Information Technology Reference
In-Depth Information
c. Create a new folder in the Documents folder, and mount the new volume in the folder.
d. Redirect Terry's Documents folder to a file server.
8. You have been getting quite a few calls with requests to restore files from a backup because
the file was accidentally deleted from a share or because the user needed a previous version
of a file that was overwritten. Restoring the files has become a burden, and sometimes you
need to repeat the process several times until you find the version the user needs. What can
you do to give users a way to access the files they need and reduce your administrative
burden?
a. Adjust permissions on the shares so that users can't delete files except their own. Tell
users to back up their own files to local backup media.
b. Enable shadow copies for each share.
c. Enable shadow copies on the volumes where the shares are hosted.
d. Give each user a backup program and an external hard drive.
9. Which of the following is true about file compression? (Choose all that apply.)
a. Files moved to a new location on the same volume always retain their compression
attribute.
b. Files copied to a new location on the same volume always retain their compression
attribute.
c. Files copied to a new location on the same volume inherit the compression attribute
from the parent container.
d. Files moved to a new location on the same volume inherit the compression attribute
from the parent container.
10. Shadow copies always keep 64 previous versions of a file. True or False?
11. Which of the following is true about EFS? (Choose all that apply.)
a. Unencrypted files that are moved or copied to a folder with the encryption attribute set
are always encrypted.
b. By default, encrypted files can be opened only by the user account that encrypted the
file.
c. Any user can be added to an encrypted file's access list.
d. Encrypted files moved to a FAT volume become inaccessible.
12. Several users use the same computer. One user, Jim, has encrypted a file because it contains
sensitive information and needs Bill to have access to the encrypted file, too. When Jim tries
to add Bill to the list of users who can access the file, Bill isn't listed as a user that can be
added. How can Bill be added to the list of users allowed to access the encrypted file?
13. Which of the following is true about share and NTFS permissions?
a. NTFS permissions are applied only to interactive file access.
b. Share permissions take precedence over NTFS permissions.
c. Share permissions are applied to network and interactive file access.
d. NTFS permissions are applied to network access.
14. A user needs to create files and make changes to file contents. Aside from the Read permis-
sion, what other permission should the user be granted without allowing more access than
is necessary?
a.
Write
b.
Full control
c.
Modify
d.
Create
Search WWH ::




Custom Search