Which of the following best describes what happens to the permissions for both files as they are created in the D :\ PublicReports folder?

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (47)

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

Which of the following are true of Libraries? (Select two.)

- A single folder can be added to multiple Libraries.
- Each Library can contain multiple folders from different file system locations.

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder.
Which of the following steps would BEST meet your requirements?

Include the D:\Reports folder in the Library.

You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed.

%systemdrive%\Program Files (x86)

You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path? (Select two.)

- C:\Users\username\AppData\Local\Temp
- %tmp%

Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?

C:\Users\username

Where system root is the C: drive, where are fonts stored on a Windows 7 system?

C:\Windows\Fonts\

Which file system path is the default location for system files in Windows 10?

C:\Windows

Which of the following file extension types can be run from the command prompt? (Select three.)

- .exe
- .com
- .bat

Which commands can you use to create a new directory? (Select two.)

- md
- mkdir

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which command would you use to change the current directory to the immediate parent dictionary?

cd ..

Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files.
Which copy command switch should you use?

/y

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

Which of the following extensions identifies a program packaged for use by Windows Installer?

.msi

Which file attribute identifies the file as having been modified since the last backup?

Archive

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

Which of the following file extensions indicates a Windows system file? (Select two.)

- .dll
- .vxd

While researching a fix to a system file issue, you find that using the ATTRIB command should resolve the issue you are experiencing. The instructions you found said to run the following command:
attrib +s +r -a myfile.dll
Which of the following BEST describes the function of this command?

It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll.

Which command will display a list of files and subdirectories in a directory?

dir

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

If a folder exists on a NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

Full Control

Susan in accounting has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer.

Make Manuel the owner of the file

Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening.
One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file.
Which of the following will MOST likely allow Pablo to open the file?

Modify the permissions on the document.

Your computer has a single NTFS partition used for the C: drive with the following folders:
- C:\Confidential
- C:\PublicReports
You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions:
- Move Reports.doc from C:\Confidential to C:\PublicReports.
- Copy Costs.doc from C:\Confidential to C:\PublicReports.
Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control to both

Your computer has a single NTFS partition used for the C: drive with the following folders:
• C:\Confidential
• C:\PublicReports
In the C:\Confidential folder, you edit the properties for the following two files and assign the
Deny Read permission to the Users group:
• Reports.doc
• Costs.doc
The C:\PublicReports folder allows the Full Control permission to the Users group. There are no
other permissions assigned except for the default permissions. You then take the following
actions:
• Move Reports.doc from C:\Confidential to C:\PublicReports.
• Copy Costs.doc from C:\Confidential to C:\PublicReports.
Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc

You manage two folders in your computer as follows:
• C:\Confidential
• D:\PublicReports
Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to
the Users group:
• Reports.doc
• Costs.doc
The D:\ drive allows the Full Control permission to the Users group. There are no other
permissions assigned except for the default permissions. You then take the following actions:
• Move Reports.doc from C:\Confidential to D:\PublicReports.
• Copy Costs.doc from C:\Confidential to D:\PublicReports.
Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow Full Control to both

You manage two folders in your computer as follows:
• C:\Confidential
• D:\PublicReports
The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the
C:\Confidential folder, you edit the properties for the following two files and assign the Deny
Read permission to the Users group:
• Reports.doc
• Costs.doc
You then take the following actions:
• Move Reports.doc from C:\Confidential to D:\PublicReports.
• Copy Costs.doc from C:\Confidential to D:\PublicReports.
Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files

The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been
assigned the following permissions:
• Allow Full Control to the D:\Reports folder
• Deny Full Control to the D:\Sales folder
• Deny Full Control to the D:\Reports\2010reports.doc file
• Allow Full Control to the D:\Sales\2010sales.doc file
Which of the following BEST describes the effective permissions Mary will have for both files?

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your
computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a
member of the Sales group.
Which of the following will BEST prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the properties for the file; assign Mary the Deny Full Control permission.

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connect.
Which of the following commands will MOST confirm your suspicions?

net use

How can you see a list of valid command parameters for the net use command?

net use /?

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder.
Which of the following would be the BEST actions to take next? (Select TWO.)

- Configure both share and NTFS permissions.
- Place the files on an NTFS partition.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer Home1.
Which of the following is an example of the UNC format?

\\Home1\Pictures

Which of the following statements are true regarding administrative shares? (Select two.)

- By default, Windows automatically creates an administrative share for every volume
- To connect to an administrative share, you must use the UNC path

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NFTS permissions to the WeeklyReport.xls file. Bob is attempting to access the report through a share with the Full Control permission assigned to the Everyone group.
Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files.
Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder.

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access?
(Select three.)

- This PC
- Network
- File Explorer

You're using the vi editor to manage a text file on a Linux system. You want to type new test into the file; when you type you want the existing text that comes after the cursor to be pushed down.

