1.
.By default, administrators are subject to quota limits.
Correct Answer
B. False
Explanation
Administrators are not subject to quota limits by default. Quota limits are typically imposed on regular users to restrict their usage of certain resources, such as storage or API calls. However, administrators usually have elevated privileges and are exempt from these limitations to perform their administrative tasks effectively. Therefore, the correct answer is False.
2.
The FAT file system has built-in support for file compression.
Correct Answer
B. False
Explanation
The statement is false because the FAT file system does not have built-in support for file compression. The FAT file system is a simple and widely used file system that was developed for early operating systems. It does not include features like file compression, which are typically found in more advanced file systems.
3.
With NTFS, compression can be enabled on a folder with encryption.
Correct Answer
B. False
Explanation
NTFS (New Technology File System) supports both compression and encryption, but these two features cannot be enabled simultaneously on a folder. When compression is enabled on a folder, it cannot be encrypted. Similarly, when encryption is enabled on a folder, it cannot be compressed. Therefore, the statement that compression can be enabled on a folder with encryption is false.
4.
In a domain environment, the domain Administrator account is designated as a recovery agent
Correct Answer
A. True
Explanation
In a domain environment, the domain Administrator account is designated as a recovery agent. This means that the Administrator account has the necessary permissions and access rights to recover encrypted files or data in case of any issues or emergencies. As the highest level of authority in the domain, the Administrator account is entrusted with this responsibility to ensure the security and availability of the encrypted data.
5.
By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m., and 12:00 p.m., Monday through Friday
Correct Answer
A. True
Explanation
Shadow copies are a feature in Windows that allow users to restore previous versions of files or folders. By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m. and 12:00 p.m., Monday through Friday. This means that the statement "True" is correct, as it accurately describes the default behavior of shadow copies in Windows.
6.
Which of the following is not one of the filesystems Windows supports?
Correct Answer
D. ZFS
Explanation
ZFS is not one of the filesystems supported by Windows. Windows primarily supports NTFS, FAT, and FAT32 filesystems. ZFS is a file system developed by Sun Microsystems and is commonly used in Unix-based operating systems such as Solaris and FreeBSD. However, it is not natively supported by Windows.
7.
What is the size limit for FAT32 partitions at creation time within Windows operating systems?
Correct Answer
D. 32 GB
Explanation
The size limit for FAT32 partitions at creation time within Windows operating systems is 32 GB. This means that when creating a FAT32 partition, the maximum size it can be is 32 GB.
8.
Which of the following is not a reason to use volume mount points?
Correct Answer
A. To extend the apparent amount of free space on an existing FAT32 volume
Explanation
Volume mount points are used to consolidate volumes and avoid using drive letters for a volume. They are not used to extend the apparent amount of free space on an existing FAT32 volume.
9.
What is the primary function of shadow copies?
Correct Answer
C. Prevent the accidental loss of data
Explanation
Shadow copies are primarily used to prevent the accidental loss of data. They create copies of files at specific points in time, allowing users to restore previous versions of files if they are deleted, modified, or corrupted. This feature acts as a safety net, ensuring that data can be recovered in case of accidental deletion or data loss due to system failures or errors.
10.
If a file with the compression attribute set is copied to a new location, what happens?
Correct Answer
B. The file inherits the compression attribute settings from its parent container
Explanation
When a file with the compression attribute set is copied to a new location, it will inherit the compression attribute settings from its parent container. This means that the file will retain its compression attribute in the new location, ensuring that it remains compressed.
11.
If a file with the encryption attribute set is copied or moved within an NTFS volume, what happens?
Correct Answer
C. The file retains its encryption attribute, regardless of the parent container’s settings
Explanation
When a file with the encryption attribute set is copied or moved within an NTFS volume, the file retains its encryption attribute, regardless of the parent container's settings. This means that even if the file is moved to a different folder or directory, it will still remain encrypted. The encryption attribute is independent of the parent container's settings, ensuring that the file remains protected and secure.
12.
What must a user have in order to be added to an encrypted file’s access list?
Correct Answer
A. Valid EFS Certificate
Explanation
To be added to an encrypted file's access list, a user must possess a valid EFS (Encrypting File System) certificate. This certificate is required to authenticate the user's identity and grant them access to the encrypted file. Without a valid EFS certificate, the user will not be able to gain access to the file's contents.
13.
One of your co-workers, Jeremy, is trying to access a share on a server you’re responsible for. He has asked for your help because despite having the correct share permissions, he still cannot access the share. After investing the problem, you find the permissions are configured as follows:Share permissions:Everyone - Full controlNTFS Permissions:HRdept - ModifyJeremy - Deny Full ControlJeremy informs you that he is a member of the HRdept group. What is Jeremy’s effective permissions over the network?
Correct Answer
D. Deny Full control
Explanation
Jeremy's effective permissions over the network are "Deny Full control". This is because even though he is a member of the HRdept group, which has "Modify" permissions, the "Deny Full Control" permission specifically assigned to him overrides any other permissions he may have.
14.
Vanessa has come to you asking for your help with a network share issue. She created a shared folder named ShareData on a member server with her account, vness1. However, she finds that she is unable to modify or make changes to any documents in the shared folder across the network. You have logged into the server, and checked the permissions set on ShareData:Share Permissions:Everyone - ReadNTFS PermissionsCreator owner - Implicit full controlWhat should Vanessa do?
Correct Answer
A. She should set Everyone to Full Control in the share permissions
Explanation
Vanessa should set Everyone to Full Control in the share permissions. By doing so, she will grant all users the ability to modify and make changes to the documents in the shared folder across the network. This will ensure that she and other users have the necessary permissions to perform desired actions on the files within the shared folder.
15.
The HRdept group needs to have full access to a nested folder on a server. This folder cannot be moved, and is within a folder where the HRdept group must not be allowed to open or change any files. What is the easiest method to accomplish this?
Correct Answer
C. Apply the “List Folder Contents” standard permission to the container where HRdept should have no access, then apply Full Control to the nested folder
Explanation
The easiest method to accomplish this is to apply the "List Folder Contents" standard permission to the container where HRdept should have no access. This will allow them to see the nested folder but not open or change any files within it. Then, Full Control permissions can be applied specifically to the nested folder, giving HRdept full access to it. This ensures that HRdept has full access to the nested folder while being restricted from accessing or modifying any files in the container folder.
16.
In Windows Server 2008, the default limit for the number of simultaneous users is set to...
Correct Answer
D. 16,777,216
Explanation
In Windows Server 2008, the default limit for the number of simultaneous users is set to 16,777,216. This means that the server can handle up to 16,777,216 users accessing it at the same time. This high limit allows for scalability and ensures that the server can accommodate a large number of users without any performance issues.
17.
How would you access serverXX’s administrative share for the C Drive?
Correct Answer
B. \\serverXX\C$
Explanation
To access serverXX's administrative share for the C Drive, you would use the UNC path \\serverXX\C$. This path allows you to access the administrative share of the C Drive on serverXX remotely. The $ symbol indicates that it is a hidden share, and the C represents the C Drive.
18.
Which of the following is not a method by which you can access Windows shares?
Correct Answer
D. Telnetting the UNC path
Explanation
Telnetting the UNC path is not a method to access Windows shares. Telnet is a network protocol used for remote administration of computers, but it does not provide direct access to shared resources on a Windows network. UNC path, Active Directory search, and mapping a drive are all valid methods to access Windows shares. UNC path allows accessing shared folders by specifying the server and share name in the path. Active Directory search helps in finding shared resources through the network directory service. Mapping a drive assigns a drive letter to a shared folder for easy access.
19.
A DFS hierarchy is referred to as a...
Correct Answer
A. Namespace
Explanation
A DFS hierarchy is referred to as a namespace because it provides a way to organize and manage the distributed file system. It allows for logical grouping and structuring of files and directories, similar to how namespaces are used in programming languages to organize code. The namespace in DFS helps to avoid naming conflicts and provides a unified view of the distributed file system to users and applications.
20.
In a Windows environment, he physical printer containing paper and ink or toner to which print jobs are sent is called...
Correct Answer
C. A print device
Explanation
The physical printer containing paper and ink or toner to which print jobs are sent is called a print device. This term encompasses the actual hardware device that produces the printed output.
21.
Where can you configure the Separator Page option on a printer?
Correct Answer
D. In the printer’s Properties, on the Advanced tab
Explanation
To configure the Separator Page option on a printer, you would go to the printer's Properties. Within the Properties window, you would navigate to the Advanced tab. This tab contains various settings and options for the printer, including the Separator Page option. By selecting and configuring this option, you can specify a separator page to be printed between print jobs, helping to distinguish between different documents or print jobs.
22.
What service do you install to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers?
Correct Answer
B. Line Printer Daemon (LPD)
Explanation
The Line Printer Daemon (LPD) is the service that needs to be installed in order to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers. LPD is a printing protocol that allows remote printing across different operating systems. It enables UNIX/Linux systems to send print jobs to Windows shared printers by acting as a print server and handling the print queue.
23.
The Services for Network File System role service performs what function?
Correct Answer
A. Allows Windows to use the Network File System file sharing protocol common to Linux and Unix
Explanation
The correct answer is "Allows Windows to use the Network File System file sharing protocol common to Linux and Unix." This role service enables Windows operating systems to access and share files using the Network File System (NFS) protocol, which is commonly used in Linux and Unix environments. By enabling this role service, Windows can seamlessly communicate and share files with systems running on different operating systems, promoting interoperability and file sharing across heterogeneous network environments.
24.
This role service allows grouping shared folders from one or more file servers into a single hierarchical folder structure, so users don’t have to know on which server a share is located.
Correct Answer
D. Distributed File System
Explanation
The correct answer is Distributed File System. Distributed File System is a role service in Windows Server that allows administrators to group shared folders from multiple file servers into a single logical namespace. This means that users do not need to know the specific location of a share on a server, as the distributed file system provides a single hierarchical folder structure that encompasses all the shared folders. This simplifies file access and management for users and improves overall efficiency in a networked environment.
25.
What is the maximum partition size that FAT16 supports?
Correct Answer
B. 2 GB
Explanation
The maximum partition size that FAT16 supports is 2 GB. FAT16 is a file system used in older versions of Windows and DOS, and it has a limitation on the maximum size of a partition. In this case, the maximum size is 2 GB, meaning that any partition created using FAT16 cannot exceed this size.