MCTS: Managing Files MCQs

MCTS: Managing Files MCQs

Our experts have gathered these MCTS: Managing Files MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of MCTS: Managing Files by answering these 30 multiple-choice questions.
Get started now by scrolling down!

1: You can use the DFSUtil tool to configure DFS from a command prompt or script. DFSUtil has replaced DFSCmd included with Win Server 2003. To use DFSUtil to view the DFS roots in a domain - run the following command:

A.   Dfsutil domain

B.   Read access

C.   Vssadmin create shadow /For=C:

D.   Read & Execute

2: ______ can decrypt encrypted files by using the file properties dialog box - just as if they were the user that originally encrypted the files.

A.   Wbadmin start backup -backupTarget:L: -include:C: -quiet

B.   Data Recovery Agents (DRAs)

C.   System files

D.   Read - but not write

3: If backup software needs to access a file that's in use by a different application - Volume Shadow Copy creates a shadow copy of the file ______ and then gives the backup process access to the shadow copy.

A.   You should run vssadmin

B.   In its current state

C.   Administrators

D.   Removable flash drives

4: With the ______ permissions - users can view the contents of a folder and open files.

A.   Read - but not write

B.   Read

C.   DFSDiag

D.   You should run wbadmin

5: Users have ______ permissions over their own files. Admins also have full control. Other users who are not administrators cannot read or write to a user's files.

A.   Write

B.   Full control

C.   Wbadmin start backup -backupTarget:L: -allCritical -quiet

D.   BranchCache

6: EFS encrypts folders and files for individual users. You cannot use EFS to encrypt ______ - however.

A.   DFSDiag

B.   Administrators

C.   Read access

D.   System files

7: Distributed Cache mode uses _____ file sharing to exchange copies of files from file servers located on remote networks.

A.   Removable flash drives

B.   Full control

C.   Peer-to-peer

D.   In use

8: Users can ______ to - the %SystemRoot% folder and subfolders. Admins can add and update files. This allows admins - but not users - to install updates and applications.

A.   Read - but not write

B.   Read

C.   List Folder Contents - Read - Read & Execute - Write - Modify - Full Control

D.   BitLocker

9: BitLocker is a feature of all Win Srvr 2008 R2 editions - and only of Win 7 ______ and ______. It is not supported on other editions of Win 7.

A.   Enterprise and Ultimate

B.   Data Recovery Agents (DRAs)

C.   File Classification Infrastructure

D.   Wbadmin start backup -backupTarget:L: -allCritical -quiet

10: What command should you run to configure shadow copies?

A.   Enterprise and Ultimate

B.   You should run vssadmin

C.   Client-server

D.   Read access

11: BranchCache can operate in two modes: ______.

A.   Distributed Cache and Hosted Cache

B.   Write

C.   Vssadmin create shadow /For=C:

D.   Green

12: With the ______ - you define a custom set of classification properties and then create classification rules to apply different values for each of those properties to specific files.

A.   File Classification Infrastructure

B.   Modify

C.   Encryption certificates

D.   System files

13: Shadow copies allow backup software to access files that are ______.

A.   Dfsutil domain

B.   In use

C.   Distributed Cache and Hosted Cache

D.   BitLocker

14: If Windows cannot start or you need to recover the entire system volume from a backup - you can start the computer from the Win Srvr 2008 R2 DVD and use the ______ wizard to recover the operating system.

A.   Client-server

B.   Read - but not write

C.   System Image Recovery

D.   Encrypting

15: With the ______ permissions - users can create files in a folder but not necessarily read them.

A.   Write

B.   Read access

C.   Dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard

D.   Icacls

16: A user who does not have NTFS permissions to ______ a folder or file will not see it listed in the directory contents.

A.   Wbadmin start backup -backupTarget:L: -allCritical -quiet

B.   Full Control

C.   Read

D.   Windows 7 or Windows Server 2008 R2

17: BitLocker Drive Encryption can help protect users from ______ - which are a type of malware that runs beneath the operating system and are very difficult to detect or remove.

A.   Wbadmin start backup -backupTarget:L: -allCritical -quiet

B.   Dfsutil domain

C.   System Image Recovery

D.   Rootkits

18: BranchCache clients must be running ______ or ______.

A.   Dfsutil domain

B.   Icacls

C.   Windows 7 or Windows Server 2008 R2

D.   Encryption certificates

19: You can use the DirQuota command to configure disk quotas at the command prompt or from a script. For example - the following command applies the standard 200 MB Limit Reports To User template to the C:\Shared folder:

A.   Windows 7 or Windows Server 2008 R2

B.   Distributed Cache and Hosted Cache

C.   dirquota quota add /Path:C:\Shared /SourceTemplate: 200 MB Limit Reports To User

D.   Enterprise and Ultimate

20: ______ stores copies of files shared by remote file or web servers (including servers running WSUS) that are running Win Srvr 2008 R2 and shares them with clients in the same office.

A.   Encryption certificates

B.   BranchCache

C.   Write

D.   dirquota quota add /Path:C:\Shared /SourceTemplate: 200 MB Limit Reports To User

21: Similar to the system files permissions - the %ProgramFiles% folder permissions are designed to allow users to run applications and allow only admins to install applications. Users have ______ - and admins have full control.

A.   User files - System files - Program files

B.   Access-based Enumeration (ABE)

C.   Peer-to-peer

D.   Read access

22: The ______ permission is useful for creating a folder in which several users can deliver files but not access each other's files or even see what other files exist.

A.   Modify

B.   Read

C.   Read access

D.   Write

23: You can use the Wbadmin tool to initiate backups from a script or at a command prompt. For example - to initiate a backup of the C drive to the L drive - you would run the following command prompt from an elevated command prompt:

A.   Wbadmin start systemstatebackup

B.   Vssadmin list shadowstorage

C.   Wbadmin start backup -backupTarget:L: -include:C: -quiet

D.   Read access

24: To encrypt entire volumes and protect system files - use ______ Encryption.

A.   In its current state

B.   BitLocker Drive

C.   Vssadmin list shadowstorage

D.   Dfsutil domain

25: Hosted Cache mode uses a ______ architecture to exchange copies of files from file servers located on remote networks.

A.   Read

B.   System Image Recovery

C.   Client-server

D.   In its current state

26: If you encrypt a folder - Windows automatically encrypts all new files in the folder. Windows Explorer shows encrypted files in ______.

A.   Client-server

B.   Vssadmin list shadowstorage

C.   Server running Win Srvr 2008 R2

D.   Green

27: To delete a system state backup - run:

A.   In use

B.   Read

C.   Wbadmin delete systemstatebackup

D.   Server running Win Srvr 2008 R2

28: In Hosted Cache mode - a ______ with the BranchCache feature installed maintains a central cache of files accessed by clients in the same office.

A.   Administrators

B.   Server running Win Srvr 2008 R2

C.   Full control

D.   You should run vssadmin

29: If you need to share EFS-protected files with other users on your local computer or across the network - you need to add their ______ to the file.

A.   Vssadmin list shadows

B.   Read

C.   Vssadmin list shadowstorage

D.   Encryption certificates

30: To create a hard limit of 100 MB - run the following command:

A.   BitLocker Drive

B.   Server running Win Srvr 2008 R2

C.   Wbadmin start systemstatebackup

D.   Dirquota quota add /Path:C:Shared /Limit:100MB /Type:Hard

31: You can sort files ____.

A.   Only in Details view

B.   Only in Details, Content, and Tiles views

C.   Only by file name or file creation date

D.   No matter which view you use