week 3 md100

Ace your homework & exams now with Quizwiz!

Which of these helps to minimize the money related to provisioning and supporting encrypted BitLocker drives? Microsoft BitLocker Administration and Monitoring Microsoft System Center Configuration Manager Microsoft BitLocker Configuration Manager System Center Virtual Machine Manager

Explanation Answer A is correct. Microsoft BitLocker Administration and Monitoring (MBAM) helps to minimize the money related to provisioning and supporting encrypted BitLocker drives. It also helps IT departments simplify BitLocker deployment and key recovery while also providing centralized compliance monitoring and reporting. Answer B is incorrect. Microsoft System Center Configuration Manager (SCCM) allows you to have a centralized reporting and hardware management utility that works with MBAM. Answer C is incorrect. No such utility exists. Answer D is incorrect. System Center Virtual Machine Manager (SCVMM) is a management tool developed by Microsoft to efficiently manage Hyper-V, particularly as a company's virtual machine and services deployment size increases.

You are the network administrator for a medium-sized company. Rick was the head of HR and recently resigned. John has been hired to replace Rick and has been given Rick's laptop. You want John to have access to all of the resources to which Rick had access. What is the easiest way to manage the transition? Rename Rick's account to John. Copy Rick's account and call the copied account John. Go into the Registry and do a search and replace to replace all of Rick's entries with John's name. Take ownership of all of Rick's resources and assign John Full Control to the resources.

Explanation Answer A is correct. The easiest way to manage this transition is to simply rename Rick's account to John. It is very important to remember that rights and permissions get associated with a user's SID number and not a username. By renaming Rick's account to John, John will automatically have all of the rights and permissions to any resource that Rick had access to.

An IT manager, Jeff, has decided to use a Windows 1 0 system to store some local folders for network access. The folder will be located on an NTFS partition. Jeff has assigned both NTFS permissions and share permissions. Which of the following statements is true about how share permissions and NTFS permissions work together on the same folder? The system will look at both the share permissions and the NTFS permissions, and whichever set is more restrictive will be applied to the folder. The NTFS permissions will always take precedence. The share permissions will always take precedence. When Windows 10 sets permissions, it does it through HomeGroups only.

Explanation Answer A is correct. When both the NTFS permissions and share permissions have been applied, the system looks at the effective rights for NTFS and share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared, and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permissions.

You are trying to decide whether or not to use BitLocker and BitLocker To Go in your corporate environment. You have over 300 users, and it would be a huge task to have all of these users use BitLocker. Which utility will you use to accomplish the task? Microsoft BitLocker Administration and Monitoring Microsoft System Center Configuration Manager System Center Virtual Machine Manager Microsoft BitLocker Configuration Manager

Explanation Answer A is correct. You will use the Microsoft BitLocker Administration and Monitoring (MBAM) utility to accomplish the task. It allows the IT department to use enterprise-based utilities for managing and maintaining BitLocker and BitLocker To Go. Answer B is incorrect. Microsoft System Center Configuration Manager (SCCM) allows IT members to have a centralized reporting and hardware management utility that works with MBAM. Answer C is incorrect. System Center Virtual Machine Manager (SCVMM) is a management tool developed by Microsoft to efficiently manage Hyper-V, particularly as a company's virtual machine and services deployment size increases. Answer D is incorrect. No such utility as Microsoft BitLocker Configuration Manager exists.

You are using Windows 10 and you have created a file called "my text" in Notepad having a .txt extension type. You need to change the extension type from .txt to .vbx. What setting do you need to change on the folder so that you can see the extension types? This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option. Uncheck Hide Extensions For Known File Types. Check Unhide Extensions For Files. Check Show Extensions For Files. Uncheck Hide All File Types.

Explanation Answer A is correct.Filename extensions for known files are hidden by default. If you want to be able to see the filename extension for all files, you must uncheck the box Hide Extensions For Known File Types.

The owner of your company has come to you and stated that he wants all of the hardware on all systems to use BitLocker and BitLocker To Go. What utility should you install to help manage and maintain BitLocker and BitLocker To Go? MAAM MBAM MNBM MABM

Explanation Answer B is correct. Microsoft BitLocker Administration and Monitoring (MBAM) will allow the IT department to use enterprise-based utilities for managing and maintaining BitLocker and BitLocker To Go.

You are the IT manager for your company. You have been asked to give the Executive group the right to read, change, and assign permissions to documents in the Stormwind Documents folder. The following table shows the current permissions on the Stormwind Documents shared folder: Group/User Executive Marketing NTFS Read Modify Shared Full Control Read Table A: Permissions What do you need to do to give members of the Executive group the right to do its job? Give Executive Change to shared permissions. Give Executive Full Control to NTFS security. Give Marketing Change to shared permissions. Give Sales Full Control to NTFS security.

Explanation Answer B is correct. The Executive group needs Full Control on the NTFS security and Full Control shared permission settings to do its job. Only Full Control can assign other rights. Answer A is incorrect because the Executive group already has Full Control to shared permissions. Answers C and D are incorrect because you need to assign permissions to the Executive group and not to the Marketing or Sales group.

You work for a government contractor. The contractor needs you to have security ID badges issued to all users so that the users are assigned their groups and rights through the ID badge. How will you accomplish this? By using BitLocker To Go on the ID badges By using smart cards By using BitLocker Drive Encryption By using MBAM

Explanation Answer B is correct. You will use smart cards to accomplish the task. Smart cards are credit-card-sized IDs that can have chips built into the card for rights and permissions. Many smart cards can have ID information printed onto the PVC card. Answer A is incorrect. BitLocker To Go allows you to put BitLocker on removable media such as external hard disks or USB drives. Answer C is incorrect. BitLocker Drive Encryption prevents individuals from stealing your computer and viewing personal and sensitive data found on your hard disk. Answer D is incorrect. MBAM (Microsoft BitLocker Administration and Monitoring) allows the IT department to use enterprise-based utilities for managing and maintaining BitLocker and BitLocker To Go.

Will, your company's IT director, is trying to train a new IT administrator named Doug. Doug has asked Will which server files are compressed. Which of the following folder settings can Will use to help Doug most easily recognize the compressed files? Show Drive Letters Show Preview Handlers In Preview Pane Show Encrypted Or Compressed NTFS Files In Color Show Pop-up Description For Folder And Desktop Items

Explanation Answer C is correct. Will can use the folder setting Show Encrypted Or Compressed NTFS Files In Color to help Doug recognize the compressed files. Administrators can set this folder option so that compressed and encrypted files are shown as a different color. Answer A is incorrect. Show Drive Letters option specifies whether drive letters are displayed in the folder. When disabled, only the name of the disk or device will be shown. Answer B is incorrect. Show Preview Handlers In Preview Pane option shows the contents of files in the preview pane. Answer D is incorrect. Show Pop-up Description For Folder And Desktop Items option displays encrypted or compressed files in an alternate color when they are displayed in a folder window.

You are the system administrator for contoso.com.The employees of your company save their documents on the desktop. Although these documents are very important and you need to protect them from system failures and access them anytime from anywhere. Which of the following tools should you use to accomplish this without adding any further expenses to the company? Microsoft Azure MBAM Microsoft OneDrive Microsoft Passport

Explanation Answer C is correct. You should use Microsoft OneDrive to protect the documents from system failures and access them anytime from anywhere, without adding any further expenses to the company. Microsoft OneDrive is a cloud-based storage system where corporate users or home users can store their data in the cloud. It allows users to use up to 5 GB of cloud storage for free without a subscription. Answer A is incorrect. Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. Answer B is incorrect. MBAM (Microsoft BitLocker Administration and Monitoring) allows the IT department to use enterprise-based utilities for managing and maintaining BitLocker and BitLocker To Go. Answer D is incorrect. Microsoft Passport allows users to use a two-factor authentication system that combines a PIN or biometrics with an encrypted key from a user's device to provide two-factor authentication.

Vincent is an instructor for Stormwind and he is talking to Paige, the company's IT Manager. Vincent asks Paige to implement some type of two-factor authentication. Which of the following will Paige install to complete this request? Passwords and usernames Retina scanners Fingerprint scanners Smart cards

Explanation Answer D is correct. Smart cards are plastic cards (the size of a credit card) that can be used in combination with other methods of authentication. This process of using a smart card along with another authentication method is called two-factor authentication or multi-factor authentication.

You are the network administrator for a large organization. You have a Windows 10 machine that needs to prevent data from being accessed if the hard drive is stolen. Which of the following methods will you use to accomplish this task? Within the System icon in Control Panel, set the BitLocker Drive Encryption. Within the Hardware icon in Control Panel, set the BitLocker Drive Encryption. Within the Device Manager icon in Control Panel, set the BitLocker Drive Encryption. Within a Local Group Policy, set the BitLocker Drive Encryption.

Explanation Answer D is correct. Windows 10 comes with a feature called BitLocker Drive Encryption. BitLocker encrypts the drive so if it's removed or stolen, the data can't be accessed. To configure BitLocker, you must either use a Local Group Policy or the BitLocker icon in Control Panel.

You have a network folder that resides on an NTFS partition on a Windows 10 computer. NTFS permissions and share permissions have been applied. Which of the following statements best describes how share permissions and NTFS permissions work together if they have been applied to the same folder? This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option. The NTFS permissions will always take precedence. The share permissions will always take precedence. The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is less restrictive will be applied. The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is more restrictive will be applied.and this is correct answer

Explanation Answer D is correct.When both NTFS and share permissions have been applied, the system looks at the effective rights for NTFS and share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permissions.

Jeff, the IT manager for Stormwind, has been asked to give Tom the right to read and change documents in the Stormwind Documents folder. The following table shows the current permissions on the shared folder: roup/User Sales Marketing Finance Tom NTFS Read Modify Deny Read Read Change Change Full Control Read Change Table A: Shared folder permissions Tom is a member of the Sales and Finance groups. When Tom accesses the Stormwind Documents folder, he can read all the files, but the system won't let him change or delete files. What do you need to do to give Tom the minimum amount of rights to do his job? Give Sales Full Control to shared permissions. Give Tom Full Control to NTFS security. Give Finance Change to shared permissions. Give Finance ModiW to NTFS security. Give Tom Modify to NTFS security.

Explanation Answer E is correct. By giving Tom ModiW on the NTFS security setting, you're giving him just enough to do his job. You could also give Sales or Finance the Modify permission, but then everyone in those groups would be able to delete, change, and do more than they all need. Also, Tom doesn't need Full Control to change or delete files.

You are the IT manager for your company. You have been asked to give the Sales group the right to read and change documents in the StormWind Documents folder. The following table shows the current permissions on the Stormwind Documents shared folder: Group/User Sales Marketing NTFS Read Modify Read Change Table A: Shared folder permissions What do you need to do to give the Sales group the right to do their job? Each correct answer represents a part of the solution. Choose all that apply. Give Sales Change to shared permissions. Give Sales Modify to NTFS security. Give Marketing Change to shared permissions. Give Sales Full Control to NTFS security.

Explanation Answers A and B are correct. The Sales group needs Modify on the NTFS security and Change shared permission settings to do their jo

You are the IT manager for your company. You have been asked to give the Marketing group the right to Read-only on all the documents in the Sales folder. The following table shows the current permissions on the Sales shared folder: Group/User Sales Marketing Finanæ Admin NTFS Read Modify Deny Read Change Change Change Full Control Read Change What do you need to do to give the Marketing group the right to do its job? Each correct answer represents a complete solution. Choose all that apply. Change Marketing's Modify right to Read on the NTFS permissions. Give Full Control to Marketing NTFS security. Change Marketing's Change permission to Full Control to shared permissions. Change Marketing's Change permission to Read on the Shared permissions.

