Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
A feature that enables users to access a volume as a folder in another volume instead of by using a drive letter
|
volume mount points
|
|
An option on NTFS volumes that enables administrators to limit how much disk space a user can occupy with his or her files
|
disk quotas
|
|
A feature on the Windows file system that allows users to access previous versions of files in shared folders and restore files that have been deleted or corrupted
|
shadow copies
|
|
Permissions set on folders or files on an NTFS-formatted volume |
NTFS permissions |
|
Defines the method and format an OS uses to store, locate, and retrieve files from electronic storage media |
file system |
|
Hidden shares created by Windows that are available only to members of the Administrators group |
Administrative shares |
|
A feature that makes shared files more accessible by grouping shared folders from multiple servers into a single folder hierarchy |
Distributed File System |
|
Permissions applied to shared folders that protect files accessed across the network. Share permissions are the only method for protecting files on FAT volumes |
share permissions
|
|
Encrypting File System
|
EFS |
|
A DFS hierarchy is referred to as a |
namespace |
|
How would you access serverXX's administrative share for the C Drive? |
\\serverXX\C$ |
|
If a file with the compression attribute set is copied to a new location, what happens?
|
The file inherits the compression attribute settings from its parent container |
|
If a file with the encryption attribute set is copied or moved within an NTFS volume, what happens? |
The file retains its encryption attribute, regardless of the parent container's settings
|
|
In a Windows environment, he physical printer containing paper and ink or toner to which print jobs are sent is called |
a print device
|
|
In Windows Server 2008, the default limit for the number of simultaneous users is set to... |
16,777,216
|
|
One of your co-workers, Jeremy, is trying to access a share on a server you're responsible for. He has asked for your help because despite having the correct share permissions, he still cannot access the share. After investing the problem, you find the permissions are configured as follows: Share permissions: Everyone - Full control NTFS Permissions: HRdept - Modify Jeremy - Deny Full Control Jeremy informs you that he is a member of the HRdept group. What is Jeremy's effective permissions over the network? |
Deny Full control |
|
The HRdept group needs to have full access to a nested folder on a server. This folder cannot be moved, and is within a folder where the HRdept group must not be allowed to open or change any files. What is the easiest method to accomplish this?
|
Apply the "List Folder Contents" standard permission to the container where HRdept should have no access, then apply Full Control to the nested folder |
|
The Services for Network File System role service performs what function? |
Allows Windows to use the Network File System file sharing protocol common to Linux and Unix
|
|
This role service allows grouping shared folders from one or more file servers into a single hierarchical folder structure, so users don't have to know on which server a share is located. |
Distributed File System
|
|
Vanessa has come to you asking for your help with a network share issue. She created a shared folder named ShareData on a member server with her account, vness1. However, she finds that she is unable to modify or make changes to any documents in the shared folder across the network. You have logged into the server, and checked the permissions set on ShareData:
hare Permissions: Everyone - Read NTFS Permissions Creator owner - Implicit full control What should Vanessa do? |
She should set Everyone to Full Control in the share permissions
|
|
What is the maximum partition size that FAT16 supports? |
2GB |
|
What is the primary function of shadow copies? |
Prevent the accidental loss of data |
|
What is the size limit for FAT32 partitions at creation time within Windows operating systems? |
32 GB |
|
What is the Windows file-sharing protocol? |
Server Message Block (SMB) |
|
What must a user have in order to be added to an encrypted file's access list? |
Valid EFS Certificate |
|
What service do you install to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers? |
Line Printer Daemon (LPD) |
|
Where can you configure the Separator Page option on a printer? |
In the printer's Properties, on the Advanced tab |
|
Which of the following is not a method by which you can access Windows shares? |
Telnetting the UNC path |
|
Which of the following is not a reason to use volume mount points? |
To extend the apparent amount of free space on an existing FAT32 volume |
|
Which of the following is not one of the filesystems Windows supports? |
ZFS |
|
By default, administrators are subject to quota limits. |
False |
|
By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m., and 12:00 p.m., Monday through Friday. |
True |
|
In a domain environment, the domain Administrator account is designated as a recovery agent. |
True' |
|
The FAT file system has built-in support for file compression. |
False |
|
With NTFS, compression can be enabled on a folder with encryption. |
'False' |