Chapter 9 9.2.9 Practice Questions
Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file? Bob can find the file in a search, but he cannot open the file. Bob cannot search for or open the file. Bob can open and read the file, but he cannot write changes to the file. Bob has Full Access to the file and can open, read, write, delete, and change permissions on the file. Bob can open, read, and write changes to the file.
Bob can open, read, and write changes to the file.
The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users? Edit the file properties and assign Rachel the Deny Full Control permission. Edit the file properties and assign the Sales group the Deny Full Control permission. Edit the folder properties and assign Rachel the Deny Full Control permission. Remove Rachel from the Sales group. Edit the folder properties and assign the Sales group the Deny Full Control permission.
Edit the file properties and assign Rachel the Deny Full Control permission.
Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request? Network share Administrative share Hidden share Remote Desktop connection VPN connection
Network share
You manage the two folders listed below on your computer. C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder? Permissions are removed from both files. Permissions are removed from Reports.doc but kept for Costs.doc. Permissions are kept for Reports.doc but removed from Costs.doc. Permissions are kept on both files.
Permissions are removed from both files.
You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format? \\Home1\Pictures .Home1:Pictures Home1:Pictures Home1:\\Pictures
\\Home1\Pictures
A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions? net use ipconfig netstat tracert
net use
Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? Allow Full Control for both. Allow Full Control for Reports.doc and Deny Read for Costs.doc. Deny Read for Reports.doc and Allow Full Control for Costs.doc. Deny Read for both.
Allow Full Control for both.
Which of the following statements are true regarding administrative shares? (Select two.) If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network. Adding a ! sign to the end of a share name creates an administrative share. Default administrative shares grant access to the Administrators or Power Users group. By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.
By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions for you to take next? (Select two.) Configure both share and NTFS permissions. Configure share permissions. Configure NTFS permissions. Place the files on an NTFS partition. Place the files on a FAT32 partition.
Configure both share and NTFS permissions. Place the files on an NTFS partition.
A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer? Have the user share the folder as a local share and copy the file to the share. Establish remote assistance and transfer the file within the session. Attach the file to an email and have the user copy the file to the correct folder. Use the C$ administrative share to copy the file.
Use the C$ administrative share to copy the file.