Deck 17: Windows Resources on a Network
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 17: Windows Resources on a Network
1
What statement about controlling access to folders and files is accurate?
A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
A) permissions refer to the tasks an account is allowed to do in the system
B) account configuration should keep in mind the principle of highest privilege
C) rights are assigned to accounts
D) in Windows, accounts have no rights assignments until you configure them
C
2
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?
A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
A) Administrators
B) Guests
C) Backup Operators
D) Anonymous users
D
3
On the IE General tab you can block cookies.
False
4
What task can't be performed from the IE General tab?
A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
A) change the home page
B) disable file downloads
C) delete browsing history
D) manage the IE cache
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT true about Remote Desktop?
A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
A) the client can be running any version of Windows 7
B) by default all users can access Remote Desktop
C) Windows firewall can block Remote Desktop connections
D) you can start the remote desktop client using the mstsc command
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What statement about user accounts and groups is NOT true?
A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
A) a user account can belong to only one group at a time
B) by default, standard users accounts belong to the Users group
C) Guest group has limited rights on the system
D) Backup Operators group can restore any files regardless of the group's permissions to those files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
A) DNS server
B) VPN server
C) proxy server
D) Web server
A) DNS server
B) VPN server
C) proxy server
D) Web server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What type of permission should you set to control access to files and folders by local and network users?
A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
A) Sharing on FAT32 volumes only
B) NTFS on NTFS volumes only
C) NTFS on exFAT or NTFS volumes
D) Sharing on NTFS or exFAT volumes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What port is utilized by the Remote Desktop service?
A) 22
B) 23
C) 3389
D) 1729
A) 22
B) 23
C) 3389
D) 1729
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Regarding the use of Group Policy, what statement is NOT accurate?
A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
A) policies can be applied to a computer
B) all policies are applied before the logon screen appears
C) Group Policy is available in Windows Professional edition
D) you can set the QoS level for an application using Group Policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
To which group does Windows give access to folders that you create which are not part of your user profile?
A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
A) Power Users
B) Guests
C) Authenticated Users
D) Anonymous Users
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
) When utilizing both share and NTFS permissions, what statement is inaccurate?
A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
A) if both permissions are used, the least restrictive permission between the two applies
B) if NTFS permissions conflict between a user and group the least restrictive permission applies
C) when you copy a file, the file takes on the permissions of the destination folder
D) inherited permissions pass from parent folder to child file or folder
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
When all users on a network require the same access to all resources, what type of network model should you use?
A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
A) Domain
B) Homegroup
C) Workgroup
D) Guestgroup
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What command launches the Remote Desktop client for Windows?
A) rdp
B) rdesktop
C) vnc
D) mstsc
A) rdp
B) rdesktop
C) vnc
D) mstsc
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The default value of the security level in IE is Medium-high.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
) If you want to be able to power up a computer remotely, what feature should you use?
A) QoS
B) RDP
C) RemoteApp
D) Wake-on LAN
A) QoS
B) RDP
C) RemoteApp
D) Wake-on LAN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?
A) private data for each user should be kept in their c: \Users folder
B) all users have access to the folders in the c: \Users folder
C) c: \Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to c: \Users\Public
A) private data for each user should be kept in their c: \Users folder
B) all users have access to the folders in the c: \Users folder
C) c: \Users\Public should only be used by the Guest account
D) Only Administrators and Guest have access to c: \Users\Public
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) /sharedfolder/server
A) \\sharedfolder\server
B) \server\sharedfolder
C) \\server\sharedfolder
D) /sharedfolder/server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
) What are the two most popular web server applications?
A) Nginx
B) Tomcat
C) Apache
D) IIS
A) Nginx
B) Tomcat
C) Apache
D) IIS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
A) Administrators group
B) Backup Operators group
C) Power Users group
D) Guests group
A) Administrators group
B) Backup Operators group
C) Power Users group
D) Guests group
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
configuring a computer so that it will respond to network activity when the computer is in a sleep state
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
configuring a computer so that it will respond to network activity when the computer is in a sleep state
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a folder or file and can apply to local users and network users
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a folder or file and can apply to local users and network users
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
gives a user access to a Windows desktop from anywhere on the Internet
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
gives a user access to a Windows desktop from anywhere on the Internet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
A) to increase the security of the connection
B) to connect to secured websites on a corporate network VPN
C) to improve website performance
D) to surf anonymously
A) to increase the security of the connection
B) to connect to secured websites on a corporate network VPN
C) to improve website performance
D) to surf anonymously
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
When using Group Policy to configure QoS, what options are available? (Choose all that apply.)
A) the priority is a number from 0 and 63
B) outbound traffic can be throttled
C) you must choose a specific application to apply the policy
D) you can choose the protocol (either IP or ICMP) for the policy
A) the priority is a number from 0 and 63
B) outbound traffic can be throttled
C) you must choose a specific application to apply the policy
D) you can choose the protocol (either IP or ICMP) for the policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What two applications are an example of a mail server and a mail client application, respectively?
A) Exchange
B) Maverick
C) Outlook
D) Firefox
A) Exchange
B) Maverick
C) Outlook
D) Firefox
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)
A) Full control
B) Read
C) execute
D) Write
A) Full control
B) Read
C) execute
D) Write
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that can back up and restore any files on a Windows system regardless of access permissions to these files
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
a group that can back up and restore any files on a Windows system regardless of access permissions to these files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?
A) SMTP
B) PNRP
C) SNMP
D) LDAP
A) SMTP
B) PNRP
C) SNMP
D) LDAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
the folders that are shared by default on a network domain that administrator accounts can access
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
the folders that are shared by default on a network domain that administrator accounts can access
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
permissions assigned by Windows that are attained from a parent object
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
permissions assigned by Windows that are attained from a parent object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Matching
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
Match each item with a statement below.
a. administrative shares
b. inherited permissions
c. Backup Operators
d. NTFS permissions
e. Power Users
f. share permissions
g. gpedit.msc
h. Remote Desktop Connection
i. Wake on LAN
j. ActiveX control
. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Windows 10 features what new web browser, which is designed to replace Internet Explorer?
A) Microsoft Spartan
B) Microsoft Slim
C) Microsoft Edge
D) Microsoft Plus
A) Microsoft Spartan
B) Microsoft Slim
C) Microsoft Edge
D) Microsoft Plus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following are true about NTFS permissions? (Choose all that apply.)
A) inherited permissions override explicit permissions
B) when a subfolder is created, it is assigned the permissions of its parent folder
C) it is not possible to change the owner of a file
D) if NTFS permissions conflict locally, the more liberal permission applies
A) inherited permissions override explicit permissions
B) when a subfolder is created, it is assigned the permissions of its parent folder
C) it is not possible to change the owner of a file
D) if NTFS permissions conflict locally, the more liberal permission applies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the difference between rights and permissions on a Windows OS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How does Remote Assistance differ from Remote Desktop?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What is an authentication server, and how does Active Directory satisfy this role?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is the purpose of the Privacy tab in Windows Internet Explorer?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Define ActiveX control and explain why they might be unsafe.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe Workgroup sharing and how it compares to Homegroup sharing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
. Describe two of the four different ways a Remote Assistance session can be initiated.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Briefly describe Remote Desktop and its OS requirements.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is the principle of least privilege?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is a data source, and how is it used?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck