IN130 Module 06 Quiz – Flashcards

Unlock all answers in this set

Unlock answers
question
Windows 8.1 provides three basic methods for sharing the files and folders on the computer. Which of the listed items is not one of these methods?
answer
All folder sharing
question
If you plan to activate Public folder sharing in Windows 8.1, what must be done before you can select the Turn on sharing so anyone with network access can read and write files in the Public folders option on the Advanced sharing settings control panel?
answer
Enable Network Discovery.
question
What is the first step that you must perform if you wish to give certain users in your organization priority access to a print device so that when a print device is busy, their jobs are processed before those of other users?
answer
Create multiple printers.
question
Which print architecture component is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device?
answer
Printer driver
question
It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?
answer
$
question
An access control list (ACL) is a collection of individual permissions, which are called what?
answer
Access control entries
question
What type of permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system?
answer
NTFS permissions
question
If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder?
answer
The files currently in the folder are not encrypted.
question
What type of permissions control access to specific parts of an Active Directory hierarchy?
answer
Active Directory permissions
question
How many basic and advanced permissions does NTFS provide for assignment to a folder or file?
answer
6 basic, 14 advanced
question
When UAC is configured, how many tokens will an administrator account holder receive when she logs in to the computer?
answer
Two
question
The members of which built-in security group possess no additional capabilities in Windows 8.1?
answer
Power Users
question
Digital certificates, smart cards, picture passwords, and biometrics are used to perform what action?
answer
Authentication
question
What must you do, at a minimum, before you can manage domain objects on a Windows 8.1 workstation?
answer
Install the Remote Server Administration Tools for Windows 8.1
question
What command-line utility could be used to elevate privileges in a script?
answer
runas.exe
question
Which of the following statements is true of Public folder sharing?
answer
Places all shared files in a single location
question
For users at home, which file sharing is most likely the simplest to setup and use?
answer
Homegroup sharing
question
What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network? Share permission (Share tab)-Sales group: Full Control NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Write
answer
Members of the Sales group will be able to edit content and delete files.
question
It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?
answer
$
question
If you plan to activate Public folder sharing in Windows 8.1, what must be done before you can select the Turn on sharing so anyone with network access can read and write files in the Public folders option on the Advanced sharing settings control panel?
answer
Enable Network Discovery.
question
Which NTFS permission should you configure for a security group when you want members of the group to be able to see files contained in a folder but not to open the files contained in the folder?
answer
List Folder Contents
question
What type of permissions control access to specific parts of the Windows registry?
answer
Registry permissions
question
When examining effective access, there are three rules that must be understood. Which of the following is not one of these rules?
answer
Implicit permissions break permissions inheritance.
question
What type of permissions control access to specific parts of an Active Directory hierarchy?
answer
Active Directory permissions
question
Regarding NTFS permissions, when you copy NTFS files or folders from one volume to another, which of the following statements is true?
answer
The permissions are not retained and permissions set at destination are applied.
question
Which of the following terms best describes a collection of computers in which all of the computers utilize a central directory service for authentication and authorization?
answer
Domains
question
How can you fully disable UAC in Windows 8.1?
answer
Manually edit the registry.
question
Digital certificates, smart cards, picture passwords, and biometrics are used to perform what action?
answer
Authentication
question
Which of the following Windows components must be enabled before you can use Protected Mode in IE?
answer
UAC
question
What must you do, at a minimum, before you can manage domain objects on a Windows 8.1 workstation?
answer
Install the Remote Server Administration Tools for Windows 8.1
question
How do you start the process to modify the default homegroup sharing configuration?
answer
Open the HomeGroup app from the Control Panel. Select one of your shared libraries in File Explorer and click Share in the toolbar.
question
For users at home, which file sharing is most likely the simplest to setup and use?
answer
Homegroup sharing
question
What is the first step to create a printer pool?
answer
Install multiple identical print devices.
question
Which print architecture component is the software interface through which a computer communicates with a print device?
answer
Printer
question
Windows 8.1 provides three basic methods for sharing the files and folders on the computer. Which of the listed items is not one of these methods?
answer
All folder sharing
question
What type of permissions control access to specific parts of an Active Directory hierarchy?
answer
Active Directory permissions
question
When using the iacls.exe utility, what flag (e.g., /?) is used to specify that the command should be executed on all files and subfolders contained in the starting folder location?
answer
/T
question
Which NTFS permission should you configure for a security group when you want members of the group to be able to see files contained in a folder but not to open the files contained in the folder?
answer
List Folder Contents
question
What is the maximum support file name length in the NTFS file system?
answer
255 characters
question
A server that is not running as a domain controller is known as a _____.
answer
member server
question
Generally speaking, which of the following password conditions is not considered to be part of a strong password?
answer
A predictable password
question
You want to allow three employees in your company the ability to backup data on the computer. To which local group should you add their accounts in order to grant them the least amount of privileges required to perform their assigned duties?
answer
Backup Operators
question
Where are user accounts stored for computers that are in a workgroup?
answer
Security Accounts Manager
question
What is the term used when a password is obtained through tricking a user into giving it to another party?
answer
Social engineering
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New