Exam 5: Configuring Resource Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?

(Multiple Choice)
4.8/5
(36)

Explain the different server roles that comprise the Distributed File System (DFS) component in Windows Server 2019.

(Essay)
4.9/5
(45)

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file?

(Multiple Choice)
4.9/5
(35)

Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group.

(True/False)
4.9/5
(45)

Explain with an example how access to a DFS namespace works when two or more shares are specified for a target.

(Essay)
4.8/5
(35)

The DFS Replication role needs to be installed to configure folder quotas and file screens.

(True/False)
4.9/5
(33)

Serena configures user quotas on a regularly accessed filesystem with hundreds of users. Some users complain that their quotas are exhausted even though they have not created any files on the system, while other users complain that the filesystem is slower than other filesystems. How would you explain this?

(Essay)
4.8/5
(43)

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?

(Multiple Choice)
4.8/5
(38)

Enoch is a system administrator who is configuring DFS replication. One of the replication groups has six servers. What topology should Enoch use and why?

(Essay)
4.8/5
(38)

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

(Multiple Choice)
4.9/5
(32)

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?

(Multiple Choice)
4.9/5
(36)

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

(Multiple Choice)
4.7/5
(37)

Which of the following statements is true of the ownership of a file or folder?

(Multiple Choice)
4.8/5
(37)

As the system administrator, you have enabled DFS replication. After a while, users complain that they are facing synchronization issues with a file. When troubleshooting, you find that several users are using the file simultaneously. What steps will you take to resolve this issue?

(Essay)
4.9/5
(41)

Sheryl is configuring an SMB shared folder using Server Manager. She notices that there is an option that allows her to "Encrypt data access." Is this the same as encrypting a file or folder ?

(Essay)
4.7/5
(29)

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

(Multiple Choice)
4.7/5
(36)

Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?

(Multiple Choice)
4.7/5
(36)
Showing 21 - 37 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)