Chapter 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Write

A user needs to create files and make changes to file contents. Aside from the Read permission, what other permission should the user be granted without allowing more access than is necessary?

10%

A volume with shadow copies enabled uses what maximum size limitation of the total volume size by default?

simple file sharing

An administrator can enable ______________, which sets NTFS permissions to accommodate simplified sharing permissions.​ BLANK

Get-PrintJob

An administrator can utilize the ________________ cmdlet to list the current print jobs for a specified printer.​ BLANK

Stop-Service Spooler

An administrator needs to stop and restart the print spooler service on a Server Core installation. What PowerShell cmdlet can the administrator use?​

Access control entry (ACE)

An entry in a discretionary access control list (DACL); includes a security principal object and the object's assigned permissions.

access control entry (ACE)

An entry in a discretionary access control list (DACL); includes a security principal object and the object's assigned permissions. See also discretionary access control list (DACL).

administrative shares

Hidden shares created by Windows that are available only to members of the Administrators group; they include the root of each volume, the \Windows folder, and IPC$. Hidden shares' names end with a dollar sign.

they just need to update there framework to work

How can a shared printer provide support to multiple versions of the Windows operating system? BLANK

Change the render print jobs on client computers option in the printer's properties​

How can administrators reduce the amount of processing that occurs on a print server?

​By placing a $ at the end of the share name

How can an administrator create a hidden shared folder?

​Enable access-based enumeration (ABE)

How can an administrator make only the files and folders to which a user has at least Read permissions visible?

It stores login scripts, Users profiles

How does Active Directory use the NETLOGON folder? BLANK

It deletes an older shadow copy to make space for a new one

If a new shadow copy of a volume needs to be created, but no space is available on the volume for the new shadow copy, what happens? BLANK

They can send it straight to the printer

If a print server is located in a remote central office, and the print device is local to a branch office, how does Branch Office Direct Printing help to save bandwidth? BLANK

they should be on there own volume

If shadow copies are enabled on a heavily used volume, how should shadow copies be configured? BLANK

A. Take ownership of the file B. Create the file C. Be assigned as the owner by an administrator

In which of the following ways can a user become a file's owner? (Choose all that apply.)

False

NTFS permissions on a file only apply when a file or folder is accessed locally T/F

share permissions

Permissions applied to shared folders that protect files accessed across the network; the only method for protecting files on FAT volumes.

NTFS permissions

Permissions set on folders or files on an NTFS-formatted volume; they protect both network and interactive/local file access.

Print

The Print permission allows only what specific tasks to be performed by a user? BLANK

Easy Print

The Remote Desktop Protocol (RDP) utilizes the ____________ printer driver to allow local printing during an RDP session. BLANK

B. Delete all files D. Create files

The Tsmith user account has been granted the Read share permission. Tsmith is a member of the Sales group, which has been granted the Change share permission. On the shared folder's Security tab, Sales has been granted Full control, and the Domain Users group has been granted Read permission. Which of the following can Tsmith do in the share when accessing it from the network?

LPD

The _____________ allows UNIX / Linux computers using the Line Printer Remote (LPR) service to print to Windows shared printers. BLANK

effective access

The access a security principal has to a file system object when taking sharing permissions, NTFS permissions, and group memberships into account. See also security principal.

Effective access

The access a security principal has to a file system object when taking sharing permissions, NTFS permissions, and group memberships into account.​

Effective permissions​

The combination of permissions assigned to an account from explicit and inherited permissions.

effective permissions

The combination of permissions assigned to an account from explicit and inherited permissions; determines an account's effective access to an object. See also effective access.

Network File System (NFS)

The native file-sharing protocol in UNIX and Linux OSs; also supported by Windows Server 2012.

True

The shadow copies feature must be enabled on an entire volume. T/F

printer priority

Using __________, two or more printers can represent a single print device. BLANK

Object owner

Usually the user account that created the object or a group or user who has been assigned ownership of the object.

object owner

Usually the user account that created the object or a group or user who has been assigned ownership of the object. An object owner has special authority over that object.

​GrantSmbShareAccess

What PowerShell cmdlet can be used to add permissions to a share?

​$Admin

What administrative share on a Windows machine will provide network access to the Windows folder on the boot volume?

You create the file, someone gives you ownership. you take ownership from another person

What are the three ways in which a user can become the owner of a file system object? BLANK

net use P: \\ServPub1\Public

What command can you put in a batch file to allow users to access the Public share on the ServPub1 server, using the drive letter P?

the permissions of the volume are inherited

What happens to the permissions of a file or folder that is moved to a different NTFS volume? BLANK

That file takes the inheritance's of the top level folder permissions

What happens to the permissions of a file or folder that is moved within the same NTFS volume? BLANK

SMB Share - Applications

What option in the New Share Wizard creates a share that is suitable for Hyper-V?

Print spooled documents first

What printer property, enabled by default, might allow a lower priority print job already in the queue to start printing even if a job with a higher priority starts spooling?​

Printer pool

What term is used to describe a single printer that represents two or more print devices?​

System access control list

What type of access control list defines the settings for auditing access to an object?

File and Storage Services

What utility is the preferred method for creating and managing shares within Windows Server 2012/R2?

64

When using Shadow Copies, how many different versions of a file can be kept?

Using the file ownership information

When using disk quotas, how does Windows determine each user's disk usage?

Access-Based Enumeration

Which SMB share option should you enable if you don't want users to see files they don't have at least Read permission to?

SYSVOL

Which administrative share does Active Directory use for replication?

A. Advanced sharing C. Simple file sharing D. File and Storage Services

Which of the following can be used to create shares? (Choose all that apply)

​\\server\share\subfolder

Which of the following is a correct example of a valid UNC path?​

A. SMB D. NFS

Which of the following is a file-sharing protocol supported by Windows Server 2012/R2 File and Storage Services role? (Choose all that apply.)

Change

Which of the following is not a standard NTFS permission?

Quotas can be overridden for groups

Which of the following is not true about disk quotas?

NTFS permissions are applied to network access

Which of the following is true about share and NTFS permissions

​Modify

Which permission below can be granted to a user to allow the user to execute applications or scripts?

So when someone is using that share all the data that they copy is encrypted and can't be read in clear text

Why should an administrator enable the "Encrypt data access" option on a share containing sensitive information? BLANK

Enable shadow copies on the volumes where the shares are hosted.

You have been getting quite a few calls with requests to restore files from a backup because the file was accidentally deleted from a share or because the user needed a previous version of a file that was overwritten. Restoring the files has become a burden, and sometimes you need to repeat the process several times until you find the version the user needs. What can you do to give users a way to access the files they need and reduce your administrative burden?

Do nothing.

You have installed a shared printer with the default permissions and want users to be able to manage their own documents in the print queue. What do you need to do?

Put a $ character at the end of the share name

You need to create a share containing confidential information that only a select group of people should know about. You don't want this share to appear in users' network browse lists. What can you do that involves the least administrative effort and disruption?

A. Disable permission inheritance on the subfolder, and convert existing permissions. D. Remove the group from the subfolder's DACL

You need to prevent members of a group from accessing a subfolder of a folder the group does have access to. What's the best way to do this? (Choose two answers. Each correct answer represents part of the solution.)

Printer pooling

You're seeing heavy use on one of your shared printers, and users often have to wait in line to get their print jobs. What printing feature can you use to best alleviate the problem?

Work Folders

which feature of windows file sharing should you configure if you want users to be able to access their files securely from mobile devices without having to set up A VPN or configure the firewall?

Inherited permission

​A permission that comes from an object's parent instead fo being assigned explicitly

Security principal​

​An object that can be assigned permission to access the file system; includes user, group, and computer accounts

True

​By default, the Administrators group and the CREATOR OWNER special identity are assigned the "Manage Documents" printer permission. T/F

False

​The Work Folders feature can be utilized to provide collaborative services for users, allowing for users to sync file changes to each others' folders. T/F

Network File System (NFS)

​The native file-sharing protocol in UNIX and Linux OSs

Volume Shadow Copy Service (VSS)

​The shadow copies feature utilize what service within Windows Server?

Permission inheritance is enabled by default

​Which of the following statements is true regarding permission inheritance?

Work Folders

A role service that's a component of the File and Storage Services role; allows users to synchronize documents between company file servers and mobile devices.

printer pooling

A printer configuration in which a single printer represents two or more print devices. Users can print to a single printer, and the print server sends the job to the print device that's least busy.

printer priority

A printer configuration in which two or more printers can represent a single print device. Printers can be assigned different priorities so that jobs sent to the higher priority printer are sent to the print device first.

permissions

A property of the file system that specifies which users can access a file system object (a file or folder) and what users can do with the object if they're granted access.

Volume Shadow Copy Service (VSS)

A Windows service that enables shadow copies and allows copying files that are open, essentially taking a snapshot of the data, which allows making backups of files and applications without taking them offline. See also shadow copies.

Server Message Block (SMB)

A client/server Application-layer protocol that provides network file sharing, network printing, and authentication.

Branch Office Direct Printing

A feature available with the Print and Document Services role that allows clients to print directly to a network-attached printer without the job having to go through the print server.

access-based enumeration (ABE)

A feature of a file share that shows only file and folders to which a user has at least Read permission.

offline files

A feature of shared folders that allows users to access the contents of shared folders when not connected to the network; also called "client-side caching."

shadow copies

A feature of the Windows file system that allows users to access previous versions of files in shared folders and restore files that have been deleted or corrupted.

system access control list (SACL)

A file system component that defines the settings for auditing access to an object.

​Security descriptor

A file system object's security settings, composed of the DACL, owner, and SACL

security descriptor

A file system object's security settings, composed of the DACL, owner, and SACL. See also discretionary access control list (DACL) and system access control list (SACL).

False

A folder can be shared only with a single name and single set of share permissions. True or False?

Discretionary access control list (DACL)​

A list of security principals; each has permissions that define access to an object.

discretionary access control list (DACL)

A list of security principals; each has permissions that define access to an object. See also security principal.

Permission inheritance

A method for defining how permissions are transmitted from a parent object to a child object.

permission inheritance

A method for defining how permissions are transmitted from a parent object to a child object.

explicit permission

A permission assigned by adding a user's account to an object's DACL.

inherited permission

A permission that comes from an object's parent instead of being assigned explicitly. See also explicit permission.

A print device

A physical printer containing paper and ink or toner to which print jobs are sent is known as?

Create two printers and assign them different priorities and permissions.

An expensive color laserjet printer is shared by a group of managers and some other employees. The managers complain that they often have to wait for their print jobs until other employees' large jobs have finished. Usually, the managers' print jobs are small and needed immediately, but other employees rarely need their print jobs in a hurry. What can you do to help solve this problem without buying additional equipment?

security principal

An object that can be assigned permission to access the file system; includes user, group, and computer accounts.

disk quotas

An option on NTFS volumes that enables administrators to limit how much disk space a user can occupy with his or her files.

False

By default, administrators are subject to quota limits.​ T/F

​C:\Windows\System32\Spool\Printers

By default, where is the print queue stored within Windows Server 2012/R2?

I took the ownership of the file and it's the best way to grant Mary the permission when she finished, give the ownership back to Tom which it belongs to him

You're the administrator of a file server. Tom, who is on vacation, had created a file that Mary needs access to, but neither her account nor the Administrator account has permission to access the file. What is the best way to allow Mary to access the file?


Set pelajaran terkait

ASL 1103 Unit 14 Culture: Cochlear Implants

View Set

Cultural Psychology: Chapter 4 - Methods for Studying Culture and Psychology

View Set

Chapter 32: Labor and Birth Complications

View Set

Ch 35: The Postpartum Family at Risk

View Set

Marriage and Family Exam (chapter 1-6)

View Set

Law of Business Organizations Midterm (Multiple Choice Problems)

View Set

Psychology - Chapter 10 Consciousness

View Set

A&P Chapter 16.3 - Somatic Sensory Pathways

View Set