InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
What Is Encrypting File System (efs)? |
|
Answer» EFS is a tool used for encrypting files and folders on client COMPUTERS and remote file SERVERS. It helps users to protect their data from unauthorized ACCESS by other users or EXTERNAL attackers. EFS is a tool used for encrypting files and folders on client computers and remote file servers. It helps users to protect their data from unauthorized access by other users or external attackers. |
|
| 252. |
Which Command Is Used To Install The Bitlocker In Windows 2008? |
|
Answer» The ServerManagerCmd -install BitLocker -RESTART COMMAND is USED to install BitLocker in Windows 2008. The ServerManagerCmd -install BitLocker -restart command is used to install BitLocker in Windows 2008. |
|
| 253. |
What Is Windows Bitlocker Drive Encryption? |
|
Answer» Windows BitLocker is a security FEATURE in the Windows Vista and Windows SERVER 2008 OPERATING systems that provides PROTECTION for the operating system on the computer and to the data stored on the operating system volume, In Windows Server 2008, BitLocker protection can also be applied to volumes used for data STORAGE. Windows BitLocker is a security feature in the Windows Vista and Windows Server 2008 operating systems that provides protection for the operating system on the computer and to the data stored on the operating system volume, In Windows Server 2008, BitLocker protection can also be applied to volumes used for data storage. |
|
| 254. |
What Are Computer Configuration Roles? |
|
Answer» ROLES based on a computer's FUNCTION are CALLED computer configuration roles. These roles are USED to SELECT features that you want to install, to enable services, and to select options. Roles based on a computer's function are called computer configuration roles. These roles are used to select features that you want to install, to enable services, and to select options. |
|
| 255. |
What Are User Authorization Roles? |
|
Answer» ROLES based on a user's job function are called user authorization roles. These roles are used to authorize access, delegate administrative PRIVILEGES, or manage interaction with computer-based resources. For EXAMPLE, you might define a Treasurer ROLE that includes the RIGHT to authorize expenditures and audit account transactions. Roles based on a user's job function are called user authorization roles. These roles are used to authorize access, delegate administrative privileges, or manage interaction with computer-based resources. For example, you might define a Treasurer role that includes the right to authorize expenditures and audit account transactions. |
|
| 256. |
What Is Role-based Management Model? |
|
Answer» ROLE-based management model ENABLES you to assign USERS to roles and GIVES a central place to record permissions assigned to each role. This model is often called role-based ACCESS control. Role-based management model enables you to assign users to roles and gives a central place to record permissions assigned to each role. This model is often called role-based access control. |
|
| 257. |
What Is Authorization Manager? |
|
Answer» Authorization Manager is a role-based security architecture for WINDOWS and used in applications that needs role-based authorization, INCLUDING ASP.NET Web applications, ASP.NET Web SERVICES, and client/server SYSTEMS based on .NET REMOTING. Authorization Manager is a role-based security architecture for Windows and used in applications that needs role-based authorization, including ASP.NET Web applications, ASP.NET Web services, and client/server systems based on .NET remoting. |
|
| 258. |
Which Feature Of Performance And Reliability Monitor Adds Counters To Log Files And Gives The Ability To Set The Start, Stop, And Duration Of Those Counters? |
|
Answer» Wizards and templates for CREATING logs add counters to LOG files and gives the ABILITY to set the start, STOP, and DURATION of those counters. Wizards and templates for creating logs add counters to log files and gives the ability to set the start, stop, and duration of those counters. |
|
| 259. |
What Is The Benefit Of Using The Performance And Reliability Monitor Tool? |
|
Answer» The Performance and Reliability Monitor tool helps you to monitor, troubleshoot, and DIAGNOSE issues that are occurring or might OCCUR, from a single location. With the use of Resource View in the Performance and Reliability Monitor tool, you can FIND out what a specific process is doing or stop a process, which is USING numerous resources. The Performance and Reliability Monitor tool helps you to monitor, troubleshoot, and diagnose issues that are occurring or might occur, from a single location. With the use of Resource View in the Performance and Reliability Monitor tool, you can find out what a specific process is doing or stop a process, which is using numerous resources. |
|
| 260. |
What Is Unified Property Configuration? |
|
Answer» Unified property configuration is an interface with the ABILITY to create and manage objects from a single LOCATION to SIGNIFICANTLY reduce the time it TAKES to set up the monitoring that the users require. Unified property configuration is an interface with the ability to create and manage objects from a single location to significantly reduce the time it takes to set up the monitoring that the users require. |
|
| 261. |
What Is The Role Of Reliability Monitor? |
|
Answer» Reliability Monitor collects data about the system and calculates a System STABILITY Index, which is a report that lists the issues that have MADE the system less reliable over a period of time. The report also contains steps that can be taken to troubleshoot the root CAUSE of the issue. Reliability Monitor provides a graphical interface for customizing performance data collection and Event Trace Sessions. Reliability Monitor collects data about the system and calculates a System Stability Index, which is a report that lists the issues that have made the system less reliable over a period of time. The report also contains steps that can be taken to troubleshoot the root cause of the issue. Reliability Monitor provides a graphical interface for customizing performance data collection and Event Trace Sessions. |
|
| 262. |
List The New Features Of The Performance And Reliability Monitor Tool? |
|
Answer» The new features of Performance and Reliability Monitor are as FOLLOWS:
The new features of Performance and Reliability Monitor are as follows: |
|
| 263. |
Which Tool Is Used To Monitor The Performance In Windows Server 2008 R2? |
|
Answer» The Performance and RELIABILITY Monitor tool is used to monitor the performance in WINDOWS 2008 R2. The Performance and Reliability Monitor tool is used to monitor the performance in Windows 2008 R2. |
|
| 264. |
What Is The Role Of Print And Document Services In Windows 2008 R2? |
|
Answer» Print and Document Services in Windows 2008 R2 ENABLES you to CENTRALIZE the print server and NETWORK printer MANAGEMENT tasks. Print and Document Services in Windows 2008 R2 enables you to centralize the print server and network printer management tasks. |
|
| 265. |
What Is Location-aware Printing? |
|
Answer» Location-Aware PRINTING allows you to SELECT different DEFAULT printers for VARIOUS networks. Therefore, you can use the same laptop in multiple locations; for example, at work and at home. The laptop can automatically select the correct default printer, depending on the location of the user. Location-Aware Printing allows you to select different default printers for various networks. Therefore, you can use the same laptop in multiple locations; for example, at work and at home. The laptop can automatically select the correct default printer, depending on the location of the user. |
|
| 266. |
Name The Groups You Should Be Member Of To Manager Remote Print Server? |
|
Answer» You must be a member of the PRINT Operators, Server Operators, or Local Administrators group on the REMOTE print server to be ABLE to MANAGE remote print server. You must be a member of the Print Operators, Server Operators, or Local Administrators group on the remote print server to be able to manage remote print server. |
|
| 267. |
What Is A Print Server? |
|
Answer» Print server is a COMPUTER on which the PRINTERS ASSOCIATED with local and NETWORK print DEVICES resides. Print server is a computer on which the printers associated with local and network print devices resides. |
|
| 268. |
What Is The Function Of Access-based Enumeration? |
|
Answer» ACCESS-based Enumeration PERMITS the users to view only those files and folders on a file SERVER to which they have PERMISSION to access. Access-based Enumeration permits the users to view only those files and folders on a file server to which they have permission to access. |
|
| 269. |
List The Steps To Share The Host Drive With Virtual Machines? |
|
Answer» PERFORM the following steps to share the host drive with virtual MACHINES:
Perform the following steps to share the host drive with virtual machines: |
|
| 270. |
Where Does The Power Users Group Share The Folder? |
|
Answer» The POWER Users GROUP SHARES the folder on the COMPUTER where the group is LOCATED. The Power Users group shares the folder on the computer where the group is located. |
|
| 271. |
Where Does The Server Operator Group Share The Folder? |
|
Answer» The SERVER Operator group SHARES the FOLDER on domain controllers. The Server Operator group shares the folder on domain controllers. |
|
| 272. |
Where Does The Administrators Group Share The Folder? |
|
Answer» The Administrator GROUP shares the folder RESIDING on any computer in the DOMAIN. The Administrator group shares the folder residing on any computer in the domain. |
|
| 273. |
What Are The Different Ways In Which A User Can Connect To A Shared Folder? |
|
Answer» A user can connect to a SHARED folder by using the following TOOLS: A user can connect to a shared folder by using the following tools: |
|
| 274. |
Name The Groups You Must Be A Member Of To Share A Folder? |
|
Answer» You MUST be a member of the ADMINISTRATOR, Server Operator, or POWER USERS group to share a folder. You must be a member of the Administrator, Server Operator, or Power Users group to share a folder. |
|
| 275. |
Which Special Permission Enables You To Browse Through A Folder, If You Do Not Have Permission To Access It? |
|
Answer» If you do not have PERMISSION to access a folder, then the TRAVERSE Folder permission ENABLES you to browse through the folder. If you do not have permission to access a folder, then the Traverse Folder permission enables you to browse through the folder. |
|
| 276. |
If An Employee Leaves An Organization, What Should Be Done To Transfer The Ownership Of His/her Files And Folders To Another Employee? |
|
Answer» You should perform the following steps for this:
You should perform the following steps for this: |
|
| 277. |
List The Basic Guidelines To Follow While Assigning Ntfs Permissions? |
|
Answer» Following are the basic guidelines:
Following are the basic guidelines: |
|
| 278. |
Where Do Permissions Assigned To Creator Owner Group Apply? |
|
Answer» The PERMISSIONS assigned to the CREATOR OWNER group APPLY only to the files and the subfolders in the FOLDER to which permissions are assigned and not to the folder itself. The permissions assigned to the CREATOR OWNER group apply only to the files and the subfolders in the folder to which permissions are assigned and not to the folder itself. |
|
| 279. |
How Can You Prevent Permission Inheritance? |
|
Answer» You can PREVENT PERMISSION INHERITANCE by setting an OPTION of preventing inheritance at parent folder level. You can prevent permission inheritance by setting an option of preventing inheritance at parent folder level. |
|
| 280. |
Explain Ntfs Permissions Inheritance? |
|
Answer» NTFS permissions INHERITANCE IMPLIES that the permissions assigned to a PARENT folder are INHERITED and propagated to the SUBFOLDERS and files contained in the parent folder. NTFS permissions inheritance implies that the permissions assigned to a parent folder are inherited and propagated to the subfolders and files contained in the parent folder. |
|
| 281. |
Does The Deny Permission Override All Permissions? |
|
Answer» YES, the DENY PERMISSION OVERRIDES all the other PERMISSIONS. Yes, the Deny permission overrides all the other permissions. |
|
| 282. |
If You Do Not Have The Permission To Access The Folder But Have The Permission On The File, Then How Will You Access The File? |
|
Answer» You need to know the full path of the FILE to ACCESS it when you do not have a folder LEVEL PERMISSION. You need to know the full path of the file to access it when you do not have a folder level permission. |
|
| 283. |
Do File Permissions Override Folder Permissions? |
|
Answer» Yes, NTFS file PERMISSIONS TAKE priority over NTFS FOLDER permissions. Yes, NTFS file permissions take priority over NTFS folder permissions. |
|
| 284. |
What Are Effective Permissions For A Resource? |
|
Answer» EFFECTIVE PERMISSIONS for a resource are the sum of the NTFS permissions that you assign to the individual user account and groups to which the user BELONGS. Effective permissions for a resource are the sum of the NTFS permissions that you assign to the individual user account and groups to which the user belongs. |
|
| 285. |
What Is Access Control List (acl)? |
|
Answer» ACL is a LIST of all the user accounts and groups that have been granted or DENIED ACCESS to a file or a folder. When a user ATTEMPTS to gain access to a resource, the ACL must contain an access control ENTRY for the user account or a group to which the user belongs. ACL is a list of all the user accounts and groups that have been granted or denied access to a file or a folder. When a user attempts to gain access to a resource, the ACL must contain an access control entry for the user account or a group to which the user belongs. |
|
| 286. |
List The Standard Ntfs File Permissions? |
|
Answer» The standard NTFS FILE permissions are as follows: The standard NTFS file permissions are as follows: |
|
| 287. |
List The Standard Ntfs Folder Permissions? |
|
Answer» The STANDARD NTFS folder permissions are as FOLLOWS:
The standard NTFS folder permissions are as follows: |
|
| 288. |
What Are The Benefits Of Using Ntfs? |
|
Answer» The following are the benefits of using NTFS:
The following are the benefits of using NTFS: |
|
| 289. |
Name The Three File Systems For Installation Partition? |
|
Answer» THREE file SYSTEMS for an installation partition are as follows:
Three file systems for an installation partition are as follows:
|
|
| 290. |
What Is Raid-5 Volume? |
|
Answer» RAID-5 VOLUMES are available only on COMPUTERS running the Windows 2000 Server family or Windows Server 2003. It stripes data and parity across three or more DISKS. Parity is a CALCULATED value used to reconstruct data if one disk fails. When a disk fails, Windows Server 2003 CONTINUES to operate by recreating the data that was on the failed disk from the remaining data and parity, RAID-5 volumes are available only on computers running the Windows 2000 Server family or Windows Server 2003. It stripes data and parity across three or more disks. Parity is a calculated value used to reconstruct data if one disk fails. When a disk fails, Windows Server 2003 continues to operate by recreating the data that was on the failed disk from the remaining data and parity, |
|
| 291. |
What Is Mirrored Volume? |
|
Answer» A mirrored volume provides a copy of a volume on another DISK. This is a fault-tolerant volume, which provides data redundancy by duplicating the information CONTAINED on the volume. The two disks that make up a mirrored volume are KNOWN as MIRRORS. A mirrored volume provides a copy of a volume on another disk. This is a fault-tolerant volume, which provides data redundancy by duplicating the information contained on the volume. The two disks that make up a mirrored volume are known as mirrors. |
|
| 292. |
What Is Striped Disk Volume? |
|
Answer» Striped disk volumes are made up of stripes of DATA of equal size written across each disk in the volume. They are created from equally SIZED, unallocated AREAS on two or more disks. If one of the disks containing a striped volume fails, the ENTIRE volume fails, and all data on the striped volume BECOMES inaccessible. Striped disk volumes are made up of stripes of data of equal size written across each disk in the volume. They are created from equally sized, unallocated areas on two or more disks. If one of the disks containing a striped volume fails, the entire volume fails, and all data on the striped volume becomes inaccessible. |
|
| 293. |
What Are Spanned Disk Volumes? |
|
Answer» SPANNED disk VOLUMES combine areas of unallocated SPACE from multiple DISKS into one logical volume. They require minimum of two disks; HOWEVER, you can use up to 32 disks. Spanned disk volumes combine areas of unallocated space from multiple disks into one logical volume. They require minimum of two disks; however, you can use up to 32 disks. |
|
| 294. |
How Many Types Of Dynamic Volumes Are There? |
|
Answer» Following five types of dynamic VOLUMES are available: Following five types of dynamic volumes are available: |
|
| 295. |
What Is Disk Management? |
|
Answer» Disk Management is a utility for managing hard DISKS and the volumes or PARTITIONS. It HELPS in initializing disks, creating volumes, and formatting volumes with the FILE Allocation Table (FAT), FAT32, or New Technology File System (NTFS) file systems. Disk Management is a utility for managing hard disks and the volumes or partitions. It helps in initializing disks, creating volumes, and formatting volumes with the File Allocation Table (FAT), FAT32, or New Technology File System (NTFS) file systems. |
|
| 296. |
What Is Lun? |
|
Answer» LUN is a LOGICAL REFERENCE to a PORTION of a STORAGE subsystem. It CONSISTS of a disk, a section of a disk, a whole disk array, or a section of a disk array in the subsystem. LUN is a logical reference to a portion of a storage subsystem. It consists of a disk, a section of a disk, a whole disk array, or a section of a disk array in the subsystem. |
|
| 297. |
What Is The Use Of Storage Manager For Sans? |
|
Answer» STORAGE Manager for SANS is used to CREATE and manage Logical Unit Numbers (LUNs) on Fibre CHANNEL and iSCSI DISK drive subsystems that support Virtual Disk Service (VDS) in SAN. Storage Manager for SANs is used to create and manage Logical Unit Numbers (LUNs) on Fibre Channel and iSCSI disk drive subsystems that support Virtual Disk Service (VDS) in SAN. |
|
| 298. |
What Is The Use Of Storage Explorer? |
|
Answer» Storage Explorer is USED to view and MANAGE the Fibre CHANNEL and iSCSI FABRICS that are available in your Storage AREA Network (SAN). Storage Explorer is used to view and manage the Fibre Channel and iSCSI fabrics that are available in your Storage Area Network (SAN). |
|
| 299. |
What Is Share And Storage Management? |
|
Answer» Share and Storage Management PROVIDES a CENTRALIZED LOCATION to manage the following server resources: Share and Storage Management provides a centralized location to manage the following server resources: |
|
| 300. |
What Is File Server Resource Manager? |
|
Answer» File Server RESOURCE Manager is a SUITE of tools for Windows Server that allows administrators to control, manage, and UNDERSTAND the quantity and TYPE of DATA stored on their server. File Server Resource Manager is a suite of tools for Windows Server that allows administrators to control, manage, and understand the quantity and type of data stored on their server. |
|