Quiz 3 (chapters 5 and 6)

Question 1 of 20

Medal-premium 1

To ______ an object means to make it available for users to access when they view Active Directory contents.

Select one of the following:

  • Control

  • Inherit

  • Publish

  • Present

Question 2 of 20

Medal-premium 1

UNIX/Linux server administrators and programmers rely on the popular UNIX/Linux ______ editor for creating scripts, writing program source code, editing data files, and many more functions.

Select one of the following:

  • txt

  • vin

  • vi

  • notepad

Question 3 of 20

Medal-premium 1

The Printer memory is usually automatically detected in bidirectional printers, but if it is not, you can specify the amount of memory in the Printer Memory option under

Select one of the following:

  • Printer Preferences

  • Installable Options

  • Device Settings

  • Device Options

Question 4 of 20

Medal-premium 1

The ______ tab enables you to specify printer settings that are specific to the printer you have installed, such a printer trays, memory, paper size, fonts, duplexing and installable options.

Select one of the following:

  • Output Settings

  • Device Settings

  • Printer Preferences

  • Advanced

Question 5 of 20

Medal-premium 1

The ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.

Select one of the following:

  • A) NTFS compress

  • B) NTFS encrypt

  • C) hidden

  • D) privacy

Question 6 of 20

Medal-premium 1

Windows Search Service by default is installed to start automatically each time the server is booted.

Select one of the following:

  • True

  • False

Question 7 of 20

Medal-premium 1

____ mean that the same permissions on a parent object apply to the child objects, such as files and subfolders within the parent folder.

Select one of the following:

  • Instantiated permissions

  • Copied permissions

  • Inherited permissions

  • Overridden permissions

Question 8 of 20

Medal-premium 1

An encrypted folder or file uses the Microsoft ____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.

Select one of the following:

  • Encrypting File System

  • Data Encryption Standard

  • Block Encryption System

  • Advanced Encryption Standard

Question 9 of 20

Medal-premium 1

Accessing folders and files can be tracked by setting up ____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.

Select one of the following:

  • archiving

  • auditing

  • tracking

  • logging

Question 10 of 20

Medal-premium 1

Taking ____ is the only way to shift control from one account to another.

Select one of the following:

  • permissions

  • ownership

  • possession

  • control

Question 11 of 20

Medal-premium 1

____ is a naming convention that designates network servers, computers, and shared resources.

Select one of the following:

  • Uniform Naming Convention

  • Universal Naming Connection

  • Universal Resource Locator

  • Universal Naming Convention

Question 12 of 20

Medal-premium 1

When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have ____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.

Select one of the following:

  • Suppress mismatched documents

  • Control mismatched documents

  • Hold mismatched documents

  • Prevent mismatched documents

Question 13 of 20

Medal-premium 1

The ____ portion of EFS uses a single key to encrypt the file or folder.

Select one of the following:

  • asymmetric

  • private

  • public

  • symmetric

Question 14 of 20

Medal-premium 1

Windows Server 2008 uses two types of ACLs: discretionary and non-discretionary.

Select one of the following:

  • True

  • False

Question 15 of 20

Medal-premium 1

A ____ is one that has special firmware or cartridges to print using a page-description language (PDL).

Select one of the following:

  • RAW printer

  • Script printer

  • XPS printer

  • PostScript printer

Question 16 of 20

Medal-premium 1

The ____ provides interoperability between Windows Server 2008 and UNIX and Linux systems.

Select one of the following:

  • Subsystem for UNIX-based Applications

  • Subsystem for Third-party Applications

  • Subsystem for Apple-based Applications

  • Subsystem for POSIX-based Applications

Question 17 of 20

Medal-premium 1

A(n) ____ is like a stack of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.

Select one of the following:

  • print stack

  • print deck

  • print block

  • print queue

Question 18 of 20

Medal-premium 1

In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform ____, so that one server does not experience more load than others.

Select one of the following:

  • distribution

  • replication

  • load balancing

  • redundancy

Question 19 of 20

Medal-premium 1

When using SUA in ____, every process that is run is treated as a Windows process.

Select one of the following:

  • transitional mode

  • native mode

  • hybrid mode

  • mixed mode

Question 20 of 20

Medal-premium 1

____ are stored as header information with each folder and file, along with other characteristics including volume label, designation as a subfolder, date of creation, and time of creation.

Select one of the following:

  • Components

  • Labels

  • Attributes

  • Settings

Icon_fullscreen

Quiz 3 (chapters 5 and 6)

Joshua Villy
Quiz by , created over 3 years ago

ACT Year 12 Certificate CSI265 Quiz on Quiz 3 (chapters 5 and 6), created by Joshua Villy on 06/05/2013.

Eye 441
Pin 0
Balloon-left 0
Tags
Joshua Villy
Created by Joshua Villy over 3 years ago
Close