Chapter 6 Review Quiz Active Directory

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By TimGutierrez
T
TimGutierrez
Community Contributor
Quizzes Created: 4 | Total Attempts: 688
Questions: 25 | Attempts: 250

SettingsSettingsSettings
File Management Quizzes & Trivia

Studt this Chapter 6 also for Midterm


Questions and Answers
  • 1. 

    .By default, administrators are subject to quota limits.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Administrators are not subject to quota limits by default. Quota limits are typically imposed on regular users to restrict their usage of certain resources, such as storage or API calls. However, administrators usually have elevated privileges and are exempt from these limitations to perform their administrative tasks effectively. Therefore, the correct answer is False.

    Rate this question:

  • 2. 

      The FAT file system has built-in support for file compression.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the FAT file system does not have built-in support for file compression. The FAT file system is a simple and widely used file system that was developed for early operating systems. It does not include features like file compression, which are typically found in more advanced file systems.

    Rate this question:

  • 3. 

      With NTFS, compression can be enabled on a folder with encryption.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    NTFS (New Technology File System) supports both compression and encryption, but these two features cannot be enabled simultaneously on a folder. When compression is enabled on a folder, it cannot be encrypted. Similarly, when encryption is enabled on a folder, it cannot be compressed. Therefore, the statement that compression can be enabled on a folder with encryption is false.

    Rate this question:

  • 4. 

     In a domain environment, the domain Administrator account is designated as a recovery agent

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In a domain environment, the domain Administrator account is designated as a recovery agent. This means that the Administrator account has the necessary permissions and access rights to recover encrypted files or data in case of any issues or emergencies. As the highest level of authority in the domain, the Administrator account is entrusted with this responsibility to ensure the security and availability of the encrypted data.

    Rate this question:

  • 5. 

     By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m., and 12:00 p.m., Monday through Friday

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Shadow copies are a feature in Windows that allow users to restore previous versions of files or folders. By default, shadow copies are created when they are first enabled on a volume and then two times a day at 7:00 a.m. and 12:00 p.m., Monday through Friday. This means that the statement "True" is correct, as it accurately describes the default behavior of shadow copies in Windows.

    Rate this question:

  • 6. 

    Which of the following is not one of the filesystems Windows supports?

    • A.

      NTFS

    • B.

      FAT

    • C.

      FAT32

    • D.

      ZFS

    Correct Answer
    D. ZFS
    Explanation
    ZFS is not one of the filesystems supported by Windows. Windows primarily supports NTFS, FAT, and FAT32 filesystems. ZFS is a file system developed by Sun Microsystems and is commonly used in Unix-based operating systems such as Solaris and FreeBSD. However, it is not natively supported by Windows.

    Rate this question:

  • 7. 

    What is the size limit for FAT32 partitions at creation time within Windows operating systems?

    • A.

      4 GB

    • B.

      2 GB

    • C.

      2 TB

    • D.

      32 GB

    Correct Answer
    D. 32 GB
    Explanation
    The size limit for FAT32 partitions at creation time within Windows operating systems is 32 GB. This means that when creating a FAT32 partition, the maximum size it can be is 32 GB.

    Rate this question:

  • 8. 

    Which of the following is not a reason to use volume mount points?

    • A.

      To extend the apparent amount of free space on an existing FAT32 volume

    • B.

      Consolidate frequently accessed volumes

    • C.

      Consolidate several shared volumes

    • D.

      To avoid using a drive letter for a volume

    Correct Answer
    A. To extend the apparent amount of free space on an existing FAT32 volume
    Explanation
    Volume mount points are used to consolidate volumes and avoid using drive letters for a volume. They are not used to extend the apparent amount of free space on an existing FAT32 volume.

    Rate this question:

  • 9. 

    What is the primary function of shadow copies?

    • A.

      To maintain copies of files for security auditing

    • B.

      Avoid distracting the user by normal system level file transfer activities

    • C.

