Quiz 5 & 6

Beschreibung

Final Test Quiz
Michael Marcus
Quiz von Michael Marcus, aktualisiert more than 1 year ago
Michael Marcus
Erstellt von Michael Marcus vor fast 9 Jahre
855
1

Zusammenfassung der Ressource

Frage 1

Frage
In Windows Server 2012 R2, which of the following steps represents the most efficient way to automatically move files which are older than one year to an expiration folder?
Antworten
  • configure a file management task with FSRM
  • open the folder properties and set the file expiration property
  • Run the Windows PowerShell Set-FileExpire cmdlet
  • modify the properties of the folder that contains the files to specify an expiration parameter and expiration folder location

Frage 2

Frage
What type of service is the Windows File Server Resource Manager?
Antworten
  • quota
  • role
  • third-party- add-on
  • extension

Frage 3

Frage
If you were asked to set up a shared file area for users that prevented them from saving video files or images of any kind what would you set up on that shared folder?
Antworten
  • active file screen with included and excluded file groups
  • hard quota for each user and passive file screening
  • standard file share with e-mail notification
  • passive file screen and a soft quota

Frage 4

Frage
what FSRM feature can you use to show the state of file server volumes, quota, and disallowed files?
Antworten
  • storage reports
  • storage exceptions
  • storage quotas
  • storage assessments

Frage 5

Frage
When storage space is at a premium, what should you do to ensure that everyone has enough space?
Antworten
  • set up soft quota limits with no notifications
  • set up file groups so that users can't save very large files
  • set up very restrictive soft quota for users with e-mail notifications
  • set up hard quota limits with e-mail notifications

Frage 6

Frage
what technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?
Antworten
  • Windows Firewall
  • Quotas
  • Windows Defender
  • File Screening

Frage 7

Frage
What happens if you move unencrypted files into an encrypted folder?
Antworten
  • nothing
  • the new files become encrypted
  • the new files become hidden
  • the new files become encrypted at a lower encryption level

Frage 8

Frage
you can encrypt individual files, but Microsoft recommends encrypting at what level?
Antworten
  • file system
  • drive
  • file group
  • folder

Frage 9

Frage
encryption is the process of converting data into what kind of format?
Antworten
  • compiled
  • unreadable
  • hidden
  • non-functional

Frage 10

Frage
what key length is considered to be minimally strong for encryption algorithms?
Antworten
  • 56
  • 80
  • 128
  • 256

Frage 11

Frage
on what type of computer is BitLocker not commonly used?
Antworten
  • laptops
  • desktops
  • netbooks
  • servers

Frage 12

Frage
what's the status of your data if someone has your public key?
Antworten
  • compromised
  • broken
  • hacked
  • safe

Frage 13

Frage
you can generate several different reports from FSRM. One of them gives you a list of Least recently Accessed Files. What would be the purpose of that report?
Antworten
  • to warn you that users are storing unused files
  • to allow you to archive unused files
  • to remove unused files
  • to warn you of possible security risks of old files

Frage 14

Frage
when using File system resource manager, which group must you be a member of to enable SMTP?
Antworten
  • Administrators
  • Domain Users
  • Schema Admins
  • Power Users

Frage 15

Frage
when you change a file template and save the changes, you have the option to do which one of the following?
Antworten
  • re-created the template
  • remove conflicting templates
  • apply the template to all derived file screens
  • remove all file screens affected by the new template

Frage 16

Frage
what does the acronym SMTP stand for?
Antworten
  • Storage Management Transaction Protocol
  • Simple Management Transfer Protocol
  • Simple Mail Transaction Protocol
  • Simple Mail Transfer Protocol

Frage 17

Frage
what is the purpose of setting up e-mail notifications for users who violate storage quotas?
Antworten
  • so that administrator can proactively assist users in resolving the problem
  • to automate tracking of quota violations
  • to keep a record of quota violations for future reference
  • to endure that users know when they're using too much storage

Frage 18

Frage
Which screening technique prevents a user from saving defined unauthorized files?
Antworten
  • active
  • passive
  • secure
  • preventative

Frage 19

Frage
what feature can you use to simplify the management of file screens?
Antworten
  • exceptions
  • exemptions
  • templates
  • quotas

Frage 20

Frage
what is the purpose of setting soft quotas?
Antworten
  • to notify users that they have reached the quota limit
  • to list files that need to be deleted
  • to identify users who violate quotas
  • to determine where hard quotas need to be set

Frage 21

Frage
what effect does using quotas in File Server Resource Manager have?
Antworten
  • it limits the number of files allocated to a user
  • it limits the number of access licenses allotted to a server
  • it limits the number of drive mappings to a shared resource
  • it limits the number of gigabytes allocated to a volume or folder

Frage 22

Frage
some exemptions might be required for certain groups to store otherwise restricted file types. What type of exemption can you set p on folders?
Antworten
  • file save exemption
  • file type exemption
  • file screen exception
  • folder screen exception

Frage 23

Frage
placing a quota limit on a folder applies that limit to what part of the folder?
Antworten
  • the folder and any files it contains
  • the folder itself but no files
  • the entire folder and its subtree
  • only the files within the folder

Frage 24

Frage
By default, where are storage reports saved?
Antworten
  • C:\StorageReports\Saved
  • C:\StorageReports\Schedule
  • C:\StorageReports\Queued
  • C:\StorageReports\Quotas

Frage 25

Frage
if you are a command-line user, what command will encrypt files and folders?
Antworten
  • encrypt.exe
  • compress.exe
  • efs.exe
  • cipher.exe

Frage 26

Frage
an encrypted file can be converted back to its original format by a process known as what?
Antworten
  • encryption
  • digitization
  • decryption
  • encapsulation

Frage 27

Frage
after a file has been encrypted, it is stored in what format?
Antworten
  • hidden
  • executable
  • encrypted
  • converted

Frage 28

Frage
encryption does not protect a file or folder from deletion. To protect a file or folder from deletion, what technology should you use?
Antworten
  • BitProtector
  • NTFS permissions
  • SSL/TLS
  • compression

Frage 29

Frage
single-key encryption is also known as what kind of encryption?
Antworten
  • hash
  • simple
  • signal
  • symmetric

Frage 30

Frage
public-key cryptography uses how many keys?
Antworten
  • one
  • two
  • two pair
  • 256

Frage 31

Frage
what happens to files and subfolders within an EFS encrypted folder?
Antworten
  • Nothing; they must be encrypted individually
  • they're encrypted but at a lower encryption level
  • they're left unencrypted but hidden
  • they're encrypted with the parent folder

Frage 32

Frage
what is the purpose of using hash function encryption?
Antworten
  • to store passwords in a non-readable format
  • to demonstrate one-way encryption techniques
  • to provide keyless encryption and decryption algorithms
  • to keep track of 128-bit key pairs

Frage 33

Frage
where is the most secure location to store secure key recovery information?
Antworten
  • on an encrypted USB device
  • in a secure cabinet on an encrypted USB device
  • in Active Directory
  • on the local device

Frage 34

Frage
EFS encryption is what type of feature that can be enable or disable at will, similar in effect to read-only, compression, or hidden?
Antworten
  • status
  • characteristics
  • attribute
  • handle

Frage 35

Frage
from a security standpoint, which BitLocker operational mode is most secure?
Antworten
  • TPM only
  • startup key only
  • TPM + startup PIN
  • TPM + startup key

Frage 36

Frage
what built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption?
Antworten
  • certificates
  • hardware-assisted virtualization
  • trusted platform module
  • BIOS-enabled anti-virus software
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Quiz 21-22
Michael Marcus
Quiz 19-20
Michael Marcus
Quiz 3&4
Michael Marcus
Quiz 7 & 8
Michael Marcus
Quiz 11 & 12
Michael Marcus
Quiz 17 & 18
Michael Marcus
Quiz 13 & 14
Michael Marcus
Quiz 15 & 16
Michael Marcus
Quiz 1&2
Michael Marcus
Quiz 9&10
Michael Marcus
70-411 - MCSA: Administering Windows Server 2012 - Exam 4
Mike M