What is the name of the hidden administrative share

Assignment Help Management Information Sys
Reference no: EM131035231

Question 1. The Windows Server2003/2008 edition best suited to a particular environment depends upon the performance, scalability, and reliability requirements of an organization, along with the intended purpose of a particular system.

True
False

Question 2. The functional level of a domain can be raised in Active Directory Users and Computers by right-clicking the domain and clicking Raise Domain Functional Level.

True
False

Question 3. Checking the Block Policy inheritance option under the Group Policy tab for container properties means that all higher-level policies will be blocked for other containers.

True
False

Question 4. Windows Server2003/2008 includes two main utilities that allow you to view the effective Group Policy settings that have been applied to a particular user or computer.

True
False

Question 5. A domain is a logical group of computers characterized by centralized authentication and administration.

True
False

Question 6. The accidental deletion of user data files is a far more common occurrence than a full server failure.

True
False

Question 7. A domain controller should always run on a dedicated server.

True
False

Question 8. The Read shared folder permission allows the abilities to add and delete files in a folder as well as read and edit the contents of existing files.

True
False

Question 9. By default, any user can view the contents of the application and system log.

True
False

Question 10. On Pentium computers, page size is 4 KB.

True
False

Question 11. The DSRM command is used only when deleting a single object from memory.

True
False

Question 12. When basic disks are used, the operating system boots from the primary partitions.

True
False

Question 13. Roaming user profiles cannot be configured as mandatory profiles.

True
False

Question 14. Local print devices are connected directly to the network on which the workstation resides.

True
False

Question 15. The "Use custom share and folder permissions" option for shared folders allows both share and NTFS permissions to be defined manually.

True
False

Question 16. Enforcing even very tight GPO restrictions will not interfere with user productivity.

True
False

Question 17. A differential backup reduces the overall size of backup jobs to the same degree as an incremental backup.

True
False

Question 18. Active Directory Users and Computers allows you to configure the properties of a single user object at a time.

True
False

Question 19. The read-only file attribute is available regardless of the file system in use.

True
False

Question 20. Windows Server2003/2008 allows an administrator to further secure files by encrypting their contents.

True
False

Question 21. The incremental backup type is very similar to a normal backup.

True
False

Question 22. The first steps in a general strategy for implementing groups in an environment is to create user accounts and organize them into domain local groups.

True
False

Question 23. Windows Server2003/2008 supports three types of file and folder permissions.

True
False

Question  24. The Add Printer Wizard allows you to specify whether the printer should be shared to provide network access.

True
False

Question 25. The DSMOVE command allows you to move objects between domains.

True
False

Question 26. A domain local group can be assigned rights and permissions to any resource within the same domain only.

True
False

Question 27. The "Show hidden files and folders" option displayed under the View tab of Windows Explorer is selected by default.

True
False

Question 28. The Log On To button in the Account tab of the properties of a user account allows an administrator to configure the days and hours when this user is allowed to log on to the network.

True
False

Question 29. Microsoft's digital signature on a device driver ensures that the driver has been verified to work with Windows Server2003/2008.

True
False

Question 30. All server activities rely on disk storage.

True
False

Question 31. Windows Server2003/2008 supports the ability to import dynamic disks from all of the following operating systems EXCEPT

Windows XP.
Windows 98.
Windows 2000.
Windows Server2003/2008.

Question 32. To prevent any of the higher-level settings from being applied to a particular child container, you check the ____ check box on the Group Policy tab for the container properties.

No Child settings
Block Child settings
Block Policy inheritance
Set High-Level Only

Question 33. ____ reduces the amount of disk space that folders and files take up, thus allowing more data to be stored on the volume.

Partitioning
Reduction
Encryption
Compression

Question 34. When a GPO is created, its content is stored in ____ different locations on the server.

2
4
8
16

Question 35. The Windows Server2003/2008 file system FAT32 supports partitions up to ____ in size.

2 GB
16 GB
2 TB
16 TB

Question 36. Under the Kerberos v5 authentication protocol, when a user tries to access a network resource, it presents a TGT to the KDC and requests a(n) ____ for the server on which the resource resides.

challenge
ticket-granting ticket
access ticket
service ticket

Question 37. After a GPO has been created, it needs to be ____ to control specific user or computer settings that should be applied.

initialized
edited
encrypted
fixed

Question 38. Which of the following commands may be used to manipulate the system attribute of a folder?

DIR
CIPHER
ATTRIB
COMPACT

Question 39. IPP can provide users with a method to easily gain access to remote printers using the standard ____ protocol.

WSH
HTTP
IIS
IPPA

Question 40. Windows Server2003/2008 supports ____ different driver signing options.

1
2
3
4

Question 41. Which of the following tools is used to monitor shared folders on a Windows Server2003/2008 network?

Share a Folder Wizard
Computer Management
Windows Explorer
Folder Monitor

Question 42. Which of the following tools could be used to view the location and settings of your server's computer account?

Active Directory Users and Computers
System Properties
Configure Your Server
Event Viewer

Question 43. After a Regenerating operation completes, the status message returns to

Healthy.
Online.
Ready.
Running.

Question 44. By default, all policy settings for groups are inherited from ____.

super users
parent containers
child groups
policy banks

Question 45. Which of the following Kerberos policy items determines the amount of time, in days, that a user's TGT may be renewed?

maximum lifetime for service ticket
maximum lifetime for user ticket renewal
maximum lifetime for user ticket
enforce user logon restrictions

Question 46. A(n) ____ is a logical container used to organize objects within a domain.

forest
tree
organizational unit
attribute

Question 47. Which of the following account lockout policy items defines the number of failed logon attempts that results in the user account being locked?

reset account lockout counter after
account lockout complexity
account lockout threshold
account lockout duration

Question 48. To enable the auditing of failure account logon events, you must access the ____ setting to check the Failure check box.

Audit object access
Audit process tracking
Audit account management
Audit account logon events

Question 49. In order to change the scope of a group, the domain functional level must be at least at the ____ level.

Windows 2000 mixed
Windows 2000 native
Windows Server2003/2008
Windows NT 4.0

Question 50. What is the name of the hidden administrative share that provides an administrator with access to the root of the C drive on a computer?

C$
Admin$
Manage$
Cdrive$

Question 51. The easiest method of determining the groups that a user belongs to is via the ____ tab in the properties of their user account.

General
Advanced
Member Of
Profile

Question 52. To find the IRQ line used by a particular device, you look on the ____ tab of the properties of a device in Device Manager.

Resources
General
Advanced
Interrupts

Question 53. In tuning the size of a paging file, what are the two parameters that need to be set?

recommended size and default size
minimum size and additional size
recommended size and expansion amount
initial size and maximum size

Question 54. A Windows Server2003/2008 system configured as part of a network workgroup would be properly referred to by which of the following?

domain controller
standalone server
member server
configurable server

Question 55. Typing ____ at the command line will allow you to view the complete list of switches and options available with the DSMOD USER command.

DSMOD USER HELP
DSMOD HELP USER
DSMOD ?
DSMOD USER /?

Question 56. Which of the following consists of object class and attribute definitions?

Domain Name Service (DNS)
Microsoft Management Console
organizational unit
Active Directory schema

Question 57. You can refresh Group Policy settings manually by running ____ from the command prompt.

UPDATEPOL.EXE
REFRESHPOL.EXE
GPUPDATE.EXE
POLICYUP.EXE

Question 58. One of the most common troubleshooting tasks for any network administrator is ensuring the ____ of the shared network printers.

encryption properties
continued availability
security strength
paper quality

Question 59. Which of the following is an advantage of using an OU structure?

the ability to delegate administrative control to specific users
the ability to replicate Active Directory schemas
the ability to automatically schedule backups
the ability to add snap-ins to a console

Question 60. Which of the following built-in containers holds built-in groups that are created automatically when Active Directory is installed?

Users
Groups
Admins
Guests

Question 61. Match each term with the correct statement below.

Potential Matches:
1 : users unable to log on locally
2 : domain controller issues
3 : logon hour restriction issues
4 : client time setting issues
5 : UPN logon issues
6 : account disabled issues
7 : account lockout issues
8 : workstation restrictions
9 : remote access logon issues
10 : down-level client issues

Question 62. Match each term with the correct statement below.

Potential Matches:
1 : user mode
2 : install mode
3 : Read permission
4 : Software Update Services
5 : Set options
6 : Attribute-level permissions
7 : Object-level permissions
8 : Delegation of Control Wizard
9 : Full Control permission
10 : Monitor server

Question 63. Match each term with the correct statement below.

Potential Matches:
1 : Network Functions
2 : Virtual Memory
3 : Time sharing
4 : Process
5 : Address space, registers and process table
6 : Spooler
7 : Multitasking
8 : Process Manager, Device Manager, File Manager, and Memory Manager
9 : Level1 and/or Level2 child processes
10 : Process manager

Reference no: EM131035231

Questions Cloud

Why is it important to convey credibility to your customer : Why is it important to convey credibility to your customer - Explain the process for exceeding customers' expectations.
Determine the required mass of b : The cylinders are suspended from the end of the bar which fits loosely into a 40-mm-diameter pin.
Calculate the face value and promised interest rate of debt : Calculate the face value and promised interest rate of the debt that Alpha Cars needs to issue. Calculate the value of the equity of Alpha Cars
Determine the resistance to motion : If the locomotive is traveling at a constant speed of 12 ft/s , determine the resistance to motion caused by the shoveling. The specific weight of snow is y s = 6 lb /ft3.
What is the name of the hidden administrative share : A Windows Server2003/2008 system configured as part of a network workgroup would be properly referred to by which of the following?
Resistance and the variation of its weight with altitude : Neglect air resistance and the variation of its weight with altitude. The missile is launched vertically starting from rest.
M needed to overcome friction if the shaft is subjected : The coefficient of static friction is µs. For the solution, it is necessary to determine p0 in terms of P and the bearing dimensions R1 and R2.
What is the probability that you own a good asset : There are two types of assets. Good quality assets (type-G assets) can have an annual rate of return equal to 4% or 6% with equal probability. What is the probability that you own a good asset? What is the predictive distribution of the return on yo..
M required to overcome friction if the shaft supports : determine the torque M required to overcome friction if the shaft supports an axial force P.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Important information about control systemwhat control

important information about control systemwhat control system might guillermo use to help it achieve its organizational

  Development of the system using a waterfall model

Describe the steps that will be undertaken during the development of the system using a waterfall model

  Management and enterprise systems

management and enterprise systems and strategic decision-support applications, Assume that you are a senior health service administrator responsible for the health information systems within your organization, and create an argument to be presented..

  Differences of blackberry- wireless pda and raid echnology

Differences of Blackberry- wireless PDA and RAID echnology - Describe some of the features of the BlackBerry and what sets the RIM Blackberry apart from other wireless PDA solutions.

  Discuss how the development of informational resources

Discuss how the development of an informational resource, or your work in the discussion board, has helped you understand how to evaluate the credibility of online sources in an academic environment

  The four stages of the bpm processexplain the four stages

the four stages of the bpm processexplain the four stages of the bpm process and summarize the activities in each.this

  Who should be involved in a technology team for a company

who should be involved in a technology team for a company technology change?once a decision has been made to change a

  Explain how was this obstacle managed

Question about Resistance to change - How was this obstacle managed? What actions would you now recommend and why?

  Charts and time management1 gnatt charts are they usefull

charts and time management1. gnatt charts are they usefull or useless in organizations? please explain2. when

  What are lessons learned within supply chain

What are lessons learned within supply chain and What is a lesson learned in relevant supply chain model that takes into consideration new business process, what should a company NOT do

  What are your thoughts about the use and role of it

What are your thoughts about the use and role of IT in general as we work our way through and out of the economic recession

  Why is an information security program important

Why is an information security program important

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd