Preview

Microsoft Active Directory Chapter 6 Review Question Answers

Good Essays
Open Document
Open Document
250 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft Active Directory Chapter 6 Review Question Answers
Chapter 6 Windows File & Print Services Review Questions
1. FAT & NTFS
2. Supports a maximum file size of 4 GB, Does not support file permissions
3. False
4. Users can access older versions of a file
5. Qoutas can be overridden for groups
6. True
7. Create a new folder in the Documents folder, and mount the new volume in the folder
8. Enable shadow copies on the volumes where the shares are hosted
9. Files moved to a new location on the same volume always retain their compression attribute, Files copied to a new location on the same volume inherit the compression attribute from the parent container
10. False
11. Unencrypted files that are moved or copied to a folder with the encryption attribute set are always encrypted; by default encrypted files can be opened only by the user account that encrypted the file
12. Have Bill encrypt a file on the system. This action creates a certificate for Bill on the computer, and he can then be added to the access list of other encrypted files
13. NTFS permissions area applied to network access
14. Write
15. Delete all files & create files
16. As Administrator, take ownership of the file; grant Mary the permission she needs, and then give ownership back to Tom
17. Advanced Sharing, File Sharing Wizard, Share and Storage Management
18. 10
19. Disable permission inheritance on the subfolder, and copy existing permissions; Remove the group from the subfolder's DACL
20. Put a $ character at the end of the share name
21. net use P: \\ServPub1\Public
22. Install the Distributed File System role service
23. False
24. Printer pooling
25. Do

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 6 Review Quiz

    • 414 Words
    • 2 Pages

    1. List at least two major reasons that Medicare administrators turned to the prospective payment concept for Medicare beneficiaries.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    COMP 230 WK 1 7 QUIZ

    • 2401 Words
    • 33 Pages

    (TCO 1) Which one of the following Windows NET commands will allow other computers to access the C:\Data directory under the share nameUserData?…

    • 2401 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    All answers must be clear and to the point and on the page they were asked.…

    • 480 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In painting and drawing, artists often use the technique of ________ to describe the way shadows and light define the mass of forms.…

    • 781 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    3. lf you can browse a file on a Windows network share but are not able to copy it or modify it what…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user is given Read permission to a file stored on a NTFS formatted volume. The file is then copied to a folder on the same NTFS formatted volume where the user has been given Full Control permission to that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter what is the user’s effective permission to the file?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    *Social media can influence a teenager's self-esteem negatively because females are always looking up to the models on Instagram or Facebook thinking that just be cause they are a size 0 they have to be a size 0 too. This is not okay, this is horrible because girls that wear a size 3,4 or even 14 are starving themselves, making themselves go on extremely harsh diets, and looking at themsleves in the mirror saying " you are too fat" or "you are ugly", basically talking down on theselves because they don't look like someone else or that model that they saw on Instagram. Also, I believe…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz on Computers

    • 2372 Words
    • 16 Pages

    (TCO 1) _____ has a granular, inheritable access control structure that allows each folder and file to have an access control list.…

    • 2372 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    10. Now apply all the modified setting. During apply the changes it will show an message "You dont have the permission to read the file or the contents of the directory. Do you want to change the permission of the file or folder to full…

    • 720 Words
    • 3 Pages
    Good Essays

Related Topics