среда, 11 ноября 2015 г.

CIS 329 WEEK 8 QUIZ 3


  • Question 1
2 out of 2 points
  
 
How do you start the process to modify the default homegroup sharing configuration?
Answer
   

 
   
  • Question 2
2 out of 2 points
  
 
Which of the following statements is true of Public folder sharing?
Answer
   

 
   
  • Question 3
0 out of 2 points
  
 
For users at home, which file sharing is most likely the simplest to setup and use?
Answer
   

 
   
  • Question 4
2 out of 2 points
  
 
What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?
•       Share permission (Share tab)—Sales group: Full Control
•       NTFS permission (Security tab)—Sales group: Read & Execute, Modify, Write
Answer
   

 
   
  • Question 5
2 out of 2 points
  
 
It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?
Answer
   

 
   
  • Question 6
2 out of 2 points
  
 
What is the maximum support file name length in the NTFS file system?
Answer
   

 
   
  • Question 7
2 out of 2 points
  
 
When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources, and events you want to audit. Which of the items listed is not one of the items typically considered?
Answer
   

 
   
  • Question 8
2 out of 2 points
  
 
If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder?
Answer
   

 
   
  • Question 9
0 out of 2 points
  
 
Regarding NTFS permissions, when you move NTFS files or folders from one volume to another, which of the following statements is true?
Answer
   

 
   
  • Question 10
2 out of 2 points
  
 
When using the iacls.exe utility, what flag (e.g., /?) is used to specify that the command should be executed on all files and subfolders contained in the starting folder location?
Answer
   

 
   
  • Question 11
2 out of 2 points
  
 
What is the default setting for UAC in Windows 8?
Answer
   

 
   
  • Question 12
2 out of 2 points
  
 
What is the most common method by which phishing attacks are launched?
Answer
   

 
   
  • Question 13
2 out of 2 points
  
 
What is the intended function of the User Account Control (UAC) feature in Windows?
Answer

Комментариев нет:

Отправить комментарий