IST257 Test 2 Module 5 Review
Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this? A. Rename the shared folder to KettleProgram/KettleApp. B. Create an empty file called KettleApp within the folder. C. Add KettleApp as a keyword in the folder's properties. D. Transfer ownership of the folder to a user called KettleApp.
C. Add KettleApp as a keyword in the folder's properties.
Which of the following Logs stores auditing events. A. System B. Application C. Security D. Auditing
C. Security
What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system? A. The file transfer does not occur because FAT32 cannot store encrypted files. B. The file encryption is maintained on the new location. C. The file is moved but is only visible to Windows systems that can see EFS files. D. The file is decrypted and placed onto the FAT32 volume.
D. The file is decrypted and placed onto the FAT32 volume.
Susan has set the file permissions so that only her account has access to the file. The administrator could change the permissions and gain access since he has the __________ Ownership user right in Group Policy
Full
Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions. Module 5
True
The owner of a file can always modify permissions.(True/False)
True
Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file? A. Another group has the Deny box checked for Read access. B. The Developer group restricts Pavel's ability to view the file. C. The Project Manager group restricts Pavel's ability to view the file. D. The group permissions override permissions granted to Pavel's user account.
A. Another group has the Deny box checked for Read access.
Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents? A. Distributed File System (DFS) namespaces B. Distributed File System (DFS) replication C. Client for Network File System (NFS) D. File Server Resource Manager (FSRM)
B. Distributed File System (DFS) replication
Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future? A. Configure passive screening B. Configure active screening C. Enable the encrypt attribute D. Enable the archive attribute
A. Configure Passive Screening
Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage? A. Configuring user quota B. Configuring folder quota C. Configuring active screening D. Configuring passive screening
A. Configuring user quota
A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file? A. Full control B. Modify C. Read D. Read/Write
A. Full control
What are users who only have the List folder contents permission allowed to do? A. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. B. They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership. C. They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files. D. They can traverse folders, view file contents, view attributes and permissions, and execute files.
A. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.
Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions? A. Read and execute B. Modify C. Full control D. Write
B. Modify
Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions. A. Right-click the folder, click Properties, highlight the Sharing tab, and click the Share button. B. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button. C. Click File and Storage Services, highlight Shares, select the Tasks drop-down box, and click New Share. D. Click File and Storage Services, select SMB Share - Quick, select Type a custom path, and specify the path to an existing shared folder that must be shared.
B. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.
What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume? A. The folder loses all NTFS and share permissions associated with it. B. The folder inherits the share permissions but loses the NTFS permissions. C. The folder is copied along with all NTFS and share permissions. D. The folder is set to read-only until the user performing the move changes the attribute.
B. The folder inherits the share permissions but loses the NTFS permissions.
Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file? A. Read B. Modify C. Full control D. No access
C. Full control, the file gains the permissions of the Mach-3 folder, which allows full control over any file within it.
Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied? A. FAT32 on a Windows 10 system B. Windows Server 2019 C. Windows Server 2016 D. FAT32 on a Windows 7 system
D. FAT32 on a Windows 7 system
Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute? A. fsutil.exe B. dfsutil.exe C. compact.exe D. cipher.exe
D. cipher.exe
Joe has the Read Share Permission as a member of the Users group to a file in a shared folder. That folder is on an NTFS formatted volume and Joe has Full Control NTFS permissions to that file. Joe's resulting permission on the file when accessing the file locally will be ___________? (reference NTFS and share permssion names). Fill in the Blank
full control
Joe has the Read Share Permission as a member of the Users group to a file in a shared folder. That folder is on an NTFS formatted volume and Joe has Full Control NTFS permissions to that file. Joe's resulting permission on the file when accessing the file over the network will be ___________? (reference NTFS and share permssion names). Fill in the Blank
full control