Filters
Question type

Study Flashcards

The share permission ____ enables groups and users to read,execute,and add files,but can only modify and delete files provided by them.


A) reader
B) co-owner
C) contributor
D) administrator

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Taking ____ is the only way to shift control from one account to another.


A) ownership
B) control
C) possession
D) permissions

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

SUA supports more than 400 native UNIX/Linux commands and utilities.

A) True
B) False

Correct Answer

verifed

verified

____ mean that the same permissions on a parent object apply to the child objects,such as files and subfolders within the parent folder.


A) Copied permissions
B) Inherited permissions
C) Overridden permissions
D) Instantiated permissions

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Windows Search Service by default is installed to start automatically each time the server is booted.

A) True
B) False

Correct Answer

verifed

verified

In DFS,access to shared folders can be distributed across many servers,resulting in the ability to perform ____,so that one server does not experience more load than others.


A) distribution
B) replication
C) load balancing
D) redundancy

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Windows Server 2008 uses two types of ACLs: discretionary and non-discretionary.

A) True
B) False

Correct Answer

verifed

verified

List two new features Windows Server 2008 offers for SUA.

Correct Answer

verifed

verified

More transparent ability for UNIX/Linux ...

View Answer

UNIX/Linux server administrators and programmers rely on the popular UNIX/Linux ____ editor for creating scripts,writing program source code,editing data files,and many more functions.


A) vi
B) notepad
C) txt
D) vin

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Match each term with the correct statement below. -An ACL that is configured by a server administrator or owner of an object


A) Network Information Services
B) folder target
C) permissions
D) discretionary ACL
E) shell
F) namespace root
G) system control ACL
H) compiler
I) Dynamic-link library (DLL) files

J) A) and C)
K) B) and C)

Correct Answer

verifed

verified

The share permission ____ permits groups or users to read,execute,add,delete,and modify files,and to create and delete subfolders and manage share permissions.


A) reader
B) contributor
C) co-owner
D) administrator

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

To ____ an object means to make it available for users to access when they view Active Directory contents.


A) inherit
B) control
C) present
D) publish

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

When configuring folder and file permissions,use the ____ button on the folder properties Security tab to change which groups and users have permissions to a folder.


A) General
B) Edit
C) Modify
D) Tools

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

The ____ attribute is checked to indicate that the folder or file needs to be backed up because it is new or changed.


A) read-only
B) system
C) backup
D) archive

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Match each term with the correct statement below. -Control access to an object,such as a folder or file


A) Network Information Services
B) folder target
C) permissions
D) discretionary ACL
E) shell
F) namespace root
G) system control ACL
H) compiler
I) Dynamic-link library (DLL) files

J) E) and I)
K) A) and I)

Correct Answer

verifed

verified

What is the disadvantage of using compressed files on a server?

Correct Answer

verifed

verified

The disadvantage of compressed files is ...

View Answer

The hierarchical structure of DFS in the domain-based model is called the DFS ____.


A) topology
B) hierarchy
C) design
D) schema

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Match each term with the correct statement below. -A program that reads lines of program code in a source file and converts the code into machine-language instructions the computer can execute


A) Network Information Services
B) folder target
C) permissions
D) discretionary ACL
E) shell
F) namespace root
G) system control ACL
H) compiler
I) Dynamic-link library (DLL) files

J) H) and I)
K) D) and F)

Correct Answer

verifed

verified

When using SUA in ____,every process that is run is treated as a Windows process.


A) native mode
B) transitional mode
C) mixed mode
D) hybrid mode

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

The ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.


A) NTFS compress
B) hidden
C) NTFS encrypt
D) privacy

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer