{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":4198610,"author_id":2043473,"title":"Quiz 5 \u0026 6","created_at":"2015-12-08T22:38:27Z","updated_at":"2017-01-18T00:32:10Z","sample":false,"description":"Final Test Quiz","alerts_enabled":true,"cached_tag_list":"administrating windows, 70-411, final test quiz","deleted_at":null,"hidden":false,"average_rating":"5.0","demote":false,"private":false,"copyable":true,"score":71,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["administrating windows","70-411","final test quiz"],"admin_tag_list":[],"study_aid_type":"Quiz","show_path":"/quizzes/4198610","folder_id":3205192,"public_author":{"id":2043473,"profile":{"name":"soranandivan","about":null,"avatar_service":"examtime","locale":"en-US","google_author_link":null,"user_type_id":34,"escaped_name":"Michael Marcus","full_name":"Michael Marcus","badge_classes":""}}},"width":300,"height":250,"rtype":"Quiz","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"Quiz"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":4198610,"author_id":2043473,"title":"Quiz 5 \u0026 6","created_at":"2015-12-08T22:38:27Z","updated_at":"2017-01-18T00:32:10Z","sample":false,"description":"Final Test Quiz","alerts_enabled":true,"cached_tag_list":"administrating windows, 70-411, final test quiz","deleted_at":null,"hidden":false,"average_rating":"5.0","demote":false,"private":false,"copyable":true,"score":71,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["administrating windows","70-411","final test quiz"],"admin_tag_list":[],"study_aid_type":"Quiz","show_path":"/quizzes/4198610","folder_id":3205192,"public_author":{"id":2043473,"profile":{"name":"soranandivan","about":null,"avatar_service":"examtime","locale":"en-US","google_author_link":null,"user_type_id":34,"escaped_name":"Michael Marcus","full_name":"Michael Marcus","badge_classes":""}}},"width":300,"height":250,"rtype":"Quiz","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"Quiz"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
In Windows Server 2012 R2, which of the following steps represents the most efficient way to automatically move files which are older than one year to an expiration folder?
Answer
configure a file management task with FSRM
open the folder properties and set the file expiration property
Run the Windows PowerShell Set-FileExpire cmdlet
modify the properties of the folder that contains the files to specify an expiration parameter and expiration folder location
Question 2
Question
What type of service is the Windows File Server Resource Manager?
Answer
quota
role
third-party- add-on
extension
Question 3
Question
If you were asked to set up a shared file area for users that prevented them from saving video files or images of any kind what would you set up on that shared folder?
Answer
active file screen with included and excluded file groups
hard quota for each user and passive file screening
standard file share with e-mail notification
passive file screen and a soft quota
Question 4
Question
what FSRM feature can you use to show the state of file server volumes, quota, and disallowed files?
Answer
storage reports
storage exceptions
storage quotas
storage assessments
Question 5
Question
When storage space is at a premium, what should you do to ensure that everyone has enough space?
Answer
set up soft quota limits with no notifications
set up file groups so that users can't save very large files
set up very restrictive soft quota for users with e-mail notifications
set up hard quota limits with e-mail notifications
Question 6
Question
what technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?
Answer
Windows Firewall
Quotas
Windows Defender
File Screening
Question 7
Question
What happens if you move unencrypted files into an encrypted folder?
Answer
nothing
the new files become encrypted
the new files become hidden
the new files become encrypted at a lower encryption level
Question 8
Question
you can encrypt individual files, but Microsoft recommends encrypting at what level?
Answer
file system
drive
file group
folder
Question 9
Question
encryption is the process of converting data into what kind of format?
Answer
compiled
unreadable
hidden
non-functional
Question 10
Question
what key length is considered to be minimally strong for encryption algorithms?
Answer
56
80
128
256
Question 11
Question
on what type of computer is BitLocker not commonly used?
Answer
laptops
desktops
netbooks
servers
Question 12
Question
what's the status of your data if someone has your public key?
Answer
compromised
broken
hacked
safe
Question 13
Question
you can generate several different reports from FSRM. One of them gives you a list of Least recently Accessed Files. What would be the purpose of that report?
Answer
to warn you that users are storing unused files
to allow you to archive unused files
to remove unused files
to warn you of possible security risks of old files
Question 14
Question
when using File system resource manager, which group must you be a member of to enable SMTP?
Answer
Administrators
Domain Users
Schema Admins
Power Users
Question 15
Question
when you change a file template and save the changes, you have the option to do which one of the following?
Answer
re-created the template
remove conflicting templates
apply the template to all derived file screens
remove all file screens affected by the new template
Question 16
Question
what does the acronym SMTP stand for?
Answer
Storage Management Transaction Protocol
Simple Management Transfer Protocol
Simple Mail Transaction Protocol
Simple Mail Transfer Protocol
Question 17
Question
what is the purpose of setting up e-mail notifications for users who violate storage quotas?
Answer
so that administrator can proactively assist users in resolving the problem
to automate tracking of quota violations
to keep a record of quota violations for future reference
to endure that users know when they're using too much storage
Question 18
Question
Which screening technique prevents a user from saving defined unauthorized files?
Answer
active
passive
secure
preventative
Question 19
Question
what feature can you use to simplify the management of file screens?
Answer
exceptions
exemptions
templates
quotas
Question 20
Question
what is the purpose of setting soft quotas?
Answer
to notify users that they have reached the quota limit
to list files that need to be deleted
to identify users who violate quotas
to determine where hard quotas need to be set
Question 21
Question
what effect does using quotas in File Server Resource Manager have?
Answer
it limits the number of files allocated to a user
it limits the number of access licenses allotted to a server
it limits the number of drive mappings to a shared resource
it limits the number of gigabytes allocated to a volume or folder
Question 22
Question
some exemptions might be required for certain groups to store otherwise restricted file types. What type of exemption can you set p on folders?
Answer
file save exemption
file type exemption
file screen exception
folder screen exception
Question 23
Question
placing a quota limit on a folder applies that limit to what part of the folder?
Answer
the folder and any files it contains
the folder itself but no files
the entire folder and its subtree
only the files within the folder
Question 24
Question
By default, where are storage reports saved?
Answer
C:\StorageReports\Saved
C:\StorageReports\Schedule
C:\StorageReports\Queued
C:\StorageReports\Quotas
Question 25
Question
if you are a command-line user, what command will encrypt files and folders?
Answer
encrypt.exe
compress.exe
efs.exe
cipher.exe
Question 26
Question
an encrypted file can be converted back to its original format by a process known as what?
Answer
encryption
digitization
decryption
encapsulation
Question 27
Question
after a file has been encrypted, it is stored in what format?
Answer
hidden
executable
encrypted
converted
Question 28
Question
encryption does not protect a file or folder from deletion. To protect a file or folder from deletion, what technology should you use?
Answer
BitProtector
NTFS permissions
SSL/TLS
compression
Question 29
Question
single-key encryption is also known as what kind of encryption?
Answer
hash
simple
signal
symmetric
Question 30
Question
public-key cryptography uses how many keys?
Answer
one
two
two pair
256
Question 31
Question
what happens to files and subfolders within an EFS encrypted folder?
Answer
Nothing; they must be encrypted individually
they're encrypted but at a lower encryption level
they're left unencrypted but hidden
they're encrypted with the parent folder
Question 32
Question
what is the purpose of using hash function encryption?
Answer
to store passwords in a non-readable format
to demonstrate one-way encryption techniques
to provide keyless encryption and decryption algorithms
to keep track of 128-bit key pairs
Question 33
Question
where is the most secure location to store secure key recovery information?
Answer
on an encrypted USB device
in a secure cabinet on an encrypted USB device
in Active Directory
on the local device
Question 34
Question
EFS encryption is what type of feature that can be enable or disable at will, similar in effect to read-only, compression, or hidden?
Answer
status
characteristics
attribute
handle
Question 35
Question
from a security standpoint, which BitLocker operational mode is most secure?
Answer
TPM only
startup key only
TPM + startup PIN
TPM + startup key
Question 36
Question
what built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption?