Looks like no one added any tags here yet for you.
1. Which of the following is a file-sharing protocol supported by Windows Server 2012/R2 File and Storage Services role? (Choose all that apply.)
a. SMB
b. FTP
c. TFTP
d. NFS
a. SMB
d. NFS
2. Which of the following is not a standard NTFS permission?
a. Read & execute
b. Change
c. Write
d. List folder contents
b. Change
3. In which of the following ways can a user become a file's owner? (Choose all that apply.)
a. Take ownership of the file.
b. Create the file.
c. Belong to the File Owner special identity.
d. Be assigned as the owner by an administrator.
a. Take ownership of the file.
b. Create the file.
d. Be assigned as the owner by an administrator.
4. Which SMB share option should you enable if you don't want users to see files they don't have at least Read permission to?
a. Offline files
b. Hidden shares
c. Branch Cache
d. Access-based enumeration
d. Access-based enumeration
5. Which administrative share does Active Directory use for replication?
a. NETLOGON
b. SYSVOL
c. Admin$
d. IPC$
b. SYSVOL
6. Which feature of Windows file sharing should you configure if you want users to be able to access their files securely from mobile devices without having to set up a VPN or configure the firewall?
a. Client-side caching
b. Offline files
c. Access-based enumeration
d. Work Folders
d. Work Folders
7. An expensive color laserjet printer is shared by a group of managers and some other employees. The managers complain that they often have to wait for their print jobs until other employees' large jobs have finished. Usually, the managers' print jobs are small and needed immediately, but other employees rarely need their print jobs in a hurry. What can you do to help solve this problem without buying additional equipment?
a. Create two printers and assign them different priorities and permissions.
b. Create another printer and configure a printer pool.
c. Buy another printer and configure permissions so that only managers can access it.
d. Make the printer available only during the hours managers are working.
a. Create two printers and assign them different priorities and permissions.
8. Which of the following is not true about disk quotas?
a. Users can be prevented from saving files on a volume.
b. An event can be generated when a user exceeds the quota limit.
c. Quotas can be overridden for groups.
d. Quotas can be set without denying disk space to users.
c. Quotas can be overridden for groups.
9. You have been getting quite a few calls with requests to restore files from a backup because the file was accidentally deleted from a share or because the user needed a previous version of a file that was overwritten. Restoring the files has become a burden, and sometimes you need to repeat the process several times until you find the version the user needs. What can you do to give users a way to access the files they need and reduce your administrative burden?
a. Adjust permissions on the shares so that users can't delete files except their own. Tell users to back up their own files to local backup media.
b. Enable shadow copies for each share.
c. Enable shadow copies on the volumes where the shares are hosted.
d. Give each user a backup program and an external hard drive.
c. Enable shadow copies on the volumes where the shares are hosted.
10. Which of the following is true about share and NTFS permissions?
a. NTFS permissions are applied only to local file access.
b. Share permissions take precedence over NTFS permissions.
c. Share permissions are applied to network and local file access.
d. NTFS permissions are applied to network access.
d. NTFS permissions are applied to network access.
11. A user needs to create files and make changes to file contents. Aside from the Read permission, what other permission should the user be granted without allowing more access than is necessary?
a. Write
b. Full control
c. Modify
d. Create
a. Write
12. The Tsmith user account has been granted the Read share permission. Tsmith is a member of the Sales group, which has been granted the Change share permission. In the shared folder's
Security tab, Sales has been granted Full control, and the Users group has been granted Read permission. Which of the following can Tsmith do in the share when accessing it from the network? (Choose all that apply.)
a. Change permissions on all files.
b. Delete all files.
c. Take ownership of all files.
d. Create files.
b. Delete all files.
d. Create files.
13. You're the administrator of a file server. Tom, who is on vacation, had created a file that Mary needs access to, but neither her account nor the Administrator account has permission to access the file. What is the best way to allow Mary to access the file?
As Administrator, take ownership of the file, grant Mary the permission she needs, and then give ownership back to Tom.
14. Which of the following can be used to create shares? (Choose all that apply.)
a. Advanced sharing
b. Disk Management
c. Simple file sharing
d. File and Storage Services
a. Advanced sharing
c. Simple file sharing
d. File and Storage Services
15. You need to prevent members of a group from accessing a subfolder of a folder the group does have access to. What's the best way to do this? (Choose two answers. Each correct answer represents part of the solution.)
a. Disable permission inheritance on the subfolder, and convert existing permissions.
b. Add each member of the group to the subfolder's DACL, and assign a Deny permission to each member.
c. Create a new group, and add members of the existing group to this new group. Add the new group to the subfolder's DACL with a Deny permission.
d. Remove the group from the subfolder's DACL.
a. Disable permission inheritance on the subfolder, and convert existing permissions.
d. Remove the group from the subfolder's DACL.
16. You need to create a share containing confidential information that only a select group of people should know about. You don't want this share to appear in users' network browse lists. What can you do that involves the least administrative effort and disruption?
a. Disable network discovery on all computers.
b. Disable network discovery on the computers of users who you don't want to see the share.
c. Put a $ character at the end of the share name.
d. Put a @ character at the beginning of the share name.
c. Put a $ character at the end of the share name.
17. What command can you put in a batch file to allow users to access the Public share on the
ServPub1 server, using the drive letter P?
a. net share P: \\ServPub1\Public
b. net use P: \\ServPub1\Public
c. share \\ServPub1\Public P:
d. share P: \\ServPub1\Public
b. net use P: \\ServPub1\Public
18. A folder can be shared only with a single name and single set of share permissions.
True or False?
18. False
19. You're seeing heavy use on one of your shared printers, and users often have to wait in line to get their print jobs. What printing feature can you use to best alleviate the problem?
a. Printer prioritization
b. Change availability hours
c. Change spooling options
d. Printer pooling
d. Printer pooling
20. You have installed a shared printer with the default permissions and want users to be able to manage their own documents in the print queue. What do you need to do?
a. Do nothing.
b. Assign the Everyone special identity the Manage documents permission.
c. Assign the Everyone special identity the Manage printers permission.
d. Add Domain Users to the Printer Operators group.
a. Do nothing.