Deck 17: Windows Resources on a Network

Full screen (f)
exit full mode
Question
 What statement about controlling access to folders and files is accurate?

A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
Use Space or
up arrow
down arrow
to flip the card.
Question
 When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?

A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
Question
 On the IE General tab you can block cookies.
Question
 What task can't be performed from the IE General tab?

A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
Question
 Which of the following is NOT true about Remote Desktop?

A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
Question
 What statement about user accounts and groups is NOT true?

A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
Question
 What kind of a computer intercepts requests that a browser makes of a server and can cache received content?

A) DNS server
B) VPN server
C) proxy server
D) Web server
Question
 When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
Question
 What type of permission should you set to control access to files and folders by local and network users?

A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
Question
 What port is utilized by the Remote Desktop service?

A) 22
B) 23
C) 3389
D) 1729
Question
 Regarding the use of Group Policy, what statement is NOT accurate?

A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
Question
 If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Question
 To which group does Windows give access to folders that you create which are not part of your user profile?

A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
Question
 To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.
Question
) When utilizing both share and NTFS permissions, what statement is inaccurate?

A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
Question
 When all users on a network require the same access to all resources, what type of network model should you use?

A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
Question
 What command launches the Remote Desktop client for Windows?

A) rdp
B) rdesktop
C) vnc
D) mstsc
Question
 The default value of the security level in IE is Medium-high.
Question
) If you want to be able to power up a computer remotely, what feature should you use?

A) QoS
B) RDP
C) RemoteApp
D) Wake-on LAN
Question
 When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?

A) private data for each user should be kept in their c: \Users folder
B) all users have access to the folders in the c: \Users folder
C) c: \Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to c: \Users\Public
Question
 When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) /sharedfolder/server
Question
) What are the two most popular web server applications?

A) Nginx
B) Tomcat
C) Apache
D) IIS
Question
 User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

A) Administrators group
B) Backup Operators group
C) Power Users group
D) Guests group
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 configuring a computer so that it will respond to network activity when the computer is in a sleep state
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a method to control access to a folder or file and can apply to local users and network users
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 gives a user access to a Windows desktop from anywhere on the Internet
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
Question
 What is a valid reason for wanting to configure a proxy server in Internet Explorer?

A) to increase the security of the connection
B) to connect to secured websites on a corporate network VPN
C) to improve website performance
D) to surf anonymously
Question
 When using Group Policy to configure QoS, what options are available? (Choose all that apply.)

A) the priority is a number from 0 and 63
B) outbound traffic can be throttled
C) you must choose a specific application to apply the policy
D) you can choose the protocol (either IP or ICMP) for the policy
Question
 What two applications are an example of a mail server and a mail client application, respectively?

A) Exchange
B) Maverick
C) Outlook
D) Firefox
Question
 What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)

A) Full control
B) Read
C) execute
D) Write
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a group that can back up and restore any files on a Windows system regardless of access permissions to these files
Question
 What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?

A) SMTP
B) PNRP
C) SNMP
D) LDAP
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 the folders that are shared by default on a network domain that administrator accounts can access
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 permissions assigned by Windows that are attained from a parent object
Question
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
Question
 Windows 10 features what new web browser, which is designed to replace Internet Explorer?

A) Microsoft Spartan
B) Microsoft Slim
C) Microsoft Edge
D) Microsoft Plus
Question
 Which of the following are true about NTFS permissions? (Choose all that apply.)

A) inherited permissions override explicit permissions
B) when a subfolder is created, it is assigned the permissions of its parent folder
C) it is not possible to change the owner of a file
D) if NTFS permissions conflict locally, the more liberal permission applies
Question
 Describe the difference between rights and permissions on a Windows OS.
Question
 How does Remote Assistance differ from Remote Desktop?
Question
 What is an authentication server, and how does Active Directory satisfy this role?
Question
 What is the purpose of the Privacy tab in Windows Internet Explorer?
Question
 Define ActiveX control and explain why they might be unsafe.
Question
 Describe Workgroup sharing and how it compares to Homegroup sharing.
Question
. Describe two of the four different ways a Remote Assistance session can be initiated.
Question
 Briefly describe Remote Desktop and its OS requirements.
Question
 What is the principle of least privilege?
Question
 What is a data source, and how is it used?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Windows Resources on a Network
1
 What statement about controlling access to folders and files is accurate?

A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
C
2
 When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?

A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
D
3
 On the IE General tab you can block cookies.
False
4
 What task can't be performed from the IE General tab?

A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
 Which of the following is NOT true about Remote Desktop?

A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
 What statement about user accounts and groups is NOT true?

A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
 What kind of a computer intercepts requests that a browser makes of a server and can cache received content?

A) DNS server
B) VPN server
C) proxy server
D) Web server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
 When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
 What type of permission should you set to control access to files and folders by local and network users?

A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
 What port is utilized by the Remote Desktop service?

A) 22
B) 23
C) 3389
D) 1729
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
 Regarding the use of Group Policy, what statement is NOT accurate?

A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
 If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
 To which group does Windows give access to folders that you create which are not part of your user profile?

A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
 To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
) When utilizing both share and NTFS permissions, what statement is inaccurate?

A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
 When all users on a network require the same access to all resources, what type of network model should you use?

A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
 What command launches the Remote Desktop client for Windows?

A) rdp
B) rdesktop
C) vnc
D) mstsc
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
 The default value of the security level in IE is Medium-high.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
) If you want to be able to power up a computer remotely, what feature should you use?

A) QoS
B) RDP
C) RemoteApp
D) Wake-on LAN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
 When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?

A) private data for each user should be kept in their c: \Users folder
B) all users have access to the folders in the c: \Users folder
C) c: \Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to c: \Users\Public
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
 When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) /sharedfolder/server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
) What are the two most popular web server applications?

A) Nginx
B) Tomcat
C) Apache
D) IIS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
 User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

A) Administrators group
B) Backup Operators group
C) Power Users group
D) Guests group
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 configuring a computer so that it will respond to network activity when the computer is in a sleep state
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a method to control access to a folder or file and can apply to local users and network users
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 gives a user access to a Windows desktop from anywhere on the Internet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
 What is a valid reason for wanting to configure a proxy server in Internet Explorer?

A) to increase the security of the connection
B) to connect to secured websites on a corporate network VPN
C) to improve website performance
D) to surf anonymously
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
 When using Group Policy to configure QoS, what options are available? (Choose all that apply.)

A) the priority is a number from 0 and 63
B) outbound traffic can be throttled
C) you must choose a specific application to apply the policy
D) you can choose the protocol (either IP or ICMP) for the policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
 What two applications are an example of a mail server and a mail client application, respectively?

A) Exchange
B) Maverick
C) Outlook
D) Firefox
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
 What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)

A) Full control
B) Read
C) execute
D) Write
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 a group that can back up and restore any files on a Windows system regardless of access permissions to these files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
 What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?

A) SMTP
B) PNRP
C) SNMP
D) LDAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 the folders that are shared by default on a network domain that administrator accounts can access
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
 permissions assigned by Windows that are attained from a parent object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
 Windows 10 features what new web browser, which is designed to replace Internet Explorer?

A) Microsoft Spartan
B) Microsoft Slim
C) Microsoft Edge
D) Microsoft Plus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
 Which of the following are true about NTFS permissions? (Choose all that apply.)

A) inherited permissions override explicit permissions
B) when a subfolder is created, it is assigned the permissions of its parent folder
C) it is not possible to change the owner of a file
D) if NTFS permissions conflict locally, the more liberal permission applies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
 Describe the difference between rights and permissions on a Windows OS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
 How does Remote Assistance differ from Remote Desktop?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
 What is an authentication server, and how does Active Directory satisfy this role?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
 What is the purpose of the Privacy tab in Windows Internet Explorer?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
 Define ActiveX control and explain why they might be unsafe.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
 Describe Workgroup sharing and how it compares to Homegroup sharing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
. Describe two of the four different ways a Remote Assistance session can be initiated.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
 Briefly describe Remote Desktop and its OS requirements.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
 What is the principle of least privilege?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
 What is a data source, and how is it used?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.