Exam Prep Questions

     
Question 1

A user has indicated that she used to have a shortcut on her desktop to a database called SAMI. The database is located on the company shared drive at the following location: \\mobilebugs\SharedDocs\Databases\SAMI.mdb . The user has tried to navigate to the database but receives the error message shown in the following figure. What is the problem?

graphics/08inf01.gif
  • A. The user has been denied access to the database.

  • B. The user does not have the List Folders special access permission.

  • C. The database has been moved to a new file location.

  • D. The user does not have Read access to the database file.

A1:

Answer B is correct. The user was able to open the database from her shortcut but cannot browse to the database file. Answer A is incorrect because the user was able to open the database from the shortcut on her desktop. Answer C is incorrect because there is no indication that the database file was moved. Answer D is incorrect because the user is able to open the file from the shortcut on her desktop.

Question 2

A user has been granted the NTFS Modify permission to a folder called Corporate Data. The same user also has Read permission assigned using Share permissions. When the user accesses the file locally from the Corporate Data folder, he can save changes to files within the folder; however, when he opens files across the network, they are read only. What is the problem?

  • A. The effective permissions are Read.

  • B. The effective permissions are Write.

  • C The NTFS permissions have not propagated to subfolders .

  • D. The Share permissions are not applied when accessed locally.

A2:

Answer A is correct. When a user has a combination of NTFS and Share permissions, the most restrictive permission is applied. The most restrictive permission is Read; therefore, the user cannot save changes to any files within the Corporate Data folder. Answer B is incorrect because the effective permission is the most restrictive , Read. Answer C is incorrect because the NTFS permissions not being propagated to subfolders is not an issue in this situation. Answer D is incorrect because the Share permission is Read.

Question 3

A user indicates that she can create and modify documents in a parent folder named Corporate Data; however, in the subfolder named Accounting, she cannot create new files. Why is this problem occurring?

  • A. Automatic propagation has been stopped .

  • B. The user has been denied access to the Accounting subfolder.

  • C. The user has only the Read permission.

  • D. The user has Modify permission but has been denied the Create New Files permission.

A3:

Answer A is correct. The parent folder Corporate Data has not propagated the permissions to the child folders. Answer B is incorrect because the user is able to view the contents of the Accounting folder. Answers C and D are incorrect because the user has Modify permission in the parent folder.

Question 4

You have three files in a folder named Marketing to which you want to restrict access from the users in the Users group. What can you do to restrict access to these files but allow the Users group to still read the other files in the Marketing folder?

  • A. Deny access to the three files at the file level.

  • B. Move the files into their own folder and do not grant the Users group access to the folder.

  • C. Deny access to the Marketing folder.

  • D. Add the Users group to the Deny policy.

A4:

Answer B is correct. You should avoid using the Deny option to assist in troubleshooting permissions problems. Applying permissions at the file level also is not recommended. Answer A is incorrect because you should avoid using Deny, especially at the file level. Answer C is also incorrect because you should avoid using Deny. Answer D is incorrect because there is not a Deny policy.

Question 5

You suspect a user is accessing a folder that he should be prevented from accessing. This might mean that the permissions need to be modified. You first need to verify that the user is accessing this folder. How can you do this?

  • A. NTFS file activity logging

  • B. Event auditing

  • C. Event Viewer

  • D. Account lockout

A5:

Answer B is correct. Event auditing tracks the activity on the folder and the users who access the folder. Answer A is incorrect because NTFS file activity logging is a feature used to verify who accesses the folder when it is enabled. Answer C is incorrect because the Event Viewer is used to view the security log created by the auditing system but is not the feature that does the actual tracking. Answer D is incorrect because account lockout is used to prevent compromised accounts from being used.

Question 6

Which of the following is not a folder or file standard permission?

  • A. Read

  • B. List

  • C. Create Folder

  • D. Write

A6:

Answer C is correct. Create Folder is not a permission. Answers A, B, and D are valid file or folder permissions.

Question 7

A user indicates that she opened a document containing macros from an untrusted source but did not receive a macro warning. She is also able to execute the macro without any problems. What is her current macro security setting?

  • A. Low

  • B. Medium

  • C. High

  • D. Restricted

A7:

Answer A is correct. When a file from an untrusted source is received without a warning message indicating the file has macros, the security setting is Low. Answer B is incorrect because the Medium setting warns the user if the file contains macros from an untrusted source. Answer C is incorrect because the file would open, but the macros would be disabled. Answer D is incorrect because this option does not exist.

Question 8

A user has a Windows 98 system with several shared folders. He set up each shared folder with Read access. However, since he set up the shares, several files have been deleted. What happened ?

  • A. The NTFS permissions allowed users to delete the files.

  • B. Another user accessed the system locally and deleted the files.

  • C. The files were moved to a subfolder.

  • D. The folder has the Delete special access permission.

A8:

Answer B is correct. A user would need to have local access to the files to delete them. The Share permissions do not apply when accessing the files locally. Answers A and D are incorrect because the user cannot have NTFS permissions on a Windows 98 system. Answer C is incorrect because there is no indication that the files have been moved.

Question 9

A user has requested that a file available on the company network should prompt her to see whether she wants to read the file or open it to modify its contents. What feature needs to be enabled?

  • A. Set the open password.

  • B. Set the modify password.

  • C. Check the Read-Only Recommended check box.

  • D. Protect the document.

A9:

Answer C is correct. Any user who opens the file is prompted to open the file as read-only. If she refuses, the file still opens for modifications without a password. Answers A and B are incorrect because they only restrict access to the file. Answer D is incorrect because it prevents the file from being modified.

Question 10

How can the NTFS permission settings of a file be changed, altered , or modified? Select two correct answers.

  • A. Delete the file.

  • B. Move the file to a new partition.

  • C. Use the Security tab on the Properties dialog box.

  • D. Take ownership of the file.

A10:

Answers B and C are correct. When a file is moved to a new NTFS partition, it inherits the NTFS permissions of the destination folder; therefore, answer B is correct. Answer C is correct because using the Permissions button on the Security tab is the most common method to modify the NTFS permissions. Answer A is incorrect because the file permissions are not modified, but the file is removed. Answer D is incorrect because taking ownership of a file does not alter the permissions on a file.



MCDST 70-272 Exam Cram 2. Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System (Exam Cram 2)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736187
EAN: 2147483647
Year: 2003
Pages: 119
Authors: Diana Huggins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net