Exam 5: Configuring Resource Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default.

Free
(True/False)
4.9/5
(29)
Correct Answer:
Verified

False

Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

D

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

What are the two different types of ACLs used by Windows Server 2019?

(Essay)
4.8/5
(34)

Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder?

(Multiple Choice)
4.9/5
(35)

If Active Directory did not provide centralized user authentication using Kerberos, what would be the implications for NFS?

(Essay)
4.7/5
(40)

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

(Multiple Choice)
4.8/5
(26)

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

(Multiple Choice)
4.8/5
(31)

What are the three ways in which a shared folder can be cached?

(Essay)
4.9/5
(30)

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

(Multiple Choice)
4.9/5
(32)

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?

(Multiple Choice)
4.9/5
(33)

What are users who only have the List folder contents permission allowed to do?

(Multiple Choice)
4.8/5
(28)

What are the effects on file and folder permissions when a file or folder is created, copied, or moved?

(Essay)
4.9/5
(35)

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches?

(Multiple Choice)
5.0/5
(35)

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?

(Multiple Choice)
4.8/5
(35)

Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.

(Multiple Choice)
4.9/5
(30)

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

(Multiple Choice)
4.8/5
(36)

Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?

(Multiple Choice)
4.9/5
(33)

Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission.

(True/False)
4.8/5
(44)

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.

(True/False)
4.9/5
(31)
Showing 1 - 20 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)