      Prevent the accidental loss of data

    • D.

      To serve as the primary means of backing up data

    Correct Answer
    C. Prevent the accidental loss of data
    Explanation
    Shadow copies are primarily used to prevent the accidental loss of data. They create copies of files at specific points in time, allowing users to restore previous versions of files if they are deleted, modified, or corrupted. This feature acts as a safety net, ensuring that data can be recovered in case of accidental deletion or data loss due to system failures or errors.

    Rate this question:

  • 10. 

    If a file with the compression attribute set is copied to a new location, what happens? 

    • A.

      The file loses the compression attribute

    • B.

      The file inherits the compression attribute settings from its parent container

    • C.

      The file retains its compression attribute

    • D.

      The file can’t be copied to a new location without being decompressed first

    Correct Answer
    B. The file inherits the compression attribute settings from its parent container
    Explanation
    When a file with the compression attribute set is copied to a new location, it will inherit the compression attribute settings from its parent container. This means that the file will retain its compression attribute in the new location, ensuring that it remains compressed.

    Rate this question:

  • 11. 

    If a file with the encryption attribute set is copied or moved within an NTFS volume, what happens?

    • A.

      The encrypted file loses its encryption attribute

    • B.

      The file inherits the encryption attribute settings from its parent container

    • C.

      The file retains its encryption attribute, regardless of the parent container’s settings

    • D.

      Nothing; the file must be decrypted before it can be moved or copied

    Correct Answer
    C. The file retains its encryption attribute, regardless of the parent container’s settings
    Explanation
    When a file with the encryption attribute set is copied or moved within an NTFS volume, the file retains its encryption attribute, regardless of the parent container's settings. This means that even if the file is moved to a different folder or directory, it will still remain encrypted. The encryption attribute is independent of the parent container's settings, ensuring that the file remains protected and secure.

    Rate this question:

  • 12. 

    What must a user have in order to be added to an encrypted file’s access list? 

    • A.

      Valid EFS Certificate

    • B.

      Special NTFS permissions

    • C.

      Full Control permissions to the file

    • D.

      EFS extended permissions

    Correct Answer
    A. Valid EFS Certificate
    Explanation
    To be added to an encrypted file's access list, a user must possess a valid EFS (Encrypting File System) certificate. This certificate is required to authenticate the user's identity and grant them access to the encrypted file. Without a valid EFS certificate, the user will not be able to gain access to the file's contents.

    Rate this question:

  • 13. 

    One of your co-workers, Jeremy, is trying to access a share on a server you’re responsible for. He has asked for your help because despite having the correct share permissions, he still cannot access the share. After investing the problem, you find the permissions are configured as follows:Share permissions:Everyone - Full controlNTFS Permissions:HRdept - ModifyJeremy - Deny Full ControlJeremy informs you that he is a member of the HRdept group. What is Jeremy’s effective permissions over the network?

    • A.

      Modify

    • B.

      Full control

    • C.

      Read only

    • D.

      Deny Full control

    Correct Answer
    D. Deny Full control
    Explanation
    Jeremy's effective permissions over the network are "Deny Full control". This is because even though he is a member of the HRdept group, which has "Modify" permissions, the "Deny Full Control" permission specifically assigned to him overrides any other permissions he may have.

    Rate this question:

  • 14. 

    Vanessa has come to you asking for your help with a network share issue. She created a shared folder named ShareData on a member server with her account, vness1. However, she finds that she is unable to modify or make changes to any documents in the shared folder across the network. You have logged into the server, and checked the permissions set on ShareData:Share Permissions:Everyone - ReadNTFS PermissionsCreator owner - Implicit full controlWhat should Vanessa do? 

    • A.

      She should set Everyone to Full Control in the share permissions

    • B.

      She should add her username to the NTFS permissions and give her username Full Control

    • C.

      Set Everyone’s share permissions to Modify

    • D.

