions Correct. Despite not having modify permissions, as the owner, Ruzwana will be able to read and change permissions.
Which of the following is not true of the NTFS file system?
Bad clusters that fail to store data are not tracked. is a false statement. NTFS tracks bad clusters that fail to store data reliably.
Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization's network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN.Which of the following tools can Tobias use to overcome this issue?
BitLocker Network Unlock Correct. If TPM and a PIN are required for startup, it prevents remote maintenance. To resolve this issue, BitLocker Network Unlock allows computers to start automatically when connected to the corporate network.
To see the permissions a user has to a file that takes into account their group memberships, which tab should you display in the Advanced Security Settings dialog box?
Effective Access Correct. When you select a user or group on the Effective Access tab, the advanced NTFS permissions that are effective for that group or user are displayed.
Which feature of NTFS encrypts the contents of files?
EFS Correct. EFS allows files to optionally have their contents encrypted.
Ayaka is assigned Read share permissions to a folder and Full control NTFS permissions. She signs in to the computer holding this folder and tries accessing the folder by navigating via File Explorer.What is the effective permission to the folder in this scenario? Read Read & Execute Full control Owner
Full control Correct. Some special considerations should be taken when shared folder permissions combine with NTFS permissions-the most restrictive permissions are effective when the file is accessed over the network. If the user is sitting at the keyboard and signing in locally (i.e., interactively), only the NTFS file and folder permissions apply.
You are the IT manager for your company. You have been asked to give the Admin group the rights to read, change, and assign permissions to documents in the Stormwind Documents folder. The following table shows the current permissions on the Stormwind Documents shared folder: Groups/Users NTFS Shared Sales Read Changed Marketing Modify Changed F&D Deny Full Control Finance Read Read Admin Changed Changed What do you need to do to give the Admin group the rights to do their job? (Choose all that apply.)
Give Admin Full Control to NTFS security. Give Admin Full Control to shared permissions. The Admin group needs Full Control on the NTFS security and shared permission settings in order to do their job. To be able to give other users permissions, you must have the Full Control permission.
Jeff, the IT manager for Stormwind, has been asked to give Tom the rights to read and change documents in the Stormwind Documents folder. The following table shows the current permissions on the shared folder: Groups/Users NTFS Shared Sales Read Changed Marketing Modify Changed F&D Denied Full Control Finance Read Read Tom Read Changed Tom is a member of the Sales and Finance groups. When Tom accesses the Stormwind Documents folder, he can read all the files, but the system won't let him change or delete files. What do you need to do to give Tom the minimum amount of rights to do his job?
Give Tom Modify to NTFS security. By giving Tom Modify on the NTFS security setting, you're giving him just enough to do his job. You could also give Sales or Finance the Modify permission, but then everyone in those groups would be able to delete, change, and do more than they all need. Also, Tom does not need Full Control to change or delete files.
Ariella is viewing the permission settings for a folder, D:\Labs\TestFolder, in the Advanced Security Settings window. She wants to identify where the permission setting was first applied to this particular folder.Which of the following columns will give her this information?
Inherited from Correct. When viewing the Permissions tab in advanced security settings for a folder, the Inherited from column shows where a permission setting was first applied. Further changes to those permission assignments automatically propagate through folders and files below that point.
The owner of your company has come to you and stated that they want all of the hardware on all systems to use BitLocker and BitLocker To Go. What utility should you install to help manage and maintain BitLocker and BitLocker To Go?
MBAM Microsoft BitLocker Administration and Monitoring (MBAM) will allow the IT department to use enterprise-based utilities for managing and maintaining BitLocker and BitLocker To Go.
Marsha and Moira belong to the Sales group that has full control permissions to the K:\Sales folder. Within this folder, Marsha is assigned read permission to a file named SalesPipeline. Moira is assigned read and execute permissions to the same file. Marsha also belongs to the Marketing group that has read permissions denied to the K:\Sales folder, while Moira also belongs to the Legal group that has write permissions denied to the K:\Sales folder.Which of the following is true of the effective permissions in this scenario?
Marsha cannot open the Sales folder. . Correct. Marsha cannot open the Sales folder because the Marketing group's deny permission to read the folder takes precedence over the full control permission of the Sales group. When some permissions are allow and other permissions are deny, the order of precedence is explicit deny, explicit allow, inherited deny, and inherited allow.
Mei's opens File Explorer on her Windows 10 laptop. She opens the simple sharing options for a folder. She selects another local user, Melissa, and changes the permission level to Read/Write.Which of the following is highest level of permission given to Melissa? Melissa will have the Modify NTFS permission. Melissa will have the Full Control NTFS permission. Melissa will have ownership of this folder. Melissa will have the Read & Execute NTFS permission.
Melissa will have the Read & Execute NTFS permission.
What is the name of the cloud-based storage that is automatically included for free when a Microsoft account in created?
OneDrive Correct. OneDrive is the cloud-based storage that is automatically included free of charge when you create a Microsoft account.
Ablorde is a tax advisor at TEXMII Consultants, a small business that hands tax filing for freelancers. Ablorde wants to share a folder on her computer with Rajesh. He has a Windows 10 computer that is connected to the same workgroup as Ablorde's computer.Which of the following is a requirement for successful sharing of files in this scenario?
Rajesh must have a user account on Ablorde's computer. Correct. To enable file sharing in this scenario, Ablorde must create a user account for Rajesh on her computer.
Chieh is assigned the Read permission to a shared folder as user. She is also part of the Marketing group that has List Folder permissions to the shared folder.What is Chieh's effective permission to this folder?
Read & Execute Correct. Effective permissions are the combination of permissions assigned to the user and permissions assigned to groups that the user is a member of. Because Chieh is assigned the Read permission and the Marketing group that she belongs to is assigned the List Folder permission, her effective permission is Read & Execute.
