Lesson 6: File and Print Services Flashcards Preview

My Exam Review 2014 > Lesson 6: File and Print Services > Flashcards

Flashcards in Lesson 6: File and Print Services Deck (50):
1

1. What is used to grant access to objects such as NTFS files or Active Directory user accounts?
a) right
b) permission
c) certificate
d) template

Answer: b) permission

Difficulty: Easy
Section Reference: Introducing NTFS
Explanation: A permission is defined as the type of access granted to objects such as NTFS files and folders.

2

2. Permissions assigned to an NTFS file are stored in a ______.
a) certificate
b) template
c) ACL
d) group

Answer: c) ACL

Difficulty: Medium
Section Reference: Introducing NTFS
Explanation: When files and folders are created on an NTFS volume, a security descriptor known as an Access Control List (ACL) is created.

3

3. What is the minimum permission needed to change the attributes of a file?
a) Full Control
b) Modify
c) Read & Execute
d) Write

Answer: d) Write

Difficulty: Medium
Section Reference: Setting NTFS Permissions
Explanation: The Write permission allows the identity to write to a file, append to the file, and read or change the file’s attributes.

4

4. What is the minimum permission needed to take ownership of a file or folder?
a) Full Control
b) Modify
c) Read & Execute
d) Write

Answer: a) Full Control

Difficulty: Medium
Section Reference: Setting NTFS Permissions
Explanation: The Full Control permission allows you to read, write, modify, and execute files in a folder; change attributes and permissions; and take ownership of a folder or the files within it.

5

5. What permissions are directly assigned to a file or folder?
a) explicit permissions
b) inherited permissions
c) assigned permissions
d) booted permissions

Answer: a) explicit permissions

Difficulty: Easy
Section Reference: Looking at Effective NTFS Permissions
Explanation: Two types of permissions are used in NTFS. Explicit permissions are those granted directly to a file or folder.

6

6. What permission always wins out?
a) Explicit Allow Full Control
b) Explicit Deny Full Control
c) Inherited Allow Full Control
d) Inherited Deny Full Control

Answer: b) Explicit Deny Full Control

Difficulty: Easy
Section Reference: Looking at Effective NTFS Permissions
Explanation: Besides granting the Allow permissions, you can also grant the Deny permission. The Deny permission always overrides other permissions that have been granted, including when a user or group has been given Full Control.

7

7. What happens to a file’s permissions if you copy it from one volume to another?
a) The file will have the permissions as before.
b) The file will acquire the permissions of the target folder.
c) The file will acquire the permission of the source folder.
d) The file will have no permissions.

Answer: b) The file will acquire the permissions of the target folder.

Difficulty: Medium
Section Reference: Copying and Moving Files
Explanation: If a folder or file is copied, the new folder or file will automatically acquire the permissions of the drive or folder to which it is being copied.

8

8. What happens to those permissions of a file if you move to a folder within the same volume?
a) The file will have the permissions as before.
b) The file will acquire the permissions of the target folder.
c) The file will acquire the permission of the source folder.
d) The file will have no permissions.

Answer: a) The file will have the permissions as before.

Difficulty: Medium
Section Reference: Copying and Moving Files
Explanation: If a folder or file is moved within the same volume, the folder or file will retain the same permissions that were already assigned.

9

9. What technology is used to encrypt an individual file or folder?
a) DFS
b) EFS
c) CIFS
d) SMB

Answer: b) EFS

Difficulty: Easy
Section Reference: Encrypting Files with NTFS
Explanation: Encrypting File System (EFS) is a core file encryption technology used to store encrypted files on NTFS file system volumes. Encrypted files cannot be used unless a user has access to the keys required to decrypt the information. After a file is encrypted, you do not have to manually decrypt it before you can use it.

10

10. What is the minimum share permission needed to modify files and its attributes?
a) Full Control
b) Change
c) Write
d) Read

Answer: b) Change

Difficulty: Easy
Section Reference: Sharing Drives and Folders
Explanation: The Change permission give users the Read permission and the additional capability to create files and subfolders, modify files, change attributes on files and subfolders, and delete files and subfolders.

11

11. What shares are usually hidden and are used for administrative purposes?
a) denied view share
b) explicit share
c) magic share
d) administrative share

Answer: d) administrative share

Difficulty: Easy
Section Reference: Looking at Special and Administrative Shares
Explanation: An administrative share is a shared folder typically used for administrative purposes and usually hidden. To make any shared folder or drive hidden, the share name must have a $ at the end of it.

12

12. By default, what port does a TCP/IP printer port use?
a) 443
b) 8080
c) 3128
d) 9100

Answer: d) 9100

Difficulty: Medium
Section Reference: Installing Printers
Explanation: A TCP/IP printer port is used to connect a printer directly to a network. It uses host port 9100 to communicate.

13

13. What is the minimum permission needed to print to a printer and to manage your own print jobs?
a) Print
b) Manage this Printer
c) Manage Documents
d) Full Control

Answer: a) Print

Difficulty: Medium
Section Reference: Setting Printer Permissions
Explanation: The Print permission allows users to send documents to the printer. Users automatically have the permission to manage their print jobs.

14

14. What port does Internet Printing use?
a) 80
b) 9100
c) 443
d) 1801

Answer: a) 80

Difficulty: Medium
Section Reference: Configuring Internet Printing
Explanation: When you print using Internet Printing, you are printing using HTTP commands. Therefore, you are using port 80.

15

15. What is used to keep track of what a user does on a system?
a) authentication
b) auditing
c) permissions
d) user rights

Answer: b) auditing

Difficulty: Easy
Section Reference: Enabling Auditing
Explanation: Security can be divided into three areas:
• Authentication is used to prove the identity of a user.
• Authorization gives access to the user that was authenticated.
• To complete the security picture, you need to enable auditing so that you can have a record of the users who have logged in and what the user accessed or tried to access.

16

16. How do you enable auditing on a Windows server?
a) Windows Explorer
b) Group policies
c) MS Configuration
d) Registry editor

Answer: b) Group policies

Difficulty: Medium
Section Reference: Enabling Auditing
Explanation: Auditing is not enabled by default. To enable auditing, you specify what types of system events to audit using Group Policy or the local security policy (Security Settings\Local Policies\Audit Policy).

17

Fill in the Blank
17. A(n) ________ permission is one that is granted on a higher folder level that flows into the folders below it.

Answer: inherited

Difficulty: Medium
Section Reference: Looking at Effective NTFS Permissions
Explanation: Inherited permissions are granted to a folder (parent object or container) and flow into child objects (subfolders or files inside the parent folder). When a folder is assigned permissions, by default, the permissions apply to both the folder and its subfolders and files.

18

Fill in the Blank
18. When you print a document using Microsoft Word, the document is sent to the printer as a _________.

Answer: print job

Difficulty: Medium
Section Reference: Looking at Printers
Explanation: When you print a document in Windows, the printer uses the logical printer and printer driver to format the document into a form that is understood by the printer, including rendering it into a printer language such as HP’s Printer Control Language or Adobe’s PostScript to create an enhanced metafile (EMF). The print job is then sent to the local spooler, which provides background printing, allowing you to print and queue additional documents while your first document is being printed.

19

Short Answer
19. What is the default path for the print spool folder?

Answer: C:\Windows\System32\Spool\Printers

Difficulty: Hard
Section Reference: Managing the Print Jobs
Explanation: When the print device is available, the spooler retrieves the next print job and sends it to the print device. By default, the spool folder is located at C:\Windows\System32\Spool\Printers. If you have a server that handles a large number of print jobs or several large print jobs, make sure the drive where the spool folder is has sufficient disk space.

20

Short Answer
20. What do you call permissions that that actually granted to a user when a user logs on and accesses the particular file or folder?

Answer: effective permissions

Difficulty: Medium
Section Reference: Looking at Effective NTFS Permissions
Explanation: Because users can be members of several groups, they can possibly have several sets of explicit permissions for a particular folder or file. When this occurs, the permissions are combined to form the effective permissions, which are the actual permissions when logging in and accessing a file or folder. These consist of explicit permissions plus any inherited permissions.

21

Short Answer
21. What do you do with a folder that you do not have permissions to and you need to access immediately?

Answer: Take ownership of the folder.

Difficulty: Medium
Section Reference: Looking at Folder and File Owners
Explanation: An object’s owner controls how permissions are set on the object and to whom permissions are granted. If for some reason you have been denied access to a file or folder, you need to reset the permissions by taking ownership of the file or folder and modifying the permissions. All administrators automatically have the Take Ownership permission of all NTFS objects.

22

Short Answer
22. What is the recommended share permission and NTFS permission you should assign to a folder that you shared?

Answer: The Allow Full Control share permission should be assigned to the folder for Everyone. Then you should control access using NTFS permissions.