      Remove all share permissions

    Correct Answer
    A. She should set Everyone to Full Control in the share permissions
    Explanation
    Vanessa should set Everyone to Full Control in the share permissions. By doing so, she will grant all users the ability to modify and make changes to the documents in the shared folder across the network. This will ensure that she and other users have the necessary permissions to perform desired actions on the files within the shared folder.

    Rate this question:

  • 15. 

    The HRdept group needs to have full access to a nested folder on a server. This folder cannot be moved, and is within a folder where the HRdept group must not be allowed to open or change any files. What is the easiest method to accomplish this?

    • A.

      Assign the read attributes special permission to the container where HRdept should have no access, then apply Full Control to the nested folder

    • B.

      Apply Full control permissions to the nested folder

    • C.

      Apply the “List Folder Contents” standard permission to the container where HRdept should have no access, then apply Full Control to the nested folder

    • D.

      Set up a batch script to automatically copy the files from the nested folder to another folder where HRdept can access them freely

    Correct Answer
    C. Apply the “List Folder Contents” standard permission to the container where HRdept should have no access, then apply Full Control to the nested folder
    Explanation
    The easiest method to accomplish this is to apply the "List Folder Contents" standard permission to the container where HRdept should have no access. This will allow them to see the nested folder but not open or change any files within it. Then, Full Control permissions can be applied specifically to the nested folder, giving HRdept full access to it. This ensures that HRdept has full access to the nested folder while being restricted from accessing or modifying any files in the container folder.

    Rate this question:

  • 16. 

    In Windows Server 2008, the default limit for the number of simultaneous users is set to...

    • A.

      10

    • B.

      20

    • C.

      50

    • D.

      16,777,216

    Correct Answer
    D. 16,777,216
    Explanation
    In Windows Server 2008, the default limit for the number of simultaneous users is set to 16,777,216. This means that the server can handle up to 16,777,216 users accessing it at the same time. This high limit allows for scalability and ensures that the server can accommodate a large number of users without any performance issues.

    Rate this question:

  • 17. 

    How would you access serverXX’s administrative share for the C Drive?

    • A.

      Impossible; drives can’t be shared

    • B.

      \\serverXX\C$

    • C.

      \\serverXX\$C

    • D.

      \serverXX\C$

    Correct Answer
    B. \\serverXX\C$
    Explanation
    To access serverXX's administrative share for the C Drive, you would use the UNC path \\serverXX\C$. This path allows you to access the administrative share of the C Drive on serverXX remotely. The $ symbol indicates that it is a hidden share, and the C represents the C Drive.

    Rate this question:

  • 18. 

    Which of the following is not a method by which you can access Windows shares? 

    • A.

      UNC path

    • B.

      Active Directory search

    • C.

      Mapping a drive

    • D.

      Telnetting the UNC path

    Correct Answer
    D. Telnetting the UNC path
    Explanation
    Telnetting the UNC path is not a method to access Windows shares. Telnet is a network protocol used for remote administration of computers, but it does not provide direct access to shared resources on a Windows network. UNC path, Active Directory search, and mapping a drive are all valid methods to access Windows shares. UNC path allows accessing shared folders by specifying the server and share name in the path. Active Directory search helps in finding shared resources through the network directory service. Mapping a drive assigns a drive letter to a shared folder for easy access.

    Rate this question:

  • 19. 

    A DFS hierarchy is referred to as a...

    • A.

      Namespace

    • B.

      Filespace

    • C.

      domainspace

    • D.

      Dfspace

    Correct Answer
    A. Namespace
    Explanation
    A DFS hierarchy is referred to as a namespace because it provides a way to organize and manage the distributed file system. It allows for logical grouping and structuring of files and directories, similar to how namespaces are used in programming languages to organize code. The namespace in DFS helps to avoid naming conflicts and provides a unified view of the distributed file system to users and applications.

    Rate this question:

  • 20. 

