A+ Practical Unit 11

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

Which of the following statements are true regarding administrative shares? (Select TWO) -Default administrative shares are accessed by members of the Administrators or Power Users group -To connect to an administrative share, you must use the UNC path -If you are a member of the Administrators group, the administrative shares are visible when browsing the network -By default, Windows automatically creates an administrative share for every volume

-To connect to an administrative share, you must use the UNC path. -By default, Windows automatically creates an administrative share for every volume.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the conent of the auth.log file page by page? (Select TWO) -ls /var/log/auth.log -page /var/log/auth.log -less /var/log/auth.log -more /var/log/auth.log -grep /var/log/auth.log -vi /var/log/auth.log

-less /var/log/auth.log -more /var/log/auth.log

Which of the following file extension types can be run from the command prompt? (Select THREE). .bat .dll .exe .com .sys

.com .bat .exe

Which of the following file extensions indicates a Windows system file? (Select TWO). .msi .com .dll .vxd .rtf

.dll .vxd

Which of the following extensions identifies a program packaged for use by Windows Installer? .dll .msi .exe .bat .pkg

.msi

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copies?

/v

Which of the following are true of libraries? (Select TWO.)

1.)A single folder can be added to multiple Libraries. 2.)Each can contain multiple folders from different file system locations

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all of the executive staff working in the same building. Due to the sensitive nature of these documents, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfill Ben's needs? -Administrative share -VPN connection -Remote desktop connection -Hidden share -Network share

Administrative share

Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permissions to the Users group. For the C:\PublicReports folder, you allow Full control permissions to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports -Copy Costs.doc from C:\Confidential to C:\PublicReports Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? 1) Allow Full Control to both 2) Deny Read to both 3) Deny Read to Reports.doc;Allow Full Control to Costs.doc 4) Allow Full Control to Reports.doc; Deny Read to Costs.doc

Allow Full Control to both

Which file attribute identifies the file as having been modified since the last backup?

Archive

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file System. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions:• Move Reports.doc from C:\Confidential to D:\PublicReports.• Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports folder? A. Allow Full Control to Reports.doc; Deny Read to Costs.doc B. Allow Full Control to both C. Deny Read to both D. Deny Read to Reports.doc, Allow Full Control to Costs.doc

B. Allow Full Control to both Explanation: Users have Allow Full Control to both files. Moving or copying files to a different NTFS partition removes any existing NTFS permissions so that only inherited permissions apply.

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReports.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file? -Bob can open and read the file, but cannot write changes to the file -Bob can find the file in a search, but cannot open the file -Bob can open, read, and write changes to the file -Bob cannot search for or open the file -Bob has Full Access to the file and can open, read, write changes, delete, and change permissions on the file

Bob can open, read, and write changes to the file

Where system root is the C: drive, what is the path to the directories that hold user profiles in windows 10?

C:\Users\username

Which file system path is the default location for system files in Windows 10?

C:\Windows

Where system root is the C: drive, where are fonts stored on a Windows 10 system?

C:\Windows\Fonts

The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: -Allow Full Control to the D:\Reports folder. -Deny Full Control to the D:\Sales folder -Deny Full Control to the D:\Reports\2010reports.doc file. -Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files? 1) Allow Full Control to both 2) Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc 3) Deny Full Control to both 4)Allow Full Control to D:\Reports\2010reports.doc; Deny Full Control to D:\Sales\2010sales.doc.

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc

Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential C:\PublicReports In the C:\Confidentail folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports -Copy Costs.doc from C:\Confidential to C:\PublicReports Which of the following BEST describes the permissions the members of the Users group will have for the two files in the C:\PublicReports folder? 1) Allow Full Control to both 2) Deny Read to both 3)Deny Read to Reports.doc; Allow Full Control to Costs.doc 4)Allow Full Control to Reports.doc; Deny Read to Costs.doc

Deny Read to Reports.doc; Allow Full Control to Costs.doc

Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file? Data loss prevention Antivirus software Multi-factor authentication Directory permissions

Directory permissions

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users? 1) Remove Rachel from the Sales group 2) Edit the properties for the file; assign the Sales group the Deny Full Control permission 3) Edit the properties for the folder; assign the Sales group the Deny Full Control permission 4) Edit the properties for the folder; assign Rachel the Deny Full Control permission 5) Edit the properties for the file; assign Rachel the Deny Full Control permission

Edit the properties for the file; assign Rachel the Deny Full Control permission

If a folder exist on a NTFS partition, which permission does a user need to set security permissions on the folder?

Full Control

You have created a custom library using D:/Stats as the path to the library. You want the files in the D:/Reports folder to be available in the Library you created. The files should also still be accessible using the D:/Reports folder. Which of the following steps would BEST meet your requirements? 1)Create a new library from the D:\Reports folder 2)Include the D:\Reports folder in the library 3)Move the D:\Reports folder to the D:\Stats folder 4)Copy the D:\Reports folder to the library

Include the D:\Reports folder in the Library.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function? -Insert Mode -Text Mode -Command Line Mode -Command Mode -Replace Mode

Insert Mode

Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem? 1) Make Manuel's user account a member of the Power Users group 2) Make Manuel the owner of the file 3)Delete Susan's user account form the system 4)Edit the local security policy and modify user rights

Make Manuel the owner of the file.

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of teh following would be the BEST action to take next? -Create new user accounts for each user and assign the necessary folder permissions -Create a group and make all user accounts members of the group. Grant Full Control share permissions to the group -Modify the NTFS permissions on the folder -Install Samba on your workstation and then configure permission using Samba

Modify the NTFS permissions on the folder

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:/Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file? 1)Modify the permission of the document 2) Edit the local security policy and modify user rights 3) Call Mary back and have her print the document 4) Have Pablo log in using Mary's user account

Modify the permissions of the document

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? (Select THREE) -Network Neighborhood -Computer Management -Network -File Explorer -This PC -Windows Explorer

Network File Explorer This PC

Jane, an employee, in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs? -VPN connection -Hidden share -Remote Desktop connection -Administrative share -Network share

Network share Explanation: By creating a network share to Jane's folder that contains her documents, you can grant the managers the ability to see and read these documents. All other employees will not have access if the rights are granted appropriately. If a manager forgets the path, they will still be able to easily find the folder by looking for shared folders on her computer. Administrative shares are created by the OS. Specific share permissions and file security cannot be set.

You manage two folders in your computer as follows: -C:\Confidential -D:\PublicReports The C:\drive is formatted with NTFS, and the D:\drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports -Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in D:\PublicReports folder? 1) Permissions are removed from Reports.doc but kept for Costs.doc 2) Permission are kept for Reports.doc but removed from Costs.doc 3)Permissions are kept on both files. 4) Permissions are removed from both files

Permissions are removed from both files

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO) -Configure share permission -Place the files on a FAT32 partition =Place the files on an NTFS partition -Configure NTFS permissions -Configure both share and NTFS permissions

Place the files on an NTFS partition Configure both share and NTFS permissions

You've just opened a text file in the vi editor and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode? -Press Insert and then press the R key -Press the 'i' key and then Insert -Press Esc and then press: + R -Press insert and then press: + R -Press Esc and then press the R key -Press the S key and then press Insert

Press Insert, then press Insert again. Press the 'i' key, then press Insert. Press the 's' key, then press Insert.

You have a file which you would like other users to see, but not modify. What file attribute should you use?

R

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operations. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file? 1) The modify and write permission for Joe were set to Deny on the destination folder 2) Ann is not a member of the Administrators group 3) The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder 4) Joe is not a member of the Administrators group

The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.

A help desk technician determines that user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer? -Use the C$ administrative share to copy the file -Have the user share the folder as a local share and copy the file to the share -Attach the file to an email and have the user copy the file to the correct folder -Establish remote assistance and transfer the file within the session

Use the C$ administrative share to copy the file.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which format would you use? -\\Home1\Pictures -Home1:\\Pictures -Home1:Pictures -.Home1:Pictures

\\Home1\Pictures

You are working at the command line and want to add the Read-Only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you are looking for. Which of the following commands will display the entire contents of the cpuinfo text file on the screen? -cat /proc/cpuinfo -vi /proc/cpuinfo -show /proc/cpuinfo -grep /proc/cpuinfo

cat /proc/cpuinfo

Which command would you use to change the current directory to the immediate parent directory?

cd.. Explanation: cd.. to change the current directory to the immediate parent directory. the cd command by itself shows the current directory

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? -ls -chmod -ps -grep

chmod

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

copy /y

Which Windows command displays a list of files and subdirectories in a directory?

dir

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process? -ls -sudo -grep -cd

grep

While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

Which commands can you use to create a new directory? (Select TWO) cd mkdir newdir rd md

md mkdir

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions? -tracert -nslookup -ipconfig- -net use

net use Explanation: Use the net use command to list the current connected shared folders and drive letters

What command lets you see a list of valid command parameters for the net use command? -net use help -net use /? -net use -h -help net use

net use /? Explanation Type net use /? (or net use ?) to see a list of the valid parameters for the net use command

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

You are the administrator for the Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e Explanation: xcopy /e copies directories and subdirectories, including empty ones xcopy /s copies directories and subdirectories, but not empty ones


संबंधित स्टडी सेट्स

Peds Test 2 Book questions and 2 evolve chapters

View Set

115 PrepU Ch.66 Management of Patients with Infectious Diseases

View Set

Comparing and Contrasting Security Controls

View Set

Equity Options--Fundamentals and Basic Strategies

View Set