Difficulty: Hard
Section Reference: Sharing Drives and Folders
Explanation: As with NTFS, you can allow or deny each share permission. To simplify managing share and NTFS permissions, Microsoft recommends giving Everyone Full Control at the share level, and then controlling access via NTFS permissions.

23

Short Answer
23. What do you call a group of printers that act as one so that it can handle a large volume of printing?

Answer: printer pool

Difficulty: Medium
Section Reference: Installing Printers
Explanation: Network printers are usually used by more than one user. If you have a high volume of print jobs, the printer can become congested and users will have to wait for the documents to print. Either you can purchase a faster printer or you can create a group of printers called a printer pool that acts as a single virtual printer with a single print queue. Users print to a single printer, and the print jobs are distributed among the printers within the pool.

24

1. To print to a printer, you need the ______ permission.

Print

25

2. The NTFS special permission that allows you to move through a folder to reach lower files or folders is ______.

Traverse folder

26

3. The Windows component that allows you to manage shares and NTFS permissions is ______.

Windows Explorer

27

4. Permissions that flow from a parent object to a child object are called ______ .

Inherited permissions

28

5. The ______ are the actual permissions when a user logs in and accesses a file or folder.

Effective permissions

29

6. The encrypting technology included in NTFS is ______.

EFS

30

7. For Windows Server 2008 to be seen on the network, you must enable ______.

Network discovery

31

8. A(n) ______ share is not seen when browsed.

Administrative

32

9. When some has removed all users from a folder, you can ______ of the folder.

Take ownership

33

10. The default location of the spool folder is ______.

C:\Windows\System32\Spool\Printers.

34

1. What is the standard NTFS permission needed to change attributes of a NTFS folder?
a. Write
b. Read
c. Modify
d. Fully Control

a. Write

35

2. Which permission takes precedence?
a. Explicit deny
b. Explicit allow
c. Inherited deny
d. Inherited allow

a. Explicit deny

36

3. Which of the following is NOT a share permission?
a. Full Control
b. Write
c. Change
d. Read

b. Write

37

4. TCP/IP printers use port _______
a. 443
b. 23
c. 9100
d. 3000

c. 9100

38

5. What is a single virtual printer with a single print queue that consist of two or more printers?
a. Print collection
b. Direct printers
c. Printer group
d. Printer pool

d. Printer pool

39

6. What symbol makes an administrative share not seen when browsed?
a. #
b. *
c. !
d. $

d. $

40

7. When enabling Internet Printing, you need to install ___________.
a. DFS
b. IIS
c. GPO Manager
d. Task Manager

b. IIS

41

8. What is the minimum share permission that allows you to change file and folder permissions?
a. Full Control
b. Change
c. Read
d. Manage

a. Full Control

42

9. When you copy files from one folder to another folder within the same volume, you get the ____________.
a. Same permissions as the source
b. Same permissions as the target
c. No permissions are set
d. Everyone has full permission

b. Same permissions as the target

43

10. You are an administrator on a computer. Unfortunately, there is a folder that you cannot access because you have do not have permissions to the folder. What can you do?
a. Take ownership of the folder.
b. Delete the folder and recreate it.
c. Turn off the deny attribute.
d. Grant the allow everyone full permission.

a. Take ownership of the folder.

44

True / False
1. If full control is assigned to a parent object for a user, the full control permission will overwrite explicit permissions at a child object.

True

45

True / False
2. To see who accesses a file over time, you only have to turn on object access audit events.

False

46

True / False
3. When you are looking at NTFS permissions that are grayed out, it means that you don’t have the permissions needed to modify the NTFS permissions.

False

47

True / False
4. You can encrypt and compress a file within NTFS at the same time.

False

48

True / False
5. When calculating the NTFS and share permissions, you would apply the more restrictive

True

49

Competency Assessment
Scenario 6-1: Creating a Shared Folder
You have a Data folder that you need to share so that all managers have access and can make changes, but no one else can access it. What should you do to set this folder up?


Create a Manager group with all of the managers as members. You should create a Data folder. Share the Data folder. Change the Everyone to Allow Full Control share permission. Then grant the Allow Modify NTFS permissions to the Managers group.

50

Competency Assessment
Scenario 6-2: Auditing the Managers folder
You just created a Data folder for your Managers and you need to verify that it is not getting accessed by anyone who is not supposed to access the files and if someone deletes or makes changes to a system. What should you do?


You need set up auditing. You must first enable object access auditing using group policies or local security policies for the computer where the folder is located. Then you need to enable Full Control successful and Failed access. You will then occasionally search the security logs in the event viewer from time to time.