    In a Windows environment, he physical printer containing paper and ink or toner to which print jobs are sent is called... 

    • A.

      A printer

    • B.

      A print server

    • C.

      A print device

    • D.

      Print queue

    Correct Answer
    C. A print device
    Explanation
    The physical printer containing paper and ink or toner to which print jobs are sent is called a print device. This term encompasses the actual hardware device that produces the printed output.

    Rate this question:

  • 21. 

    Where can you configure the Separator Page option on a printer? 

    • A.

      In the printer’s Properties, on the General tab

    • B.

      In the printer’s Properties, on the Device Settings tab

    • C.

      In the printer’s Properties, on the Configuration tab

    • D.

      In the printer’s Properties, on the Advanced tab

    Correct Answer
    D. In the printer’s Properties, on the Advanced tab
    Explanation
    To configure the Separator Page option on a printer, you would go to the printer's Properties. Within the Properties window, you would navigate to the Advanced tab. This tab contains various settings and options for the printer, including the Separator Page option. By selecting and configuring this option, you can specify a separator page to be printed between print jobs, helping to distinguish between different documents or print jobs.

    Rate this question:

  • 22. 

    What service do you install to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers? 

    • A.

      Line Printer Universal Access (LPUA)

    • B.

      Line Printer Daemon (LPD)

    • C.

      Special Print Services

    • D.

      Linux Printer Daemon (LPD)

    Correct Answer
    B. Line Printer Daemon (LPD)
    Explanation
    The Line Printer Daemon (LPD) is the service that needs to be installed in order to allow UNIX/Linux computers using the Line Printer Remote service to print to Windows shared printers. LPD is a printing protocol that allows remote printing across different operating systems. It enables UNIX/Linux systems to send print jobs to Windows shared printers by acting as a print server and handling the print queue.

    Rate this question:

  • 23. 

    The Services for Network File System role service performs what function? 

    • A.

      Allows Windows to use the Network File System file sharing protocol common to Linux and Unix

    • B.

      Allows users to access Windows shares over the network via Server Message Block (SMB) protocol

    • C.

      Creates a distributed file system that is shared among multiple servers

    • D.

      Manages all network shares

    Correct Answer
    A. Allows Windows to use the Network File System file sharing protocol common to Linux and Unix
    Explanation
    The correct answer is "Allows Windows to use the Network File System file sharing protocol common to Linux and Unix." This role service enables Windows operating systems to access and share files using the Network File System (NFS) protocol, which is commonly used in Linux and Unix environments. By enabling this role service, Windows can seamlessly communicate and share files with systems running on different operating systems, promoting interoperability and file sharing across heterogeneous network environments.

    Rate this question:

  • 24. 

    This role service allows grouping shared folders from one or more file servers into a single hierarchical folder structure, so users don’t have to know on which server a share is located.

    • A.

      Services for Network File System

    • B.

      File Server

    • C.

      Windows Search Service

    • D.

      Distributed File System

    Correct Answer
    D. Distributed File System
    Explanation
    The correct answer is Distributed File System. Distributed File System is a role service in Windows Server that allows administrators to group shared folders from multiple file servers into a single logical namespace. This means that users do not need to know the specific location of a share on a server, as the distributed file system provides a single hierarchical folder structure that encompasses all the shared folders. This simplifies file access and management for users and improves overall efficiency in a networked environment.

    Rate this question:

  • 25. 

    What is the maximum partition size that FAT16 supports?

    • A.

      1 GB

    • B.

      2 GB

    • C.

      4 GB

    • D.

      8 GB

    Correct Answer
    B. 2 GB
    Explanation
    The maximum partition size that FAT16 supports is 2 GB. FAT16 is a file system used in older versions of Windows and DOS, and it has a limitation on the maximum size of a partition. In this case, the maximum size is 2 GB, meaning that any partition created using FAT16 cannot exceed this size.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 06, 2014
    Quiz Created by
    TimGutierrez
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.