Windows Server 2008 Ch6

Card Set Information

Author:
a2k2d2
ID:
272736
Filename:
Windows Server 2008 Ch6
Updated:
2014-05-09 21:30:36
Tags:
Windows Server 2008
Folders:

Description:
Windows Server 2008 Administration Fundamentals Chapter 6
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user a2k2d2 on FreezingBlue Flashcards. What would you like to do?


  1. 1. What is used to grant access to objects such as NTFS files or Active Directory user accounts?

    A) right
    B) certificate
    C) template
    D) permission
    D) permission
    (this multiple choice question has been scrambled)
  2. 2. Permissions assigned to an NTFS file are stored in a ______.

    A) certificate
    B) template
    C) ACL
    D) group
    C) ACL
    (this multiple choice question has been scrambled)
  3. 3. What is the minimum permission needed to change the attributes of a file?

    A) Write
    B) Read & Execute
    C) Full Control
    D) Modify
    A) Write
    (this multiple choice question has been scrambled)
  4. 4. What is the minimum permission needed to take ownership of a file or folder?

    A) Full Control
    B) Modify
    C) Read & Execute
    D) Write
    A) Full Control
    (this multiple choice question has been scrambled)
  5. 5. What permissions are directly assigned to a file or folder?

    A) assigned permissions
    B) explicit permissions
    C) inherited permissions
    D) booted permissions
    B) explicit permissions
    (this multiple choice question has been scrambled)
  6. 6. What permission always wins out?

    A) Explicit Deny Full Control
    B) Inherited Deny Full Control
    C) Explicit Allow Full Control
    D) Inherited Allow Full Control
    A) Explicit Deny Full Control
    (this multiple choice question has been scrambled)
  7. 7. What happens to a file’s permissions if you copy it from one volume to another?

    A) The file will acquire the permission of the source folder.
    B) The file will have the permissions as before.
    C) The file will acquire the permissions of the target folder.
    D) The file will have no permissions.
    C) The file will acquire the permissions of the target folder.
    (this multiple choice question has been scrambled)
  8. 8. What happens to those permissions of a file if you move to a folder within the same volume?

    A) The file will have no permissions.
    B) The file will acquire the permission of the source folder.
    C) The file will have the permissions as before.
    D) The file will acquire the permissions of the target folder.
    C) The file will have the permissions as before.
    (this multiple choice question has been scrambled)
  9. 9. What technology is used to encrypt an individual file or folder?

    A) EFS
    B) DFS
    C) SMB
    D) CIFS
    A) EFS
    (this multiple choice question has been scrambled)
  10. 10. What is the minimum share permission needed to modify files and its attributes?

    A) Full Control
    B) Write
    C) Change
    D) Read
    C) Change
    (this multiple choice question has been scrambled)
  11. 11. What shares are usually hidden and are used for administrative purposes?

    A) administrative share
    B) explicit share
    C) denied view share
    D) magic share
    A) administrative share
    (this multiple choice question has been scrambled)
  12. 12. By default, what port does a TCP/IP printer port use?

    A) 8080
    B) 443
    C) 3128
    D) 9100
    D) 9100
    (this multiple choice question has been scrambled)
  13. 13. What is the minimum permission needed to print to a printer and to manage your own print jobs?

    A) Print
    B) Manage Documents
    C) Manage this Printer
    D) Full Control
    A) Print
    (this multiple choice question has been scrambled)
  14. 14. What port does Internet Printing use?

    A) 1801
    B) 443
    C) 80
    D) 9100
    C) 80
    (this multiple choice question has been scrambled)
  15. 15. What is used to keep track of what a user does on a system?

    A) user rights
    B) auditing
    C) permissions
    D) authentication
    B) auditing
    (this multiple choice question has been scrambled)
  16. 16. How do you enable auditing on a Windows server?

    A) Registry editor
    B) Group policies
    C) MS Configuration
    D) Windows Explorer
    B) Group policies
    (this multiple choice question has been scrambled)
  17. 17. A(n) ________ permission is one that is granted on a higher folder level that flows into the folders below it.
    inherited
  18. 18. When you print a document using Microsoft Word, the document is sent to the printer as a _________.
    print job
  19. 19. What is the default path for the print spool folder?
    C:WindowsSystem32SpoolPrinters
  20. 20. What do you call permissions that that actually granted to a user when a user logs on and accesses the particular file or folder?
    effective permissions
  21. 21. What do you do with a folder that you do not have permissions to and you need to access immediately?
    take ownership of the folder
  22. 22. What is the recommended share permission and NTFS permission you should assign to a folder that you shared?
    The Allow Full Control share permission should be assigned to the folder for Everyone. Then you should control access using NTFS permissions.
  23. 23. What do you call a group of printers that act as one so that it can handle a large volume of printing?
    printer pool
  24. To print to a printer, you need the _____ permission.
    print
  25. The NTFS special permission that allows you to move through a folder to reach lower files or folders is _____.
    traverse folder
  26. The Windows component that allows you to manage shares and NTFS permissions is _____.
    Windows Explorer
  27. Permissions that flow from a parent object to a child object are called _____.
    inherited permissions
  28. The _____ are the actual permissions when a user logs in and accesses a file or folder.
    effective permissions
  29. The encrypting technology included in NTFS is _____.
    EFS
  30. For Windows Server 2008 to be seen on the network, you must enable _____.
    network discovery
  31. A(n) _____ is not seen when browsed.
    administrative share
  32. When some has removed all users from a folder, you can _____ of the folder.
    take ownership
  33. The default location of the spool folder is _____.
    C:WindowsSystem32SpoolPrinters
  34. What is the standard NTFS permission needed to change attributes of a NTFS folder?

    A. Modify
    B. Fully Control
    C. Write
    D. Read
    C. Write
    (this multiple choice question has been scrambled)
  35. Which permission takes precedence?

    A. Inherited deny
    B. Inherited allow
    C. Explicit allow
    D. Explicit deny
    D. Explicit deny
    (this multiple choice question has been scrambled)
  36. Which of the following is NOT a share permission?

    A. Write
    B. Read
    C. Full Control
    D. Change
    A. Write
    (this multiple choice question has been scrambled)
  37. TCP/IP printers use port _______

    A. 9100
    B. 443
    C. 3000
    D. 23
    A. 9100
    (this multiple choice question has been scrambled)
  38. What is a single virtual printer with a single print queue that consist of two or more printers?

    A. Printer group
    B. Direct printers
    C. Printer pool
    D. Print collection
    C. Printer pool
    (this multiple choice question has been scrambled)
  39. What symbol makes an administrative share not seen when browsed?

    A. #
    B. $
    C. !
    D. *
    B. $
    (this multiple choice question has been scrambled)
  40. When enabling Internet Printing, you need to install ___________.

    A. Task Manager
    B. GPO Manager
    C. DFS
    D. IIS
    D. IIS
    (this multiple choice question has been scrambled)
  41. What is the minimum share permission that allows you to change file and folder permissions?

    A. Read
    B. Change
    C. Full Control
    D. Manage
    C. Full Control
    (this multiple choice question has been scrambled)
  42. When you copy files from one folder to another folder within the same volume, you get the ____________.

    A. Same permissions as the target
    B. Everyone has full permission
    C. Same permissions as the source
    D. No permissions are set
    C. Same permissions as the source
    (this multiple choice question has been scrambled)
  43. You are an administrator on a computer. Unfortunately, there is a folder thatyou cannot access because you have do not have permissions to the folder.  What can you do?

    A. Grant the allow everyone full permission.
    B. Delete the folder and recreate it.
    C. Turn off the deny attribute.
    D. Take ownership of the folder.
    D. Take ownership of the folder.
    (this multiple choice question has been scrambled)
  44. If full control is assigned to a parent object for a user, the full control permission will overwrite explicit permissions at a child object.

    True or False
    True
  45. To see who accesses a file over time, you only have to turn on object access audit events.

    True or False
    False
  46. When you are looking at NTFS permissions that are grayed out, it means that you don’t have the permissions needed to modify the NTFS permissions.

    True or False
    False
  47. You can encrypt and compress a file within NTFS at the same time.

    True or False
    False
  48. When calculating the NTFS and share permissions, you would apply the more restrictive permissions between the NTFS and shared permission.

    True or False
    True

What would you like to do?

Home > Flashcards > Print Preview