Michael Marcus
Quiz by , created more than 1 year ago

Final Test Quiz

855
1
0
Michael Marcus
Created by Michael Marcus almost 9 years ago
Close

Quiz 5 & 6

Question 1 of 36

1

In Windows Server 2012 R2, which of the following steps represents the most efficient way to automatically move files which are older than one year to an expiration folder?

Select one of the following:

  • configure a file management task with FSRM

  • open the folder properties and set the file expiration property

  • Run the Windows PowerShell Set-FileExpire cmdlet

  • modify the properties of the folder that contains the files to specify an expiration parameter and expiration folder location

Explanation

Question 2 of 36

1

What type of service is the Windows File Server Resource Manager?

Select one of the following:

  • quota

  • role

  • third-party- add-on

  • extension

Explanation

Question 3 of 36

1

If you were asked to set up a shared file area for users that prevented them from saving video files or images of any kind what would you set up on that shared folder?

Select one of the following:

  • active file screen with included and excluded file groups

  • hard quota for each user and passive file screening

  • standard file share with e-mail notification

  • passive file screen and a soft quota

Explanation

Question 4 of 36

1

what FSRM feature can you use to show the state of file server volumes, quota, and disallowed files?

Select one of the following:

  • storage reports

  • storage exceptions

  • storage quotas

  • storage assessments

Explanation

Question 5 of 36

1

When storage space is at a premium, what should you do to ensure that everyone has enough space?

Select one of the following:

  • set up soft quota limits with no notifications

  • set up file groups so that users can't save very large files

  • set up very restrictive soft quota for users with e-mail notifications

  • set up hard quota limits with e-mail notifications

Explanation

Question 6 of 36

1

what technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?

Select one of the following:

  • Windows Firewall

  • Quotas

  • Windows Defender

  • File Screening

Explanation

Question 7 of 36

1

What happens if you move unencrypted files into an encrypted folder?

Select one of the following:

  • nothing

  • the new files become encrypted

  • the new files become hidden

  • the new files become encrypted at a lower encryption level

Explanation

Question 8 of 36

1

you can encrypt individual files, but Microsoft recommends encrypting at what level?

Select one of the following:

  • file system

  • drive

  • file group

  • folder

Explanation

Question 9 of 36

1

encryption is the process of converting data into what kind of format?

Select one of the following:

  • compiled

  • unreadable

  • hidden

  • non-functional

Explanation

Question 10 of 36

1

what key length is considered to be minimally strong for encryption algorithms?

Select one of the following:

  • 56

  • 80

  • 128

  • 256

Explanation

Question 11 of 36

1

on what type of computer is BitLocker not commonly used?

Select one of the following:

  • laptops

  • desktops

  • netbooks

  • servers

Explanation

Question 12 of 36

1

what's the status of your data if someone has your public key?

Select one of the following:

  • compromised

  • broken

  • hacked

  • safe

Explanation

Question 13 of 36

1

you can generate several different reports from FSRM. One of them gives you a list of Least recently Accessed Files. What would be the purpose of that report?

Select one of the following:

  • to warn you that users are storing unused files

  • to allow you to archive unused files

  • to remove unused files

  • to warn you of possible security risks of old files

Explanation

Question 14 of 36

1

when using File system resource manager, which group must you be a member of to enable SMTP?

Select one of the following:

  • Administrators

  • Domain Users

  • Schema Admins

  • Power Users

Explanation

Question 15 of 36

1

when you change a file template and save the changes, you have the option to do which one of the following?

Select one of the following:

  • re-created the template

  • remove conflicting templates

  • apply the template to all derived file screens

  • remove all file screens affected by the new template

Explanation

Question 16 of 36

1

what does the acronym SMTP stand for?

Select one of the following:

  • Storage Management Transaction Protocol

  • Simple Management Transfer Protocol

  • Simple Mail Transaction Protocol

  • Simple Mail Transfer Protocol

Explanation

Question 17 of 36

1

what is the purpose of setting up e-mail notifications for users who violate storage quotas?

Select one of the following:

  • so that administrator can proactively assist users in resolving the problem

  • to automate tracking of quota violations

  • to keep a record of quota violations for future reference

  • to endure that users know when they're using too much storage

Explanation

Question 18 of 36

1

Which screening technique prevents a user from saving defined unauthorized files?