What mode do you need to be in to do this?

Insert Mode

You've just opened a text file in the vi editor and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode

Which of the following key-press sequences will get you into Replace Mode? (Select three.)

- Press Insert, then press Insert again

- Press the 'i' key, the press Insert

- Press the 's' key, then press Insert

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you're looking for:

Which of the following commands will display the entire contents of the cpuinfo text file on the screen?

cat /proc/cpuinfo

You need to view the contents of /var/log/auth.log file to get information about the users that have been logging on to the system. The auth.log file is a plain text file so you decide to use the cat command to review the file. However, the display fills up with text for several pages and you can't see the entire file.

What commands can you use to view the content of the auth.log file page by page?

more /var/log/auth.log
less /var/log/auth.log

You find that someone has set up an unauthorized account, with the username badmin, on the linux server. You have disabled the account but you need to find out when and how this user has been gaining access to the system. The first step you decide to take is to inspect the contents of the /var/log/auth.log file to find the information related to badmin logging into the system.

Which command can you use to search through the auth.log for lines that contain the username you're looking for?

grep "badmin" /var/log/auth.log

You are the administrator of a Linux server. Following best practices for system security and effective administration, you always login to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?
[TYPE]

su -

Recommended textbook solutions

Which of the following best describes what happens to the permissions for both files as they are created in the D : PublicReports folder?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Which of the following best describes what happens to the permissions for both files as they are created in the D : PublicReports folder?

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Which of the following best describes what happens to the permissions for both files as they are created in the D : PublicReports folder?

Computer Organization and Architecture

10th EditionWilliam Stallings

497 solutions

Which of the following best describes what happens to the permissions for both files as they are created in the D : PublicReports folder?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Sets with similar terms

module 11 questions

36 terms

robbi58d

CH. 11 File Management

44 terms

amanda_teeters

A+ 11-13

155 terms

juanarias1929

CTI 130 81 Practice Questions Chapter 11

28 terms

tbranch0

Sets found in the same folder

1.4.7 Practice Questions/Windows Basics

13 terms

jcarranza3

CompTIA A+: Guide to IT Technical Suppor…

184 terms

Killcross14__

Test Out 2.4.3

14 terms

Brandon_Gutchak

9.7 Mobile Device Security

15 terms

Grace20249

Other sets by this creator

EMS 1119 Chapter 6

70 terms

karsonco

EMS 1119 Chapter 5

26 terms

karsonco

Chapter 1 and 3 Vocabulary

122 terms

karsonco

Chapter 3 Vocabulary

63 terms

karsonco

Verified questions

COMPUTER SCIENCE

Write a program that opens a specified text file and then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set.

Verified answer

COMPUTER SCIENCE

When a value in memory is no longer referenced by a variable, it is automatically removed through a process known as __________. a. garbage process b. garbage clearance c. garbage coordinator d. garbage collection

Verified answer

COMPUTER SCIENCE

True/False Merge sort is a recursive sort with time complexity O(nlogn).

Verified answer

COMPUTER SCIENCE

Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 2T(n - 1) + 1. Use the substitution method to verify your answer.

Verified answer

Other Quizlet sets

Geology- Water Resources

16 terms

Michelle_MathisPLUS

Chapter 4: Let the Market Know You Better

11 terms

johncarlosomera

WE template

12 terms

pte506579

nutrition midterm

80 terms

Kayla_Cruz15

Related questions

QUESTION

You are architecting an application and need to choose between application containerization and virtualization. What describes a difference between application containers and a virtual machine?

2 answers

QUESTION

Which of these log files stores most syslog messages, with the exception of those thatare related to authentication, mail, scheduled jobs, and debugging?

3 answers

QUESTION

In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula. (T/F)

9 answers

QUESTION

T or F: The native file system in Linux is called ufs.

15 answers

What happens to the permissions of the file on the D :\ drive when copied quizlet?

doc file; moving the file to the new folder on the same drive preserves the NTFS permissions assigned to the file. The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions.

Which of the following best describes the permission the members of the Users group will have for the two files in the D :\ public reports folder?

Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? permissions assigned except for the default permissions. You then take the following actions: Move Reports.

Which of the following best describes what happens when share and NTFS permissions combine?

When using share permissions and NTFS permissions together, if there is a conflict in the configuration, the most restrictive permission prevails. For example, if a user has NTFS full access to a specific file in a folder that is not shared, the user cannot access the file from the network.

What are the rules that affect what happens to permissions when a file or folder is created copied or moved?

By default, an object inherits permissions from its parent object, either at the time of creation or when it is copied or moved to its parent folder. The only exception to this rule occurs when you move an object to a different folder on the same volume. In this case, the original permissions are retained.