Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Starting Out with C++ from Control Structures to Objects
8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis
1,294 solutions
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (53)
Which NTFS feature should you configure if you want users to be able to revert to an older version of the file?
Shadow Copies
T/F: Locally attached storage devices include other hard disks that are installed on the system internally as well as external devices that are attached through either USB connections or external SATA connectors.
True
T/F: In Linux, every user that is created automatically belongs to a default group named Users.
False
A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user's profile is called a ____________ profile.
Roaming
Which of the following are standard NTFS permissions?
1. Execute
2. List Folder Contents
3. Change
4. Read
5. Write
2
4
5
T/F: Group accounts make it easier for an administrator to manage user rights and permissions.
True
Which of the following is a special identity group?
1. Creator Owner
2. Power Users
3. Everyone
4. Kernel
5. Authenticated users
1
3
5
Which of the following is a group scope in active directory?
1. Security
2. Domain Local
3. Global
4. Realm
5. Distribution
2
3
T/F: A user account in a client OS is meant to log on to the local machine only. A user account created in Active Directory has the ability to log on to any computer that is a member of the domain.
True
T/F: An image backup is a file that is a complete copy of the disk volume. If the volume contains the OS, when you restore from the image backup, you do not have to reinstall the OS.
True
______ consists of a collection of tools for pinpointing which resources are being overloaded and how they're being overloaded.
Performance Monitor
T/F: Restore Points store previous versions of files so if users accidentally delete a file or write over a file, they have a way to restore the file without dealing with a backup.
False
_____ is the dominant file-sharing protocol used by Windows and supported by Linux and MAC OS.
SMB
In Windows, the term for a computer that accepts job requests for a shared printer and sends them to the physical device is called a print ____________.
Server
T/F: NTFS permissions can only be configured on files.
False
T/F: A standby UPS continually powers devices from its battery so that if a power failure occurs, there is no delay in switching to battery power.
False
In regards to a user account, what does a white circle with a black arrow indicate?
The account is disabled.
T/F: In Windows terminology, a printer is the actual physical printer that will print the jobs that are sent to it.
False
Which is true about Windows Backup in Windows Server? (Choose all that apply.)
1. Backups can be stored on network drives.
2. Backups can be stored on tape.
3. It is designed to support a large number of servers and servers distributed across multiple sites
4. You can back up another computer remotely
5. The volume Shadow Copy Service backs up open files
1
4
5
Which is true about Linux user accounts? (Choose all that apply.)
1. They are limited to eight characters
2. The full name is a required part of the user account
3. They must belong to at least one group
4. Account names must contain a
combination of uppercase, lowercase, and numbers
5. The account names are case sensitive
3
5
____ accounts are used to organize users so that the assignment of resource permissions and rights can be managed more easily than working with many user accounts.
Group
Provide the complete directory path to where the user accounts are stored in a basic Linux installation.
/etc/passwd
Which of the following is a default group in Active Directory?
1. Server Operators
2. Root
3. Backup Operators
4. Network Administrators
5. User Managers
1
3
Which of the following groups are special identity groups?
1. Authenticated Users
2.
System
3. Print Operators
4. Self
5. Guests
1
2
4
What tool would you use to view error messages that are generated by system services or applications?
Event Viewer
What command in Linux gives extensive help on how to use a command?
man
Which
of the following is a function of a user account?
1. Restrict when and where users can log on
2. Establishes a link between the user and the workstation
3. Provides information about a user
4. Authorizes a user to log on to network servers
5. Provides a method for user authentication
1
3
5
T/F: Basic disks support advanced features like spanned volumes and software RAID.
False
What is a collection of a user's personal data folders and application settings that's available at any computer where the user logs on?
Roaming Profile
T/F: In a file system that uses FAT or FAT32, the only file security option that is available is sharing permissions.
True
In linux, what is the command for viewing a files contents on screen?
cat
When dealing with permissions in Linux, what are the user types that can be assigned permissions?
1. Other
2. Superuser
3. Group
4. Owner
5. Creator
1
3
4
T/F: A server cluster is a group of servers that appear to the user as a single server. The two most common types are a fail-over cluster and a load-balancing cluster.
True
Which of the following are case sensitive?
1. Windows Logon Name
2. Linux Logon Name
3. Windows group name
4. Windows Password
5. Linux Password
2
4
5
If you need to limit the amount of data users
can store on a volume, you would implement which of the following?
File Compression
Disk Quotas
Volume Mount Points
Shadow Copies
All of these
Disk Quotas
Which of the following is NOT a linux file system?
Ext4
SFS
Ext3
ReiserFS
None of these choices
SFS
Which is best describes as a record of performance data gathered when a system is performing well under normal conditions?
baseline
T/F: An event log entry that is is an error is marked with a ed circle with a white exclamation point in the center.
True
Which of the following correctly describes how sharing NTFS permissions work?
1. Sharing permissions can be
assigned to separate files
2. When a files is accessed over the network, sharing permissions are checked last
3. When both sharing and NTFS permissions are applied, the least restrictive permissions apply
4. When a file is accessed interactively, only sharing permissions are checked.
5. None of these choices
5
Which of the following is a permission in the Linux OS?
1. Read
2. Owner
3.
Delete
4. Execute
5. Modify
1
4
T/F: Windows may be booted from an extended partition that has been formatted with the NTFS file system.
False
Which of the following is true of Windows printing terminology?
1. A print queue stores jobs waiting to be printed
2. A printer is a physical device
3. A print device
loads files to memory for later printing
4. A print server is a computer sharing a printer
5. A printer pool is two or more printers representing a single print service
1
4
______ groups contain users from the domain in which they're created but can be assigned permissions to resources in other domains.
global
What level of RAID does not provide fault tolerance?
0
Which is true about partitions?
1. An extended partition is assigned a drive letter by default
2. Only a primary partition can be active
3. The Windows boot loader is housed on the boot partition
4. You can have up to four primary partitions
5. A partition is equivalent to a volume
2
4
T/F: The three permissions used to control access to files and folders in Linux are: read, write, and delete.
False
T/F: The three primary forms of fault tolerance for networks and servers are: redundant power supply (UPS), redundant disk systems, and server clustering.
True
T/F: A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
False
Employees in the Sales department need to be able to access the sales share on the file server. They will need to have the ability to create files, read them, and make corrections or additions. Which of the following share permissions should the group be given?
change
Which of the following is true of group accounts in Windows?
1. Groups may not be members of other groups
2. They organize users for easier assignment of resource permissions
3. They are used only to assign permissions, not rights.
4. Provides information about a user.
5. You can select a group scope in Active Directory but not in Windows 10
2
5
Which is true about file compression?
1. A compressed file can't be encrypted with EFS.
2. You may enable compression on an entire NTFS volume, a folder and its contents, or an individual file.
3. It is a standard feature in Windows beginning with FAT32
4. Compressed files can't have permissions assigned to them.
5. Decompression occurs automatically when a file is accessed.
1
2
5
The partition that contains the Windows OS files is knows as the what type of partition?
boot
Which UPS type is for computer power backup?
Online
Other sets by this creatorCCNA Final
86 terms
tom_smith665
Cellular & Mobile Final (Post Midterm)
24 terms
tom_smith665
Cellular and Mobile Midterm
64 terms
tom_smith665
CCNA Midterm
84 terms
tom_smith665
Verified questions
COMPUTER SCIENCE
If a list is already sorted in ascending order, a modified sequential search algorithm can be used that compares against each element in turn, stopping if a list element exceeds the target value. Write a pseudocode version of this short sequential search algorithm.
Verified answer
COMPUTER SCIENCE
Let $\Sigma=\{\mathrm{a}, \mathrm{b}\}$. For each $k \geq 1$, let $C_{k}$ be the language consisting of all strings that contain an a exactly k places from the right-hand end. Thus $C_{k}=\Sigma^{*} \mathrm{a} \Sigma^{k-1}$. Describe an NFA with k+1 states that recognizes $C_{k}$ in terms of both a state diagram and a formal description.
Verified answer
COMPUTER SCIENCE
In statistics, when a set of values is sorted in ascending or descending order, its median is the middle value. If the set contains an even number of values, the median is the mean, or average, of the two middle values. Write a function that accepts as arguments the following: A) An array of integers B) An integer that indicates the number of elements in the array The function should determine the median of the array. This value should be returned as a double. (Assume the values in the array are already sorted.) Demonstrate your pointer prowess by using pointer notation instead of array notation in this function.
Verified answer
COMPUTER SCIENCE
Let A be the language of properly nested parentheses. For example, (()) and (()(()))() are in A, but )( is not. Show that A is in L.
Verified answer
Recommended textbook solutionsFundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Other Quizlet setsMicrobiology Lecture Exam 4
124 terms
bigbrainaaronPLUS
meeting at night
13 terms
Lilybliss04
S6 - Lektion 13 - LS BC
18 terms
HappyLittleSchool
Related questionsQUESTION
What YUM command would you enter at the command prompt to download an RPM package without installing it to the system?
15 answers
QUESTION
SSD startup drives will reduce the amount of time to boot up.
11 answers
QUESTION
A command-line interface (CLI) that you can launch from within Windows, from Safe Mode, or as a Recovery option
2 answers
QUESTION
If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location. (T/F)
2 answers