Deck 17: Windows Resources on a Network

Full screen (f)
exit full mode
Question
Which of the following is true about which folders to use to hold shared data when working with a workgroup?

A) private data for each user should be kept in their C : \ Users folder
B) all users have access to the folders in the C : \ Users folder
C) C : \ Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to C : \ Users\Public
Use Space or
up arrow
down arrow
to flip the card.
Question
To which group does Windows give access to folders that you create which are not part of your user profile?

A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
Question
Which is NOT true about using share and NTFS permissions?

A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
Question
When all users on a network require the same access to all resources, what type of network model should you use?

A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
Question
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Question
Which of the following is NOT true about user accounts and groups?

A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
Question
On the IE General tab you can block cookies.
Question
Which type of permission should you set to control access to files and folders by local and network users?

A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
Question
Which built-in group might Windows automatically assign a user account to when determining its permissions?

A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
Question
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) \sharedfolder\server
Question
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.
Question
Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.

A) DNS server
B) VPN server
C) proxy server
D) Web server
Question
Which of the following is a task you CAN'T do from the IE General tab?

A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
Question
Which statements is true about controlling access to folders and files?

A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
Question
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
Question
Which of the following is NOT true about Group Policy?

A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
Question
If you want to be able to power up a computer remotely, what feature should you use?

A) QoS
B) RDP
C) RemoteApp
D) WoL
Question
Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.

A) Full control
B) Read & execute
C) Full control, Modify
D) Write, Read
Question
The default value of the security level in IE is Medium-high.
Question
Which of the following is NOT true about Remote Desktop?

A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
Question
Use the command Ipconfig \________________ to show the DNS resolver cache.
Question
Match between columns
Premises:
Responses:
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
Question
What is the principle of least privilege?
Question
To map a drive from the command line use the command net ___________ drive : \\ server \ share.
Question
To find the host name of a computer when you have its IP address, use a ___________ lookup.
Question
What is WoL and why would you use it?
Question
What does the net view \\computername command do and how can you use to troubleshoot network connectivity?
Question
Define ActiveX control and explain why they might be unsafe.
Question
Describe the difference between rights and permissions on a Windows OS.
Question
Describe Workgroup sharing and how it compares to Homegroup sharing.
Question
Describe what Ping does and why you might use it.
Question
The ________________ command tests connectivity by sending an echo request to a remote computer.
Question
What is a local share?
Question
When troubleshooting a live network cable, what should you use?

A) a cable tester
B) a DVM
C) a loopback plug
D) an LED indicator
Question
What does tracert do and how can it be useful?
Question
Briefly describe Remote Desktop and its OS requirements.
Question
A packet is assigned a(n) _______________, which is the number of hop counts it can make before a router drops the packet and sends and ICMP message back to the sender.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/37
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Windows Resources on a Network
1
Which of the following is true about which folders to use to hold shared data when working with a workgroup?

A) private data for each user should be kept in their C : \ Users folder
B) all users have access to the folders in the C : \ Users folder
C) C : \ Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to C : \ Users\Public
A
2
To which group does Windows give access to folders that you create which are not part of your user profile?

A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
C
3
Which is NOT true about using share and NTFS permissions?

A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
A
4
When all users on a network require the same access to all resources, what type of network model should you use?

A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
5
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT true about user accounts and groups?

A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
7
On the IE General tab you can block cookies.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
8
Which type of permission should you set to control access to files and folders by local and network users?

A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
9
Which built-in group might Windows automatically assign a user account to when determining its permissions?

A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
10
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) \sharedfolder\server
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
11
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.

A) DNS server
B) VPN server
C) proxy server
D) Web server
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is a task you CAN'T do from the IE General tab?

A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
14
Which statements is true about controlling access to folders and files?

A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
15
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT true about Group Policy?

A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
17
If you want to be able to power up a computer remotely, what feature should you use?

A) QoS
B) RDP
C) RemoteApp
D) WoL
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
18
Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.

A) Full control
B) Read & execute
C) Full control, Modify
D) Write, Read
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
19
The default value of the security level in IE is Medium-high.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is NOT true about Remote Desktop?

A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
21
Use the command Ipconfig \________________ to show the DNS resolver cache.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
Premises:
Responses:
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
netstat
nbtstat
inherited permissions
share permissions
tracert
wireless locator
nslookup
Wake on LAN
administrative shares
NTFS permissions
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
23
What is the principle of least privilege?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
24
To map a drive from the command line use the command net ___________ drive : \\ server \ share.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
25
To find the host name of a computer when you have its IP address, use a ___________ lookup.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
26
What is WoL and why would you use it?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
27
What does the net view \\computername command do and how can you use to troubleshoot network connectivity?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
28
Define ActiveX control and explain why they might be unsafe.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
29
Describe the difference between rights and permissions on a Windows OS.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
30
Describe Workgroup sharing and how it compares to Homegroup sharing.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
31
Describe what Ping does and why you might use it.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
32
The ________________ command tests connectivity by sending an echo request to a remote computer.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
33
What is a local share?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
34
When troubleshooting a live network cable, what should you use?

A) a cable tester
B) a DVM
C) a loopback plug
D) an LED indicator
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
35
What does tracert do and how can it be useful?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
36
Briefly describe Remote Desktop and its OS requirements.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
37
A packet is assigned a(n) _______________, which is the number of hop counts it can make before a router drops the packet and sends and ICMP message back to the sender.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 37 flashcards in this deck.