TestOut Chapter 11*

Ace your homework & exams now with Quizwiz!

Which of the following extensions identifies a program packaged for use by Windows Installer?

.msi

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

Which of the following are true of libraries? (Select TWO.)

A single folder can be added to multiple libraries. Each library can contain multiple folders from different file system locations.

Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?

Make Manuel the owner of the file.

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder.

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?

Modify the permissions on the document.

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? (Select THREE.)

Network File Explorer This PC

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

Network share

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files.

You've just opened a text file in the vi editor, and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode? (Select THREE).

Press the 'i' key and then press Insert Press Insert and then press Insert again Press the S key and then press Insert

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file?

The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.

Which of the following statements are true regarding administrative shares? (Select TWO).

To connect to an administrative share, you must use the UNC path. By default, Windows automatically creates an administrative share for every volume.

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file.

Which Windows command displays a list of files and subdirectories in a directory?

dir

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process?

grep

You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

Which of the following file extension types can be run from the command prompt? (Select THREE).

.com .bat .exe

Which of the following file extensions indicates a Windows system file? (Select TWO).

.dll .vxd

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow Full Control to both.

Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control to both.

Which file attribute identifies the file as having been modified since the last backup?

Archive

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?

C:\Users\username

Which file system path is the default location for system files in Windows 10?

C:\Windows

Where system root is the C: drive, where are fonts stored on a Windows 10 system?

C:\Windows\Fonts\

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO).

Configure both share and NTFS permissions. Place the files on an NTFS partition.

The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: Allow Full Control to the D:\Reports folder. Deny Full Control to the D:\Sales folder. Deny Full Control to the D:\Reports\2010reports.doc file. Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files?

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc.

Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc.

Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?

Directory permissions

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users?

Edit the properties for the file; assign Rachel the Deny Full Control permission.

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

Full Control

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfil Ben's needs?

Hidden share

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?

Include the D:\Reports folder in the library.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function?

Insert Mode

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?

\\Home1\Pictures

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you are looking for. Which of the following commands will display the entire contents of the cpuinfo text file on the screen?

cat /proc/cpuinfo

Which command would you use to change the current directory to the immediate parent directory?

cd ..

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following command should the technician use?

chmod

While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

Which commands can you use to create a new directory? (Select TWO).

md mkdir

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO).

more /var/log/auth.log less /var/log/auth.log

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

What command lets you see a list of valid command parameters for the net use command?

net use /?

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e


Related study sets

SAU Comm 135-L Final Exam chp 1-16

View Set

Setting up deep forecasting environment

View Set

factors that affect productivity

View Set

Chapter 13 - Central Nervous System Stimulants and Related Drugs

View Set

Life Insurance Basics L1 (ch. 4)

View Set