Sei sulla pagina 1di 7

School of Life and Physical Science Associate Degree in Information technology AD006 Answers to questions done of the 9_8_2012

in class 1. Which of the following is a user account category? (Choose all that apply.) a. local c. domain 2. Which of the following is a built-in user account? (Choose all that apply.) a. Administrator d. Guest 3. Sam*Snead is a valid user account name. True or False? False 4. Which of the following is true about user accounts in a Windows Server 2008 domain? (Choose all that apply.) a. The name can be from 1 to 20 characters. c. The name cant be duplicated in the domain. 5. Which of the following account options cant be set together? (Choose all that apply.) a. User must change password at next logon c. Password never expires 6. Global groups can have domain local groups as members. True or False? False 7. Jane has left the company. Her user account is a member of several groups and has permissions and rights to a number of forestwide resources. Janes replacement will arrive in a couple of weeks and need access to the same resources. In addition, you want the new employee to have access to the files in Janes profile. What is the best course of action? c. Disable Janes account. When the new employee arrives, rename Janes account, assign it a new password, and enable it again. 8. Over the past several months, Tom, who has access to sensitive company information, has logged on to computers in other departments and left them without logging off. You have discussed the matter with him, but the problem

continues to occur. Youre concerned that someone could easily access these sensitive resources easily. Whats the best way to solve this problem? b. Specify which computers Tom can log on to in the domain by using the Log On To option in his accounts properties. 9. You have noticed inappropriate use of computers for gaming and Internet downloads by some employees who come in after hours and on weekends. These employees dont have valid work assignments during these times. You have been asked to devise a solution for these employees that doesnt affect other employees or these employees computers during working hours. Whats the best solution? c. Set the Logon Hours options for their user accounts. 10. The Users domain local group can be a member of the local Administrators group on a Vista computer. True or False? False 11. Which of the following is considered a security principal? (Choose all that apply) b. Computers c. User accounts 12. Youre trying to troubleshoot a users profile. When you open the folder containing the profile, you notice that many files and folders you expect to see are missing. The symptoms of the problem dont indicate so many files and folders being missing. Whats the likely problem, and how can you solve it? The files are hidden and/or system files. In Windows Explorer, enable the options for viewing hidden and system files. 13. What file do you see in the root of a users mandatory profile? d. Ntuser.man 14. You have just installed 50 new Vista computers. You want to be sure that all users get an initial profile you have created when they first log on to a computer in the domain; they can then customize the profile as needed. Which of the following is a required step for this task? c. Create a folder named Default User.V2. 15. You want to prevent users from logging on to the domain if their mandatory profiles are unavailable for some reason. Which of the following is a necessary step?

b. Add .man to the profile path in their account properties. 16. You have configured roaming profiles throughout your company. However, employees are now complaining that logging on and off sometimes take a long time. You have also noticed a spike in overall network traffic, particularly during the beginning and end of shifts. What can you do to reduce the delays and reduce network traffic while maintaining the convenience of roaming profiles? Use folder redirection to redirect some folders in the profile, such as the Documents folder, to a network location so that these folders arent copied when the profile is copied. 17. Which of the following is a valid group scope? (Choose all that apply.) a. Global b. Domain local 18. What happens if a security group that is an ACE in a shared folder is converted to a distribution group? c. The group remains in the DACL, but the ACE has no effect on members access to the resource. 19. Which of the following can be a member of a universal group? (Choose all that apply.) b. Global groups from any domain in the forest c. Other universal groups from any domain in the forest 20. Which group conversion is allowed? a. Domain local to universal, provided no domain local group is already a member 21. Which of the following is true about the Users domain local group? c. Domain Users is a member 22. A domain user logging on to the domain becomes a member of which special identity group? c. Authenticated Users 23. Windows 98 computers can have a computer account in a Windows Server 2008 domain. True or False? False

24. A user is having trouble logging on to the domain from a computer that has been out of service for several months. Nobody else can seem to log on from the computer either. What should you try first to solve the problem? c. Reset the computer account, remove the computer from the domain, and rejoin it to the domain. 25. Which commands can you use together to change attributes of several users at once? c. DSQUERY and DSMOD

1. Which of the following file systems is supported by Windows Server 2008? (Choose all that apply.) a. FAT c. NTFS 2. Which of the following is true about the FAT32 file system? (Choose all that apply.) b. Supports a maximum file size of 4 GB d. Does not support file permissions 3. An image file of a full DVD can be stored on a FAT32 volume. True or False? False 4. Which of the following is true about NTFS? b. Users can access older versions of a file. 5. Which of the following isnt true about disk quotas? c. Quotas can be overridden for groups. 6. Mount points can be created only on an NTFS volume. True or False? True 7. Terry stores all her files in the Documents folder on her C drive. She finds that the C drive is getting low on disk space, so she has a new disk installed. She wants to continue using her Documents folder as the location for organizing all her files, and most of her applications use this folder as the default location for opening and saving files. What is the best course of action for Terry to continue working as usual?

c. Create a new folder in the Documents folder, and mount the new volume in the folder. 8. You have been getting quite a few calls with requests to restore files from a backup because the file was accidentally deleted from a share or because the user needed a previous version of a file that was overwritten. Restoring the files has become a burden, and sometimes you need to repeat the process several times until you find the version the user needs. What can you do to give users a way to access the files they need and reduce your administrative burden? c. Enable shadow copies on the volumes where the shares are hosted. 9. Which of the following is true about file compression? (Choose all that apply.) a. Files moved to a new location on the same volume always retain their compression attribute. c. Files copied to a new location on the same volume inherit the compression attribute from the parent container. 10. Shadow copies always keep 64 previous versions of a file. True or False? False 11. Which of the following is true about EFS? (Choose all that apply.) a. Unencrypted files that are moved or copied to a folder with the encryption attribute set are always encrypted. b. By default, encrypted files can be opened only by the user account that encrypted the file. 12. Several users use the same computer. One user, Jim, has encrypted a file because it contains sensitive information and needs Bill to have access to the encrypted file, too. When Jim tries to add Bill to the list of users who can access the file, Bill isnt listed as a user that can be added. How can Bill be added to the list of users allowed to access the encrypted file? Have Bill encrypt a file on the system. This action creates a certificate for Bill on the computer, and he can then be added to the access list of other encrypted files. 13. Which of the following is true about share and NTFS permissions? d. NTFS permissions are applied to network access. 14. A user needs to create files and make changes to file contents. Aside from the Read permission, what other permission should the user be granted without allowing more access than is necessary? a. Write

15. The Tsmith user account has been granted the Read share permission. Tsmith is a member of the Sales group, which has been granted the Change share permission. On the shared folders Security tab, Sales has been granted Full control, and the Domain Users group has been granted Read permission. Which of the following can Tsmith do in the share when accessing it from the network? (Choose all that apply.) b. Delete all files. d. Create files. 16. Youre the administrator of a file server. Tom, who is on vacation, had created a file that Mary needs access to, but neither her account not the Administrator account has permission to access the file. What is the best way to allow Mary to access the file? As Administrator, take ownership of the file, grant Mary the permission she needs, and then give ownership back to Tom. 17. Which of the following can be used to create shares? (Choose all that apply.) a. Advanced Sharing c. File Sharing Wizard d. Share and Storage Management 18. What is the maximum number of users who can simultaneously access a share created on a Vista computer? d. 10 19. You need to prevent members of a group from accessing a subfolder of a folder to which the group does have access. What is the best way to do this? (Choose two answers. Each correct answer represents part of the solution.) a. Disable permission inheritance on the subfolder, and copy existing permissions. d. Remove the group from the subfolders DACL. 20. You need to create a share containing confidential information that only a select group of people should know about. You dont want this share to appear in users network browse lists. What can you do that involves the least administrative effort and disruption? c. Put a $ character at the end of the share name. 21. What command can you put in a batch file to allow users to access the Public share on the ServPub1 server, using the drive letter P? b. net use P: \\ServPub1\Public

22. Over the years, your network has grown from 2 servers to 15 servers. Most of these servers have shared folders on them. Users are having difficulty remembering which share is on which server as well as the server names. You want to make access to the share simpler. What is the best solution to this problem? c. Install the Distributed File System role service. 23. A folder can be shared only with a single name and single set of share permissions. True or False? False 24. Youre seeing heavy use on one of your shared printers, and users often have to wait in line to get their print jobs. What printing feature can you use to best alleviate the problem? d. Printer pooling 25. You have installed a shared printer with the default permissions and want users to be able to manage their own documents in the print queue. What do you need to do? a. Do nothing. (By default, Creator Owner has the Manage documents permission.)

Potrebbero piacerti anche