Files
Groups
Users
Permissions
Grab Bag
100
Name the two types of folder shares available in Server 2012 R2.
What are Network File System and Server Message Blocks
100
You grant a user the NTFS permissions needed to access a file. Explain what happens if the file is moved.
What is the ACE you create is stored in the file’s ACL; it is not part of the user account. You can move the file to a different location, and its permissions go with it?
100
This service allows users to store files on a network file server, which can be accessed from multiple workstations or devices.
What is Work Folders?
100
The New Share Wizard prompts you for a profile when creating a new share from File and Storage Services in Server Manager. Choose this for a profile that provides SMB sharing with full share and NTFS permissions and access to services provided by File Server Resource Manager.
What is SMB Share–Advanced?
100
You are concerned that some users might monopolize a disproportionate amount of disk space. Offer a solution to set a storage limit for users of a particular volume.
What is Set NTFS quotas?
200
The name for the concept of having a drive letter associated to a user's network folder.
What is mapping drives or mapping network drives?
200
List the permission system allowed for FAT 32 drives.
What is file sharing only?
200
When a group inherits permissions. rather than examine and evaluate all possible permission sources, you can just open the Advanced Security Settings dialog box and click this tab. Then you can select a user, group, or device and view its effective access, with or without the influence provided by specific groups.
What is the Effective Access tab?
200
The New Share Wizard prompts you for a profile. You need a profile that provides SMB sharing with settings suitable for Hyper-V and other applications. Name the profile best suited for this instance.
What is SMB Share–Applications?
200
Name the term describing the combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership.
What is The effective access for that element?
300
This must be installed before you can create and manage SMB shares using Server Manager.
What is the File Server role service?
300
The Windows Server 2012 R2 feature that enables you to maintain previous versions of files on a server, so that if users accidentally delete or overwrite a file, they can access a copy.
What is Volume Shadow Copies?
300
You learned about controlling access to a file server to provide network users with the access they need, while protecting other files against possible intrusion and damage, whether deliberate or not. To implement this access control, Windows Server 2012 R2 uses this.
What is permissions? To improve data security, grant file and share access only to those users who need it.
300
The New Share Wizard prompts you for a profile. You need a profile for basic SMB sharing with full share and NTFS permissions. Name the best choice for this instance.
What is SMB Share–Quick?
300
The Windows permissions system called that controls access to specific parts of an AD DS hierarchy
What is Active Directory permission?
400
Method used to prevent users from seeing files and folders they do not have permission to access.
What is access-based enumeration ?
400
The maximum number of shadow copies supported by Windows Server 2012 R2.
What is 64?
400
You have massive shares were split across multiple servers on your network, name the best way to make them appear as a single, unified directory tree.
What is Distributed File System?
400
When setting quotas for disk space, list the two tools for enabling and configuring quotas. Name which of the two are the more flexible.
What is File Server Resource Manager and NTFS quotas? The more flexible is File Server Resource Manager.
400
Describe the relationship between Deny permissions and Allow permissions?
What is Deny permissions override Allow permissions?
500
The combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership, is called this.
What is effective access?
500
With the Volume Shadow Copy Service enabled, name the action the system takes if the maximum number of copies supported by Windows Server 2012 R2 is reached.
What is The system copies, and then deletes the oldest copy?
500
This permission system controls access to the files and folders stored on disk volumes formatted with the NTFS file system. This control is extended whether the file is accessed locally or remotely.
What is NTFS permissions?
500
Name the most important principle in permission management, in that permissions tend to run downward through a hierarchy.
What is Permission inheritance?
M
e
n
u