Select one of the following:

  • active

  • passive

  • secure

  • preventative

Explanation

Question 19 of 36

1

what feature can you use to simplify the management of file screens?

Select one of the following:

  • exceptions

  • exemptions

  • templates

  • quotas

Explanation

Question 20 of 36

1

what is the purpose of setting soft quotas?

Select one of the following:

  • to notify users that they have reached the quota limit

  • to list files that need to be deleted

  • to identify users who violate quotas

  • to determine where hard quotas need to be set

Explanation

Question 21 of 36

1

what effect does using quotas in File Server Resource Manager have?

Select one of the following:

  • it limits the number of files allocated to a user

  • it limits the number of access licenses allotted to a server

  • it limits the number of drive mappings to a shared resource

  • it limits the number of gigabytes allocated to a volume or folder

Explanation

Question 22 of 36

1

some exemptions might be required for certain groups to store otherwise restricted file types. What type of exemption can you set p on folders?

Select one of the following:

  • file save exemption

  • file type exemption

  • file screen exception

  • folder screen exception

Explanation

Question 23 of 36

1

placing a quota limit on a folder applies that limit to what part of the folder?

Select one of the following:

  • the folder and any files it contains

  • the folder itself but no files

  • the entire folder and its subtree

  • only the files within the folder

Explanation

Question 24 of 36

1

By default, where are storage reports saved?

Select one of the following:

  • C:\StorageReports\Saved

  • C:\StorageReports\Schedule

  • C:\StorageReports\Queued

  • C:\StorageReports\Quotas

Explanation

Question 25 of 36

1

if you are a command-line user, what command will encrypt files and folders?

Select one of the following:

  • encrypt.exe

  • compress.exe

  • efs.exe

  • cipher.exe

Explanation

Question 26 of 36

1

an encrypted file can be converted back to its original format by a process known as what?

Select one of the following:

  • encryption

  • digitization

  • decryption

  • encapsulation

Explanation

Question 27 of 36

1

after a file has been encrypted, it is stored in what format?

Select one of the following:

  • hidden

  • executable

  • encrypted

  • converted

Explanation

Question 28 of 36

1

encryption does not protect a file or folder from deletion. To protect a file or folder from deletion, what technology should you use?

Select one of the following:

  • BitProtector

  • NTFS permissions

  • SSL/TLS

  • compression

Explanation

Question 29 of 36

1

single-key encryption is also known as what kind of encryption?

Select one of the following:

  • hash

  • simple

  • signal

  • symmetric

Explanation

Question 30 of 36

1

public-key cryptography uses how many keys?

Select one of the following:

  • one

  • two

  • two pair

  • 256

Explanation

Question 31 of 36

1

what happens to files and subfolders within an EFS encrypted folder?

Select one of the following:

  • Nothing; they must be encrypted individually

  • they're encrypted but at a lower encryption level

  • they're left unencrypted but hidden

  • they're encrypted with the parent folder

Explanation

Question 32 of 36

1

what is the purpose of using hash function encryption?

Select one of the following:

  • to store passwords in a non-readable format

  • to demonstrate one-way encryption techniques

  • to provide keyless encryption and decryption algorithms

  • to keep track of 128-bit key pairs

Explanation

Question 33 of 36

1

where is the most secure location to store secure key recovery information?

Select one of the following:

  • on an encrypted USB device

  • in a secure cabinet on an encrypted USB device

  • in Active Directory

  • on the local device

Explanation

Question 34 of 36

1

EFS encryption is what type of feature that can be enable or disable at will, similar in effect to read-only, compression, or hidden?

Select one of the following:

  • status

  • characteristics

  • attribute

  • handle

Explanation

Question 35 of 36

1

from a security standpoint, which BitLocker operational mode is most secure?

Select one of the following:

  • TPM only

  • startup key only

  • TPM + startup PIN

  • TPM + startup key

Explanation

Question 36 of 36

1

what built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption?

Select one of the following:

  • certificates

  • hardware-assisted virtualization

  • trusted platform module

  • BIOS-enabled anti-virus software

Explanation