Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Chapter 10 TRUE/FALSE 1)Windows computers can make a shared drive look like a local drive by mapping

Chapter 10 TRUE/FALSE 1)Windows computers can make a shared drive look like a local drive by mapping

Computer Science

Chapter 10

TRUE/FALSE

1)Windows computers can make a shared drive look like a local drive by mapping.

 

 

     2.   In Linux, a network drive that is attached to the file system is called a mapped drive.

 

 

     3.   It is preferable to assign permissions to individual users rather than groups because the amount of work for the administrator is reduced.

 

 

     4.   Global groups are used to hold user accounts while domain local groups are used to hold Global groups and provide access to resources.

 

 

     5.   NFS is used by UNIX/Linux systems to mount a shared partition as a drive letter.

 

 

MULTIPLE CHOICE

 

     1.   You are explaining to a colleague how to make a shared resource available on a Linux file system.  Which of the following terms best describes what you should tell him?

a.

map a drive letter

c.

mount a volume

b.

mount a drive letter

d.

map a volume

 

 

 

     2.   You have shared a folder on a Windows server that is a part of a domain.  You need to assign permissions to users so they can access the shared folder.  Which type of group will you use to make the permissions assignment?

a.

Local

c.

Global

b.

Domain local

d.

Universal

 

 

 

     3.   You have a multi-domain Windows Server 2008 forest.  You need to make a shared folder  available to users from several domains.  What type of group should you create to add the users to and assign permissions to the resource?

a.

Universal

c.

Domain local

b.

Global

d.

Local

 

 

     4.   Which of the following is NOT a function of a directory service?

a.

central listing of resources

c.

facilitates managing and accessing resources

b.

facilitates finding resources

d.

decentralizes user management

 

 

 

     5.   You manage a multi-domain network, DomainA, DomainB, and DomainC.  You have users from each domain that must have permission to a shared folder in DomainB.  Which of the following represents the correct method of assigning these users permissions?

a.

Create a Global group in DomainB and add each user to the group.  Assign the Global group permission to the share.

c.

Create a Universal group.  Add the users from the domains to the Universal group and add the Universal group to the share permissions list.

b.

Create a Local group in each domain.  Add users from each domain to the respective Local groups and add the Local groups to the permissions list of the share.

d.

Create a Global group in each domain.Add the users from the respective domains to the Global group.  Add the Global groups to the share permissions list.

 

 

 

     6.   Which of the following password security options enables the server to ‘remember’ a user’s previous passwords?

a.

Minimum password length

c.

Passwords must meet complexity requirements

b.

Enforce password history

d.

Minimum password age

 

 

 

     7.   Which account feature can be configured to prevent a user from logging in after incorrectly entering the password a number of times?

a.

Account disable

c.

Account lockout

b.

Account expiration

d.

Account reset

 

 

 

     8.   Which permission to a folder should you give a user if that user should be able to create files but not read or execute files in that folder?

a.

Full control

c.

Write

b.

Modify

d.

Read & Execute

 

 

 

     9.   A user is complaining that he cannot open a file in a shared folder.  He is able to open other files in the same shared folder.  Which of the following could be the problem?

a.

his network connection is not working

c.

he has entered the wrong password to gain access to the file

b.

he does not have Read share permission to the share

d.

he has Read sharing permission but has a Deny permission on the file

 

 

 

   10.   Which of the following is true about permissions on an NTFS volume?

a.

newly created files have no permissions set

c.

a file that is copied from a FAT volume to an NTFS volume has no permissions set

b.

a file that is moved to another volume inherits the parent folder’s permissions

d.

A file that is copied within the same volume retains its existing permissions

 

 

 

   11.   Which of the following is NOT included in the Linux password (/etc/passwd) file?

a.

user name

c.

UID

b.

user permissions

d.

home directory location

 

 

 

   12.   To protect user’s passwords on a Linux system, they can be kept in a file only available to the system administrator.  What is the name of that file?

a.

/etc/passwd

c.

/etc/shadow

b.

/sys/secpass

d.

/sys/encryptpass

 

 

 

   13.   You need to create a user on your Red Hat Enterprise Linux system.  What command should you use?

a.

newuser

c.

useradd

b.

userconf

d.

moduser

 

 

 

   14.   You have just successfully created a user named acoulter on your Red Hat Enterprise Linux system.  You left the password blank so the user can easily log on and create her own password.  The user calls you and informs you she cannot logon.  She has tried several times and has used a blank password but still cannot logon.  What is likely to be the problem?

a.

you didn’t add the user to the right group

c.

the user has caps lock on

b.

the user is not entering the password correctly

d.

the account is disabled

 

 

 

   15.   Which of the following is a valid permission in the Linux file system?

a.

