Michael Marcus
Quiz por , criado more than 1 year ago

Final Test Quiz

855
1
0
Michael Marcus
Criado por Michael Marcus quase 9 anos atrás
Fechar

Quiz 5 & 6

Questão 1 de 36

1

In Windows Server 2012 R2, which of the following steps represents the most efficient way to automatically move files which are older than one year to an expiration folder?

Selecione uma das seguintes:

  • configure a file management task with FSRM

  • open the folder properties and set the file expiration property

  • Run the Windows PowerShell Set-FileExpire cmdlet

  • modify the properties of the folder that contains the files to specify an expiration parameter and expiration folder location

Explicação

Questão 2 de 36

1

What type of service is the Windows File Server Resource Manager?

Selecione uma das seguintes:

  • quota

  • role

  • third-party- add-on

  • extension

Explicação

Questão 3 de 36

1

If you were asked to set up a shared file area for users that prevented them from saving video files or images of any kind what would you set up on that shared folder?

Selecione uma das seguintes:

  • active file screen with included and excluded file groups

  • hard quota for each user and passive file screening

  • standard file share with e-mail notification

  • passive file screen and a soft quota

Explicação

Questão 4 de 36

1

what FSRM feature can you use to show the state of file server volumes, quota, and disallowed files?

Selecione uma das seguintes:

  • storage reports

  • storage exceptions

  • storage quotas

  • storage assessments

Explicação

Questão 5 de 36

1

When storage space is at a premium, what should you do to ensure that everyone has enough space?

Selecione uma das seguintes:

  • set up soft quota limits with no notifications

  • set up file groups so that users can't save very large files

  • set up very restrictive soft quota for users with e-mail notifications

  • set up hard quota limits with e-mail notifications

Explicação

Questão 6 de 36

1

what technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?

Selecione uma das seguintes:

  • Windows Firewall

  • Quotas

  • Windows Defender

  • File Screening

Explicação

Questão 7 de 36

1

What happens if you move unencrypted files into an encrypted folder?

Selecione uma das seguintes:

  • nothing

  • the new files become encrypted

  • the new files become hidden

  • the new files become encrypted at a lower encryption level

Explicação

Questão 8 de 36

1

you can encrypt individual files, but Microsoft recommends encrypting at what level?

Selecione uma das seguintes:

  • file system

  • drive

  • file group

  • folder

Explicação

Questão 9 de 36

1

encryption is the process of converting data into what kind of format?

Selecione uma das seguintes:

  • compiled

  • unreadable

  • hidden

  • non-functional

Explicação

Questão 10 de 36

1

what key length is considered to be minimally strong for encryption algorithms?

Selecione uma das seguintes:

  • 56

  • 80

  • 128

  • 256

Explicação

Questão 11 de 36

1

on what type of computer is BitLocker not commonly used?

Selecione uma das seguintes:

  • laptops

  • desktops

  • netbooks

  • servers

Explicação

Questão 12 de 36

1

what's the status of your data if someone has your public key?

Selecione uma das seguintes:

  • compromised

  • broken

  • hacked

  • safe

Explicação

Questão 13 de 36

1

you can generate several different reports from FSRM. One of them gives you a list of Least recently Accessed Files. What would be the purpose of that report?

Selecione uma das seguintes:

  • to warn you that users are storing unused files

  • to allow you to archive unused files

  • to remove unused files

  • to warn you of possible security risks of old files

Explicação

Questão 14 de 36

1

when using File system resource manager, which group must you be a member of to enable SMTP?

Selecione uma das seguintes:

  • Administrators

  • Domain Users

  • Schema Admins

  • Power Users

Explicação

Questão 15 de 36

1

when you change a file template and save the changes, you have the option to do which one of the following?

Selecione uma das seguintes:

  • re-created the template

  • remove conflicting templates

  • apply the template to all derived file screens

  • remove all file screens affected by the new template

Explicação

Questão 16 de 36

1

what does the acronym SMTP stand for?

Selecione uma das seguintes:

  • Storage Management Transaction Protocol

  • Simple Management Transfer Protocol

  • Simple Mail Transaction Protocol

  • Simple Mail Transfer Protocol

Explicação

Questão 17 de 36

1

what is the purpose of setting up e-mail notifications for users who violate storage quotas?

Selecione uma das seguintes:

  • so that administrator can proactively assist users in resolving the problem

  • to automate tracking of quota violations

  • to keep a record of quota violations for future reference

  • to endure that users know when they're using too much storage

Explicação

Questão 18 de 36

1

Which screening technique prevents a user from saving defined unauthorized files?

Selecione uma das seguintes:

  • active

  • passive

  • secure

  • preventative

Explicação

Questão 19 de 36

1

what feature can you use to simplify the management of file screens?

Selecione uma das seguintes:

  • exceptions

  • exemptions

  • templates

  • quotas

Explicação

Questão 20 de 36

1

what is the purpose of setting soft quotas?

Selecione uma das seguintes:

  • to notify users that they have reached the quota limit

  • to list files that need to be deleted

  • to identify users who violate quotas

  • to determine where hard quotas need to be set

Explicação

Questão 21 de 36

1

what effect does using quotas in File Server Resource Manager have?

Selecione uma das seguintes:

  • it limits the number of files allocated to a user

  • it limits the number of access licenses allotted to a server

  • it limits the number of drive mappings to a shared resource

  • it limits the number of gigabytes allocated to a volume or folder

Explicação

Questão 22 de 36

1

some exemptions might be required for certain groups to store otherwise restricted file types. What type of exemption can you set p on folders?

Selecione uma das seguintes:

  • file save exemption

  • file type exemption

  • file screen exception

  • folder screen exception

Explicação

Questão 23 de 36

1

placing a quota limit on a folder applies that limit to what part of the folder?

Selecione uma das seguintes:

  • the folder and any files it contains

  • the folder itself but no files

  • the entire folder and its subtree

  • only the files within the folder

Explicação

Questão 24 de 36

1

By default, where are storage reports saved?

Selecione uma das seguintes:

  • C:\StorageReports\Saved

  • C:\StorageReports\Schedule

  • C:\StorageReports\Queued

  • C:\StorageReports\Quotas

Explicação

Questão 25 de 36

1

if you are a command-line user, what command will encrypt files and folders?

Selecione uma das seguintes:

  • encrypt.exe

  • compress.exe

  • efs.exe

  • cipher.exe

Explicação

Questão 26 de 36

1

an encrypted file can be converted back to its original format by a process known as what?

Selecione uma das seguintes:

  • encryption

  • digitization

  • decryption

  • encapsulation

Explicação

Questão 27 de 36

1

after a file has been encrypted, it is stored in what format?

Selecione uma das seguintes:

  • hidden

  • executable

  • encrypted

  • converted

Explicação

Questão 28 de 36

1

encryption does not protect a file or folder from deletion. To protect a file or folder from deletion, what technology should you use?

Selecione uma das seguintes:

  • BitProtector

  • NTFS permissions

  • SSL/TLS

  • compression

Explicação

Questão 29 de 36

1

single-key encryption is also known as what kind of encryption?

Selecione uma das seguintes:

  • hash

  • simple

  • signal

  • symmetric

Explicação

Questão 30 de 36

1

public-key cryptography uses how many keys?

Selecione uma das seguintes:

  • one

  • two

  • two pair

  • 256

Explicação

Questão 31 de 36

1

what happens to files and subfolders within an EFS encrypted folder?

Selecione uma das seguintes:

  • Nothing; they must be encrypted individually

  • they're encrypted but at a lower encryption level

  • they're left unencrypted but hidden

  • they're encrypted with the parent folder

Explicação

Questão 32 de 36

1

what is the purpose of using hash function encryption?

Selecione uma das seguintes:

  • to store passwords in a non-readable format

  • to demonstrate one-way encryption techniques

  • to provide keyless encryption and decryption algorithms

  • to keep track of 128-bit key pairs

Explicação

Questão 33 de 36

1

where is the most secure location to store secure key recovery information?

Selecione uma das seguintes:

  • on an encrypted USB device

  • in a secure cabinet on an encrypted USB device

  • in Active Directory

  • on the local device

Explicação

Questão 34 de 36

1

EFS encryption is what type of feature that can be enable or disable at will, similar in effect to read-only, compression, or hidden?

Selecione uma das seguintes:

  • status

  • characteristics

  • attribute

  • handle

Explicação

Questão 35 de 36

1

from a security standpoint, which BitLocker operational mode is most secure?

Selecione uma das seguintes:

  • TPM only

  • startup key only

  • TPM + startup PIN

  • TPM + startup key

Explicação

Questão 36 de 36

1

what built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption?

Selecione uma das seguintes:

  • certificates

  • hardware-assisted virtualization

  • trusted platform module

  • BIOS-enabled anti-virus software

Explicação