Académique Documents
Professionnel Documents
Culture Documents
Page 1 of 7
Submitted by Cotto,William on 10/11/2013 10:46:32 PM Points Awarded 20.00 Points Missed Percentage 0.00 100%
1. Which NTFS folder and file special permission can add or remove the Archive, Index, Compress, and Encrypt attributes? A) Read Extended Attributes B) Write Attributes C) Write Extended Attributes Feedback: Correct.
3. In BSD SVR4, the spooling system consists of the lp print program and the lpsched daemon. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/11/2013
PD
Correct Answer(s): D
Fi
Points Earned:
1.0/1.0
ll P
DF
2. Which Netware 6.x file attribute enables a file's contents to be modified? A) Ci B) X C) Ri D) Rw Feedback: Correct.
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
D) Read Permissions
Test 5
Page 2 of 7
4. In queue-based printing, the network administrator performs several functions to set up a shared printer. The first is to install the printer and its driver in NetWare. The next step is to create a print queue for the printer. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
D) A Correct Answer(s): C
6. Which of the following file systems offers the ability to set standard and special permissions on folders and files for user accounts and for groups? A) FAT B) FAT16 C) NTFS Feedback: Correct. D) All of the above Points Earned: 1.0/1.0 Correct Answer(s): C
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/11/2013
PD
Fi
ll P
Points Earned:
1.0/1.0
DF
Ed
ito
5. Which Netware 6.x access right, when applied to a directory, enables the contents to be viewed, and when applied to a file, allows viewing the filename, whether or not the file scan right is given at the directory level? A) R B) M C) F Feedback: Correct.
rw
ith
Fr ee
rit
er an d
To
ols
Test 5
Page 3 of 7
7. When configuring file and folder attributes, if you check Read-only for a folder, the folder and the files in the folder are read-only. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
9. What octal value do the read and write attributes have when combined? A) 4 B) 5 C) 6 Feedback: Correct. D) 7 Points Earned: 1.0/1.0 Correct Answer(s): C
10. Which of the following are components of an access control list? A) DACL B) SACL C) FACL
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/11/2013
PD
Fi
ll P
DF
Ed
Correct Answer(s): B
ito
Points Earned:
1.0/1.0
rw
ith
C) 6 D) 7
Fr ee
8. What octal value do the read and execute attributes have when combined? A) 3 B) 5 Feedback: Correct.
rit
er an d
To
ols
Test 5
Page 4 of 7
D) Both a and b Feedback: Correct. E) Both b and c Points Earned: 1.0/1.0 Correct Answer(s): D
11. UNIX and Linux files are assigned any combination of three permissions: read, write, and modify. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
13. In Linux and UNIX, ownership of a folder or file can be changed by using the chown command from the root account. A) True B) False Feedback: Correct Feedback:
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/11/2013
PD
Fi
ll P
DF
12. Can a security descriptor for a server control which accounts have access to the server, or whether that server can even be accessed over the network? A) True B) False
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
Test 5
Page 5 of 7
Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
14. If you do not want subdirectories under a specific directory to inherit its rights, you can create an access control list in NetWare 6.x. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
Points Earned:
1.0/1.0
16. Disk quotas reduce the risk that a user will occupy all available disk space, including an attacker who wants to bring down a system. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect.
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/11/2013
PD
Fi
ll P
DF
Ed
ito
15. To hide a share in Windows XP/2003, place the # sign just after its name. A) True B) False
rw
ith
Fr ee
rit
er an d
To
ols
Test 5
Page 6 of 7
Points Earned:
1.0/1.0
17. In Linux/UNIX, when a directory is flagged with a(n) _____, that means a user or a group can access and list its contents. A) r B) x Feedback: Correct. C) d D) l Points Earned: 1.0/1.0
Points Earned:
1.0/1.0
19. In Windows XP/2003, the default permission on a shared folder is to give the Everyone group read permission to the folder. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/11/2013
PD
Correct Answer(s): B
Fi
ll P
DF
C) Modify D) Read
Ed
ito
rw
18. Which NTFS folder and file permission can traverse files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents? A) Full Control B) List Folder Contents Feedback: Correct.
ith
Fr ee
rit
er an d
To
ols
Correct Answer(s): B
Test 5
Page 7 of 7
20. What command is used to set up permissions in Linux/UNIX? A) chown B) perm C) chmod Feedback: Correct. D) grep Points Earned: 1.0/1.0 Correct Answer(s): C
Continue
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 10/11/2013
PD
Fi
ll P
DF
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols