Windows Server Ch 5

Ace your homework & exams now with Quizwiz!

. What character should you place at the end of a share name in order to hide the share?

$

What are the three ways in which a shared folder can be cached?

-only files/programs that users specify will be available offline -no files/programs from the shared folder are available offline (no caching on computer's hard drive) -all files/programs that users open from the shared folder are automatically available offline (files/programs are automatically cached without user intervention, user only has to use or open the file/program and it is cached)

What is the default cache duration for a DFS namespace?

5 minutes

What statement regarding ownership of a file or folder is NOT accurate?

An administrator does not have the ability to take ownership of a file / folder unless granted permission to do so.

What are the two different types of ACLs that can be used by Windows Server 2016?

Discretionary and system control.

If EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you're a member of the Administrators group.

False

Logs created by auditing Active Directory processes show up under the "System" section in Event Viewer

False

What is the primary disadvantage of using compressed files and folders?

Increased CPU utilization

What happens to the NTFS permissions applied to a folder when the folder is moved to a different folder in the same volume?

It keeps its previous permissions settings in the new folder.

User Jsmith is a member of the Accounting and Contractor groups, and is trying to save a file to Folder A on his local computer, but finds he has no access. Upon investigating, you discover the Accounting group has Full Control over Folder A, but the Contractor group has been denied all access to the folder. What Jsmith's effective access?

Jsmith's membership in the Contractor group means that he has been denied all access to the folder.

What permissions should you assign a group if you want the group to have the ability to read, add, delete, execute, and modify files, but not to be able to delete subfolders and their file contents, change permissions, or take ownership?

Modify

A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned, and Read permissions at the share level. What is the effective permissions for the user on the file?

Read

A user with Full control share permissions and read permissions at the NTFS level on the shared folder has what permissions to the files in the folder when accessing over the network?

Read only permission

What client can be used on UNIX and Linux systems to access SMB based shares?

Samba

By default, Windows file sharing utilizes what protocol?

Server Message Block (SMB)

What should be done to ensure that access to EFS files is maintained even after they've been restored from a data backup?

The EFS keys should be backed up, in order to ensure access.

What happens when you move a file with NTFS permissions to a different NTFS volume?

The file inherits the permissions of the parent folder to which it is moved.

What happens if an encrypted file on an NTFS partition is moved to a FAT or FAT32 partition?

The file is decrypted and placed onto the FAT volume.

What happens when a folder with NTFS permissions is copied to shared folder on a FAT volume?

The folder inherits the share permissions, but loses the NTFS permissions.

A user with the "Write extended attributes" advanced permission can do what?

They can add or remove the archive, index, compress, and encrypt attributes

What is a user who has "List folder contents" permissions allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

T or F Access based enumeration limits the shares a user can see to only the shares the user has a minimum of read permissions for

True

What service replaces the older Indexing Service to provide indexed search results?

Windows Search Service

What type of encryption is used by the Encrypting File System feature in Windows?

both symmetric and asymmetric

What command can be used to encrypt / decrypt files from the command line?

cipher

** What are the basic share permissions, and what do they do?

read - groups and users can read and execute files, cannot add, delete, or modify files/folders. write - groups/users can modify the contents of files **custom? "means advanced share permissions already apply to this folder or file owner - assigned to owner of folder, such as the creator. enables owner to read, execute, add, delete and modify files in the shared folder as well as create and delete subfolders and manage the share permissions

What are the two basic attributes in NTFS that are still compatible with FAT?

read-only and hidden

What are the rules that affect what happens to permissions when a file or folder is created, copied, or moved?

-NEWLY CREATED file inherits the permissions already set up in a folder -file COPIED from one folder to another on the SAME VOLUME inherits the permissions of the destination folder -file/folder MOVED to folder on SAME VOLUME takes its original permissions with it. -file/folder that is MOVED OR COPIED to a folder on a DIFFERENT VOLUME inherits permissions of destination folder -file/folder MOVED OR COPIED from NTFS folder to FAT folder is no longer protected by the NTFS permissions but inherits the share permissions (if any) of the FAT folder -file/folder MOVED OR COPIED from FAT folder to NTFS folder inherits the NTFS folder's permissions

What are some best practices to follow when utilizing the Encrypting File System?

-move files to be encrypted into specifically designated folders flagged for encryption -It is safer for an application to work on a file in an encrypted folder rather than an individually encrypted file in a non encrypted folder -workstation users and server administrators should consider encrypting the "my documents", or "documents" folder on their systems -users and server administrators should frequently export certificates and private keys to portable media in a secure place

What are the advantages of utilizing disk quotas for managing volumes?

-prevents users from filling the disk capacity -encouraging users to help manage disk space by deleting old files when they recieve a warning that their quota limit is approaching -tracking disk capacity needs on a per-user basis for future planning -Providing server administrators with information about when users are nearing or have reached their quota limits


Related study sets

Test Your Knowledge: Ancient Greece

View Set

Chapter 45: Management of Clients with Thyroid and Parathyroid Disorders

View Set

Section 4.3: Conditional Probability Multiplication Rule

View Set

Metabolic Functions of the Liver

View Set

Vocabulary Workshop Lessons 3 and 4

View Set