Exam 6: Windows File and Print Services

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How many previous versions of a file will Shadow Copies keep?

Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Verified

64

How would you access all the shares under a DFS namespace in the domain Example and namespace of Test?

Free
(Short Answer)
4.9/5
(27)
Correct Answer:
Verified

\\Example\Test

What matches this description? A suite of services and management tools for monitoring storage space,managing quotas,controlling the types of files that users can store on a server,and creating storage reports

Free
(Short Answer)
4.8/5
(35)
Correct Answer:
Verified

File Server Resource Manager

An option on NTFS volumes that enables administrators to limit how much disk space a user can occupy with his or her files

(Multiple Choice)
4.9/5
(42)

Permissions applied to shared folders that protect files accessed across the network.Share permissions are the only method for protecting files on FAT volumes

(Multiple Choice)
4.7/5
(36)

Defines the method and format an OS uses to store,locate,and retrieve files from electronic storage media

(Multiple Choice)
4.9/5
(28)

One of your co-workers,Jeremy,is trying to access a share on a server you're responsible for.He has asked for your help because despite having the correct share permissions,he still cannot access the share.After investing the problem,you find the permissions are configured as follows: Share permissions: Everyone - Full control NTFS Permissions: HRdept - Modify Jeremy - Deny Full Control Jeremy informs you that he is a member of the HRdept group.What is Jeremy's effective permissions over the network?

(Multiple Choice)
4.9/5
(28)

In a domain environment,the domain Administrator account is designated as a recovery agent.

(True/False)
4.7/5
(35)

What MMC snap in can you use to create,delete,and monitor shares;view open files;and monitor and manage user connections or sessions?

(Short Answer)
4.8/5
(38)

With NTFS,compression can be enabled on a folder with encryption.

(True/False)
4.8/5
(33)

By default,shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m. ,and 12:00 p.m. ,Monday through Friday.

(True/False)
4.9/5
(35)

What command would you use to delete a network drive mapping assigned to the drive letter Z?

(Short Answer)
4.8/5
(34)

Hidden shares created by Windows that are available only to members of the Administrators group

(Multiple Choice)
4.9/5
(41)

What service do you install to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers?

(Multiple Choice)
4.7/5
(38)

Volume mount points enable you to access a volume as a ____________________ in another volume instead of by using a drive letter.

(Short Answer)
4.7/5
(35)

____________________ is the native file-sharing protocol in UNIX and Linux.

(Short Answer)
4.8/5
(40)

In a Windows environment,he physical printer containing paper and ink or toner to which print jobs are sent is called...

(Multiple Choice)
4.9/5
(31)

What is the size limit for FAT32 partitions at creation time within Windows operating systems?

(Multiple Choice)
4.9/5
(20)

If a file with the compression attribute set is copied to a new location,what happens?

(Multiple Choice)
4.8/5
(43)

Which of the following is not a reason to use volume mount points?

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)