You are the network administrator for a medium-sized company. Rick was the head of HR and recently resigned. John has been hired to replace Rick and has been given Rick's laptop. You want John to have access to all of the resources to which Rick had access. What is the easiest way to manage the transition?
Rename Rick's account to John. The easiest way to manage this transition is to simply rename Rick's account to John. It is very important to remember that rights and permissions get associated to a user's SID number and not a username. By renaming Rick's account to John, John will automatically have all of the rights and permissions to any resource that Rick had access to.
Vincent is an instructor for Stormwind and he is talking to Paige, the company IT Manager. Vince asks Paige to implement some type of two-factor authentication. What can Paige install to complete this request? Fingerprint scanners Retina Scanners Smartcards Passwords and Usernames
Smartcards Smart cards are plastic cards (the size of a credit card) that can be used in combination with other methods of authentication. This process of using a smart card along with another authentication method is called two-factor authentication or multi-factor Authentication.
Chao creates a file YTDReport and places it a folder titled TownHall. Only the Managers group has full control permissions to the TownHall folder. Later, Chao moves this folder to the Presentations folder on the same NTFS volume. The Managers group does not have any explicit permissions to the content in the Presentations folder.Which of the following is true of this scenario? Chao will not be able to make further modifications to the YTDReport. The Managers group will have full control permissions to the TownHall folder. Users outside the Managers group will be able to view content within the TownHall folder. The Managers group will not be able to modify content within the TownHall folder.
The Managers group will have full control permissions to the TownHall folder. Correct. When files and folders are moved from one location on the volume to another location on the same volume, new content is not created; only pointers to the content are moved in the database. In that case, the destination content keeps whatever permissions it originally had, regardless of the destination folder's permissions.
Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful.Which of the following is the most likely reason? BitLocker Drive Encryption is unavailable on Windows 10 Professional. The motherboard in the computer does not contain a TPM module. Vishal encrypted some files and folders using EFS. The hard drive does not contain a system volume.
The hard drive does not contain a system volume. Correct. To use BitLocker Drive Encryption, a hard drive must be divided into two partitions. One partition is used as the operating system volume. The second required volume is the system volume.
You have a network folder that resides on an NTFS partition on a Windows 10 computer. NTFS permissions and share permissions have been applied. Which of the following statements best describes how share permissions and NTFS permissions work together if they have been applied to the same folder?
The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is more restrictive will be applied. When both NTFS and share permissions have been applied, the system looks at the effective rights for NTFS and share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permissions.
Wemimo creates a new folder named NewFolder in D:\Labs\Test. In the Permissions tab in advanced security settings, he disables inheritance for this folder. Which of the following is true of the permission inheritance in this scenario? All previously inherited permissions will be retained, but further modifications will not be reflected. This blocks all subfolders created within NewFolder from inheriting permissions from NewFolder. This blocks inheritance of permissions for NewFolder from higher levels in D:\Labs\Test. All subfolders created within NewFolder will inherit permissions from the root folder.
This blocks inheritance of permissions for New Folder from higher levels in D:\Labs\Test. Correct. Disabling inheritance blocks inheritance of permissions from higher levels of the file system. Once inheritance is disabled, a prompt appears asking if the old inherited permissions should be copied to the object or removed entirely so that you can start with new permissions.
Nicole, a system administrator, is configuring basic NTFS permissions on folders on a common computer used for miscellaneous tasks such as printing or browsing social networking sites.What is the scope that is automatically configured scope in this scenario?
This folder, subfolders, and files Correct. When you configure basic NTFS permissions on a folder, the scope is automatically configured as This folder, subfolders, and files.
You are using Windows 10 and you have created a file called "my text," and it was created in Notepad and has a .txt extension type. You need to change the extension type from .txt to .vbx. What setting do you need to change on the folder so that you can see the extension types?
Uncheck Hide Extensions For Known File Types. Filename extensions for known files are hidden by default. If you want to be able to see the filename extension for all files, you must uncheck the box Hide Extensions For Known File Types.
Which of the following is true of BitLocker Drive Encryption?
When you use BitLocker Drive Encryption, an entire volume is encrypted. Correct. When you use BitLocker Drive Encryption, an entire volume is encrypted.
In which editions of Windows 10 can you enable BitLocker? (Choose all that apply)
Windows 10 Professional Edition Windows 10 Education Edition Windows 10 Enterprise Edition BitLocker Drive Encryption is a data protection feature available in Windows Education, Enterprise, and Professional editions of Windows 10.
You are the network administrator for a large organization. You have a Windows 10 machine that needs to prevent data from being accessed if the hard drive is stolen. How do you accomplish this task?
Within a Local Group Policy, set the BitLocker Drive Encryption. Windows 10 comes with a feature called BitLocker Drive Encryption. BitLocker encrypts the drive so if it's removed or stolen, the data can't be accessed. To configure BitLocker, you must either use a Local Group Policy or use the BitLocker icon in Control Panel.
You are configuring sharing options for the Public folder on a Windows 10 computer. In Advanced sharing settings in the Network and Sharing Center, you enable the option Turn on sharing so that anyone with network access can read and write files in the Public folders.Which of the following is a valid observation if you choose the option Turn on password protected sharing?
You can restrict access to the shared Public folder to valid user accounts, but you cannot select which user accounts have access Correct. When you choose the option Turn on password protected sharing, network users must sign in to the sharing computer by using a user account that has been granted access to the sharing computer. The account can be either a local user account or a domain user account. This allows you to restrict access to the shared Public folder to valid user accounts, but you cannot select which user accounts have access. All valid user accounts are able to access the shared Public folder.