Deck 17: Windows Resources on a Network
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
العب
ملء الشاشة (f)
Deck 17: Windows Resources on a Network
1
What statement about controlling access to folders and files is accurate?
A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
C
2
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?
A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
D
3
On the IE General tab you can block cookies.
False
4
What task can't be performed from the IE General tab?
A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT true about Remote Desktop?
A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What statement about user accounts and groups is NOT true?
A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
A) DNS server
B) VPN server
C) proxy server
D) Web server
A) DNS server
B) VPN server
C) proxy server
D) Web server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What type of permission should you set to control access to files and folders by local and network users?
A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What port is utilized by the Remote Desktop service?
A) 22
B) 23
C) 3389
D) 1729
A) 22
B) 23
C) 3389
D) 1729
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Regarding the use of Group Policy, what statement is NOT accurate?
A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
To which group does Windows give access to folders that you create which are not part of your user profile?
A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
) When utilizing both share and NTFS permissions, what statement is inaccurate?
A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
When all users on a network require the same access to all resources, what type of network model should you use?
A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
What command launches the Remote Desktop client for Windows?
A) rdp
B) rdesktop
C) vnc
D) mstsc
A) rdp
B) rdesktop
C) vnc
D) mstsc
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The default value of the security level in IE is Medium-high.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
) If you want to be able to power up a computer remotely, what feature should you use?
A) QoS
B) RDP
C) RemoteApp
D) Wake-on LAN
A) QoS
B) RDP
C) RemoteApp
D) Wake-on LAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?
A) private data for each user should be kept in their c: \Users folder
B) all users have access to the folders in the c: \Users folder
C) c: \Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to c: \Users\Public
A) private data for each user should be kept in their c: \Users folder
B) all users have access to the folders in the c: \Users folder
C) c: \Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to c: \Users\Public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) /sharedfolder/server
A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) /sharedfolder/server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
) What are the two most popular web server applications?
A) Nginx
B) Tomcat
C) Apache
D) IIS
A) Nginx
B) Tomcat
C) Apache
D) IIS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
A) Administrators group
B) Backup Operators group
C) Power Users group
D) Guests group
A) Administrators group
B) Backup Operators group
C) Power Users group
D) Guests group
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
configuring a computer so that it will respond to network activity when the computer is in a sleep state
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
configuring a computer so that it will respond to network activity when the computer is in a sleep state
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a folder or file and can apply to local users and network users
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a folder or file and can apply to local users and network users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
gives a user access to a Windows desktop from anywhere on the Internet
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
gives a user access to a Windows desktop from anywhere on the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
A) to increase the security of the connection
B) to connect to secured websites on a corporate network VPN
C) to improve website performance
D) to surf anonymously
A) to increase the security of the connection
B) to connect to secured websites on a corporate network VPN
C) to improve website performance
D) to surf anonymously
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
When using Group Policy to configure QoS, what options are available? (Choose all that apply.)
A) the priority is a number from 0 and 63
B) outbound traffic can be throttled
C) you must choose a specific application to apply the policy
D) you can choose the protocol (either IP or ICMP) for the policy
A) the priority is a number from 0 and 63
B) outbound traffic can be throttled
C) you must choose a specific application to apply the policy
D) you can choose the protocol (either IP or ICMP) for the policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What two applications are an example of a mail server and a mail client application, respectively?
A) Exchange
B) Maverick
C) Outlook
D) Firefox
A) Exchange
B) Maverick
C) Outlook
D) Firefox
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)
A) Full control
B) Read
C) execute
D) Write
A) Full control
B) Read
C) execute
D) Write
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that can back up and restore any files on a Windows system regardless of access permissions to these files
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that can back up and restore any files on a Windows system regardless of access permissions to these files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?
A) SMTP
B) PNRP
C) SNMP
D) LDAP
A) SMTP
B) PNRP
C) SNMP
D) LDAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
the folders that are shared by default on a network domain that administrator accounts can access
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
the folders that are shared by default on a network domain that administrator accounts can access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
permissions assigned by Windows that are attained from a parent object
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
permissions assigned by Windows that are attained from a parent object
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Windows 10 features what new web browser, which is designed to replace Internet Explorer?
A) Microsoft Spartan
B) Microsoft Slim
C) Microsoft Edge
D) Microsoft Plus
A) Microsoft Spartan
B) Microsoft Slim
C) Microsoft Edge
D) Microsoft Plus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following are true about NTFS permissions? (Choose all that apply.)
A) inherited permissions override explicit permissions
B) when a subfolder is created, it is assigned the permissions of its parent folder
C) it is not possible to change the owner of a file
D) if NTFS permissions conflict locally, the more liberal permission applies
A) inherited permissions override explicit permissions
B) when a subfolder is created, it is assigned the permissions of its parent folder
C) it is not possible to change the owner of a file
D) if NTFS permissions conflict locally, the more liberal permission applies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe the difference between rights and permissions on a Windows OS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
How does Remote Assistance differ from Remote Desktop?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What is an authentication server, and how does Active Directory satisfy this role?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is the purpose of the Privacy tab in Windows Internet Explorer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Define ActiveX control and explain why they might be unsafe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe Workgroup sharing and how it compares to Homegroup sharing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
. Describe two of the four different ways a Remote Assistance session can be initiated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Briefly describe Remote Desktop and its OS requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is the principle of least privilege?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is a data source, and how is it used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck