Testout LabSim Chapter 9 - File Management

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which file system is an updated version of ext2, that supports journaling?

ext3

What file type has the extension .zip?

Compressed Files

True or False: The A attribute marks a file as read-only, meaning that subsequent users cannot alter the file.

False

True or False: The dd command brings the system down or reboots the system in a secure manner.

False

True or False: Windows Installer files have the extension of .wpd

False

Which file system do Microsoft operating systems use?

NTFS

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed?

%systemdrive%\Program Files (x86)

What extensions do program files have?

.exe and .com

What extensions do document files have?

.txt and .docx

How do NTFS permissions differ from share permissions?

All of the above

Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control for both.

Which file attribute identifies the file as having been modified since the last backup?

Archieve

What file type has the extensions of .mp3 and .wma?

Audio Files

You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption?

BitLocker To Go

Which of the following is true of the Windows BitLocker program?

BitLocker is designed to protect files against offline access only.

When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive?

BitLocker with TPM

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11?

C:\Users\username

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions for you to take next? (Select two.)

Configure both share and NTFS permissions. Place the files on an NTFS partition.

A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file?

EFS

Which of the following security solutions would prevent you from reading a file that you did not create?

EFS

After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file?

EFS encrypts the FEK by creating a key pair (private and public).

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the file properties and assign Rachel the Deny Full Control permission.

True or False: The head command displays the contents of a text file on the screen, pausing the output one screen at a time.

False

You are using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function?

Insert mode

While researching a fix to a system file issue, you find that using the attrib command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command?

It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request?

Network share

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. Which of the following will be true when the file is copied?

Only the R attribute is retained on the file.

Which of these are actions under the Full control permission?

Ownership

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.)

PPTP L2TP IPsec

You manage the two folders listed below on your computer. C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files.

You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive?

The file will no longer be encrypted.

You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer?

The wrong file extension was used when saving the file.

Which of the following statements are true regarding administrative shares? (Select two.)

To connect to an administrative share, you must use the UNC path. By default, Windows automatically creates an administrative share for every volume.

True or False: BitLocker encrypts the entire volume while EFS encrypts individual files.

True

True or False: Bitlocker encrypts the volume for use on the computer, regardless of the user.

True

True or False: Change actions are read, write, create, and delete.

True

True or False: Image files can have the extensions of .gif and .jpg, to name a few.

True

True or False: The chgrp command changes the group that owns a file or directory.

True

True or False: the rm command deletes files and directories from the file system.

True

Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys?

Trusted Platform Module (TPM)

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file.

Which file system was developed for the Silicon Graphics IRIX operating system?

XFS

You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip?

You can boot the hard drive without providing the startup key.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?

\\Home1\Pictures

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?

bash

While troubleshooting an issue with an Apache web server on your Linux system, you need to look at the last several entries in the log file. Which of the following tools would be best suited for this task? (Select two.)

cat tail

Which Linux Shell command changes directories in the file system?

cd

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use?

chmod

Which Linux Shell command copies files and directories from one location to another?

cp

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process?

grep

What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface?

ip

You want to know more about the usage, command syntax, and options available with the Linux cat command. What would you enter at the Command Prompt to display this information about the cat command?

man cat

While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

What would you enter at the shell prompt on a Linux system to display the present working directory?

pwd

You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. Which of the following Windows command line tools would BEST prevent this type of glitch from happening again?

robocopy

You would like to completely shut down a system 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt?

shutdown -h +10 message

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the Command Prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e


Ensembles d'études connexes

LSAT Logical Reasoning Question Types

View Set

Bloomberg Market Concepts Certification

View Set

Unit Exam 2: Real Estate Brokerage

View Set