Explanation Answers A and D are correct. The Marketing group needs to have Read on both NTFS and Shared. This is the best way to do it. If you change either permission, you will restrict Marketing to Read-only, but changing both guarantees that it only has Read. Answers B and C are incorrect because giving Full Control to the Marketing group will allow it to access all permissions.

In which of the following editions of Windows 10 can you enable BitLocker? Each correct answer represents a complete solution. Choose all that apply. Windows 10 Education Edition Windows 10 Basic Edition Windows 10 Professional Edition Windows 10 Enterprise Edition

Explanation Answers A, C, and D are correct. BitLocker Drive Encryption is a data protection feature available in Windows Education, Enterprise, and Professional editions of Windows 10.

You are an IT administrator for Stormwind.com. Your company's employees run various operating systems on their computers. You want to implement BitLocker on your network. Which operating systems support BitLocker Drive Encryption? Each correct answer represents a complete solution. Choose all that apply. Windows 10 Education Windows 7 Home Windows 10 Professional Windows 8.1 Enterprise

Explanation Answers A, C, and D are correct. BitLocker Drive Encryption is a data protection feature available in Windows Education, Enterprise, and Professional editions of Windows 10. It is also available on Windows 7 and Windows 8 corporate editions (Enterprise, Professional, etc.). Answer B is incorrect because Windows 7 Home doesn't support BitLocker Drive Encryption.

Sally works as a network administrator for a small organization. There are some resources to which a user needs access and asks Sally to share the resources. Sally uses sharing to allow the network user access to that resource. Which of the following are true statements regarding sharing? Each correct answer represents a complete solution. Choose all that apply. Share permissions can be applied to folders as well as files. Folders can be shared through the Net Share command-line utility. If a shared folder is copied, the original folder along with the copy will be shared. If a folder is shared over the network and a user is accessing it locally, then share permissions will not apply to the local user; only NTFS permissions will apply.

Explanation Answers B and D are correct. The following are correct statements regarding sharing: Folders can be shared through the Net Share command-line utility. If a folder is shared over the network and a user is accessing it locally, then share permissions will not apply to the local user; only NTFS permissions will apply. Answer A is incorrect because share permissions can be applied only to folders and not to files. Answer C is incorrect because if a shared folder is copied, the original folder will still be shared but not the copy.

Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computerl that runs Windows 10. On Computerl , you create an NTFS folder and assign the Full Control permission to everyone. You share the folder as Sharel and assign the permissions shown in the following table: User Userl User2 Permission Modify Full Control Table A: Assigned Permissions When accessing Sharel , what actions can be performed by User2 but not by Userl? Each correct answer represents a part of the solution. Choose all that apply. Delete a file. Set the permissions for a file. Rename a file. Take ownership of a file.

Explanation Answers B and D are correct. User2 can set the permissions for a file and take ownership of a file which can't be performed by Userl . If you select the Full Control permission, all permissions will be checked by default and can't be unchecked, and then User2 can perform all the above four actions. Answers A and C are incorrect because these actions can be performed by Userl . A person having the Modify permission over a file can change the attributes of the file and delete the file.

You are the IT manager for your company. You have been asked to give the Admin group the rights to read, change, and assign permissions to documents in the Stormwind Documents folder. The following table shows the current permissions on the Stormwind Documents shared folder: Group/User Sales Marketing Finance Admin NTFS Read Modify Deny Read Change Shared Change Change Full Control Read Change Table A: Shared folder permissions What do you need to do to give the Admin group the rights to do its job? Each correct answer represents a part of the solution. Choose all that apply. Give Sales Full Control to shared permissions. Give Full Control to NTFS security. Give Admin Full Control to shared permissions. Give Finance Modify to NTFS security. Give Admin Full Control to NTFS security.

Explanation Answers C and E are correct. The Admin group needs Full Control on the NTFS security and shared permission settings to do its job. To be able to give other users permissions, you must have the Full Control permission.


Related study sets

Basic Care and Comfort and Adaptation

View Set

CNA Exam Review: Physical Care Skills

View Set

Ch 43 Nursing in Occupational Health

View Set

Everythings An Argument Chapters 4 and 5

View Set