Quiz 3 (chapters 5 and 6)

Descripción

ACT Year 12 Certificate CSI265 Test sobre Quiz 3 (chapters 5 and 6), creado por Joshua Villy el 06/05/2013.
Joshua Villy
Test por Joshua Villy, actualizado hace más de 1 año
Joshua Villy
Creado por Joshua Villy hace más de 11 años
482
0

Resumen del Recurso

Pregunta 1

Pregunta
To ______ an object means to make it available for users to access when they view Active Directory contents.
Respuesta
  • Control
  • Inherit
  • Publish
  • Present

Pregunta 2

Pregunta
UNIX/Linux server administrators and programmers rely on the popular UNIX/Linux ______ editor for creating scripts, writing program source code, editing data files, and many more functions.
Respuesta
  • txt
  • vin
  • vi
  • notepad

Pregunta 3

Pregunta
The Printer memory is usually automatically detected in bidirectional printers, but if it is not, you can specify the amount of memory in the Printer Memory option under
Respuesta
  • Printer Preferences
  • Installable Options
  • Device Settings
  • Device Options

Pregunta 4

Pregunta
The ______ tab enables you to specify printer settings that are specific to the printer you have installed, such a printer trays, memory, paper size, fonts, duplexing and installable options.
Respuesta
  • Output Settings
  • Device Settings
  • Printer Preferences
  • Advanced

Pregunta 5

Pregunta
The ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.
Respuesta
  • A) NTFS compress
  • B) NTFS encrypt
  • C) hidden
  • D) privacy

Pregunta 6

Pregunta
Windows Search Service by default is installed to start automatically each time the server is booted.
Respuesta
  • True
  • False

Pregunta 7

Pregunta
____ mean that the same permissions on a parent object apply to the child objects, such as files and subfolders within the parent folder.
Respuesta
  • Instantiated permissions
  • Copied permissions
  • Inherited permissions
  • Overridden permissions

Pregunta 8

Pregunta
An encrypted folder or file uses the Microsoft ____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.
Respuesta
  • Encrypting File System
  • Data Encryption Standard
  • Block Encryption System
  • Advanced Encryption Standard

Pregunta 9

Pregunta
Accessing folders and files can be tracked by setting up ____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
Respuesta
  • archiving
  • auditing
  • tracking
  • logging

Pregunta 10

Pregunta
Taking ____ is the only way to shift control from one account to another.
Respuesta
  • permissions
  • ownership
  • possession
  • control

Pregunta 11

Pregunta
____ is a naming convention that designates network servers, computers, and shared resources.
Respuesta
  • Uniform Naming Convention
  • Universal Naming Connection
  • Universal Resource Locator
  • Universal Naming Convention

Pregunta 12

Pregunta
When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have ____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.
Respuesta
  • Suppress mismatched documents
  • Control mismatched documents
  • Hold mismatched documents
  • Prevent mismatched documents

Pregunta 13

Pregunta
The ____ portion of EFS uses a single key to encrypt the file or folder.
Respuesta
  • asymmetric
  • private
  • public
  • symmetric

Pregunta 14

Pregunta
Windows Server 2008 uses two types of ACLs: discretionary and non-discretionary.
Respuesta
  • True
  • False

Pregunta 15

Pregunta
A ____ is one that has special firmware or cartridges to print using a page-description language (PDL).
Respuesta
  • RAW printer
  • Script printer
  • XPS printer
  • PostScript printer

Pregunta 16

Pregunta
The ____ provides interoperability between Windows Server 2008 and UNIX and Linux systems.
Respuesta
  • Subsystem for UNIX-based Applications
  • Subsystem for Third-party Applications
  • Subsystem for Apple-based Applications
  • Subsystem for POSIX-based Applications

Pregunta 17

Pregunta
A(n) ____ is like a stack of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.
Respuesta
  • print stack
  • print deck
  • print block
  • print queue

Pregunta 18

Pregunta
In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform ____, so that one server does not experience more load than others.
Respuesta
  • distribution
  • replication
  • load balancing
  • redundancy

Pregunta 19

Pregunta
When using SUA in ____, every process that is run is treated as a Windows process.
Respuesta
  • transitional mode
  • native mode
  • hybrid mode
  • mixed mode

Pregunta 20

Pregunta
____ are stored as header information with each folder and file, along with other characteristics including volume label, designation as a subfolder, date of creation, and time of creation.
Respuesta
  • Components
  • Labels
  • Attributes
  • Settings
Mostrar resumen completo Ocultar resumen completo

Similar

Quiz 5 (chapters 9, 10, 11)
Joshua Villy
Quiz 4 (chapters 7 and 8)
Joshua Villy
Quiz 6 (chapters 12 and 13)
Joshua Villy
Quiz 1 (chapters 1 and 2)
Joshua Villy
Quiz 2 (chapters 3 and 4)
Joshua Villy
Los reyes católicos: La integración de las coronas
maya velasquez
Enseñar con Fichas de Memoria
Diego Santos
Los Derechos Humanos y sus características
crisferroeldeluna
Italiano-B1.1-verbi
Diego Borghetto
Planeación Estratégica
Luis Gonzalez
Miembro Superior - Anatomía
Ivan Salas