Information Technology Reference
In-Depth Information
15. The Tsmith user account has been granted the Read share permission. Tsmith is a member
of the Sales group, which has been granted the Change share permission. On the shared
folder's Security tab, Sales has been granted Full control, and the Domain Users group has
been granted Read permission. Which of the following can Tsmith do in the share when
accessing it from the network? (Choose all that apply.)
a. Change permissions on all files.
b. Delete all files.
c. Take ownership of all files.
d. Create files.
16. You're the administrator of a file server. Tom, who is on vacation, had created a file that
Mary needs access to, but neither her account nor the Administrator account has permission
to access the file. What is the best way to allow Mary to access the file?
17. Which of the following can be used to create shares? (Choose all that apply.)
a. Advanced Sharing
b. Disk Management
c. File Sharing Wizard
d. Share and Storage Management
18. What is the maximum number of users who can simultaneously access a share created on a
Vista computer?
a. None (You can't create shares on a Vista computer.)
b. Unlimited
c. 16,777,216
d. 10
19. You need to prevent members of a group from accessing a subfolder of a folder to which the
group does have access. What is the best way to do this? (Choose two answers. Each correct
answer represents part of the solution.)
a. Disable permission inheritance on the subfolder, and copy existing permissions.
b. Add each member of the group to the subfolder's DACL, and assign a Deny permission
to each member.
c. Create a new group, and add members of the existing group to this new group. Add the
new group to the subfolder's DACL with a Deny permission.
d. Remove the group from the subfolder's DACL.
20. You need to create a share containing confidential information that only a select group of
people should know about. You don't want this share to appear in users' network browse
lists. What can you do that involves the least administrative effort and disruption?
a. Disable network discovery on all computers.
b. Disable network discovery on the computers of users who you don't want to see the share.
c. Put a $ character at the end of the share name.
d. Put a @ character at the beginning of the share name.
21. What command can you put in a batch file to allow users to access the Public share on the
ServPub1 server, using the drive letter P?
a.
6
net share P: \\ServPub1\Public
b.
net use P: \\ServPub1\Public
c.
share \\ServPub1\Public P:
d.
share P: \\ServPub1\Public
Search WWH ::




Custom Search