Windows Server Test Chapter 5-6 Final
Exam Questions with Correct Answers
A physical printer containing paper and ink or toner to which print jobs are sent is known
as?
A print server
A printer
A print device
A printer queue server - Answer-A print device
What administrative share on a Windows machine will provide network access to the
Windows folder on the boot volume?
$Admin
SYSVOL
NETLOGON
$IPC - Answer-$Admin
Why should an administrator enable the "Encrypt data access" option on a share
containing sensitive information? - Answer-So when someone is using that share all the
data that they copy is encrypted and can't be read in clear text
The shadow copies feature must be enabled on an entire volume.
True
False - Answer-True
How can an administrator create a hidden shared folder?
By placing a $ at the end of the share name
By selecting the "hidden" NTFS attribute
By renaming the folder to include [hidden] at the beginning of the folder name
, By removing the "Everyone" group from the Share permissions tab - Answer-By placing
a $ at the end of the share name
What happens to the permissions of a file or folder that is moved within the same NTFS
volume? - Answer-A file or folder moved within the same NTFS volume retains its
original permissions.
When using Shadow Copies, how many different versions of a file can be kept?
32
64
128
16 - Answer-64
Match each item with a statement below.
*The access a security principal has to a file system object when taking sharing
permissions, NTFS permissions, and group memberships into account.*
Access control entry (ACE)
Discretionary access control list (DACL)
Effective access
Effective permissions
Inherited permission
Object owner
Network File System (NFS)
Permission inheritance
Security descriptor
Security Principle - Answer-Effective access
Match each item with a statement below.
*A permission that comes from an object's parent instead of being assigned explicitly.*
, Access control entry (ACE)
Discretionary access control list (DACL)
Effective access
Effective permissions
Inherited permission
Object owner
Network File System (NFS)
Permission inheritance
Security descriptor
Security Principle - Answer-Inherited permission
Match each item with a statement below.
*A method for defining how permissions are transmitted from a parent object to a child
object.*
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller lectknancy. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.49. You're not tied to anything after your purchase.