Full Control

c.

Write

b.

Modify

d.

Change

 

 

 

   16.   You need to assign the read and execute permission to a folder named /docs/acctg to other.  Which of the following commands does this?

a.

chmod o +rx /docs/acctg

c.

chmod /docs/acctg +rx o

b.

chmod /docs/acctg o -rx

d.

chmod -rx o /docs/acctg

 

 

 

   17.   Which of the following is NOT an event type that can be set up for logging using Server Admin on Mac OS X Server?

a.

Login and Logout events

c.

Opened files

b.

Installation of applications

d.

Deleted files

 

 

 

   18.   Which of the following is the correct syntax for specifying a shared folder on a server in Windows?

a.

\\server\share

c.

//share/server

b.

\\share\server

d.

\\server\drive:\share

 

 

 

   19.   You need to specify which clients are allowed to access files on a UNIX/Linux system using NFS.  What should you do?

a.

configure the sharing permissions

c.

edit the /etc/hosts.allow file

b.

edit the smb.conf file

d.

edit the /usr/nfsconfig file

 

 

 

   20.   Which of the following permissions should you set on a shared printer in Windows to allow a junior administrator to configure the properties of the printer?

a.

Full Control

c.

Manage Documents

b.

Manage Printers

d.

Modify

 

 

 

COMPLETION

 

     1.   ___________ is a software process that enables a client workstation to attach to a shared folder on another workstation and assign it a drive letter.

 

 

 

     2.   A _________________ service provides a central listing of resources and the ability to access and manage resources.

 

 

 

     3.   You use __________ groups to hold user accounts from the same domain as members.

 

 

 

     4.   The account lockout ____________ enables you to set a limit to the number of unsuccessful attempts to log onto an account.

 

 

 

     5.   In Windows, the ___________ sharing permission enables users to read, add, modify, execute, and delete files but not change permissions.

 

 

 

MATCHING

 

 

a.

group

f.

home directory

b.

distribution group

g.

SMB

c.

container object

h.

UID

d.

domain

i.

remote procedure call

e.

security group

j.

forest

 

 

     1.   an Active Directory container that holds one or more trees

 

     2.   in Active Directory, this is a grouping of resources into a functional unit for

management

 

     3.   a group of Windows Server 2003/Server 2003 R2 and Server 2008/Server

2008 R2 users that is used to assign access privileges

 

     4.   a list of Windows Server 2003/Server 2003 R2 and Server 2008/Server

2008 R2 users that is not used for security

 

     5.   enables services and software on one computer to use services and software on a different computer

 

     6.   a protocol mainly used for sharing folders, files, and printers

 

     7.   an entity used to group together resources; examples are organizational

unit, domain, or forest in Microsoft Active Directory

 

     8.   a number that is assigned to a UNIX/Linux user account

 

     9.   a collection of computers and users where policies set for the group apply to all computers and users

 

   10.   a user work area in which the user stores data on a server and typically

has control over whether to enable other users to access his or her data

 

       

       

 

SHORT ANSWER

 

     1.   Describe the difference between mapping a drive and mounting a volume.

 

 

 

     2.   Describe the difference between Local groups and Domain local groups.

 

 

 

     3.   List three important functions provided by a directory service.

 

 

 

     4.   You need to give the five department managers access to a printer on your Windows Server 2008 domain.  Briefly describe the process.

 

 

 

     5.   You administer a medium-size network.  You want to make sure your users must change their passwords every 60 days, cannot change their password sooner than five days after the last change and must use 8 unique passwords before re-using a password.  What account policies would you set and with what values?

 

 

 

     6.   You want to be sure that if somebody is trying to guess one of your user’s passwords, the account will be locked out after 4 unsuccessful password entries.  Furthermore, you want the account to be locked out for one hour before it automatically unlocks.  The count of unsuccessful attempts should be reset after 20 minutes.  What account lockout policies should you set and with what values?

 

 

 

     7.   List and describe two of the Kerberos configuration options.

 

 

     8.   You are setting up permissions to a folder that will be accessed using a Web browser.  You want then to have the ability to view the files, folders and subfolders.  What permission must you assign?

 

 

 

     9.   Describe what happens when a shared folder is being access over the network and both sharing and NTFS permissions are set and a conflict exists.

 

 

 

   10.   You are trying to troubleshoot a user’s access to a shared folder on your Windows server.  The user is a member of several groups and your having trouble deciding exactly which set of permissions should apply to the user.  What tool can you use that is part of a folder’s properties in Windows Server 2008?

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

3.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE