Tuesday, 29 September 2015

CIS 329 Week 8 Quiz 3

CIS 329 Week 8 Quiz 3  


CIS 329 Week 8 Quiz 3


 


Time Elapsed     1 hour, 28 minutes out of 2 hours.


Instructions        This quiz consists of 25 multiple choice questions and covers the material in Lessons 14 through 18. There are five questions from each lesson.


  • Question 1

2 out of 2 points


 


How do you start the process to modify the default homegroup sharing configuration?


 


 


  • Question 2

2 out of 2 points


 


Which of the following statements is true of Public folder sharing?


 


  • Question 3

0 out of 2 points


 


For users at home, which file sharing is most likely the simplest to setup and use?


 


  • Question 4

2 out of 2 points


 


What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?


  • Share permission (Share tab)—Sales group: Full Control

  • NTFS permission (Security tab)—Sales group: Read & Execute, Modify, Write

 


  • Question 5

2 out of 2 points


 


It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?


 


  • Question 6

2 out of 2 points


 


What is the maximum support file name length in the NTFS file system?


 


  • Question 7

2 out of 2 points


 


When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources, and events you want to audit. Which of the items listed is not one of the items typically considered?


  • Question 8

2 out of 2 points


 


If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder?


 


  • Question 9

 


Regarding NTFS permissions, when you move NTFS files or folders from one volume to another, which of the following statements is true?


 


  • Question 10

2 out of 2 points


 


When using the iacls.exe utility, what flag (e.g., /?) is used to specify that the command should be executed on all files and subfolders contained in the starting folder location?


 


  • Question 11

2 out of 2 points


 


What is the default setting for UAC in Windows 8?


 


  • Question 12

2 out of 2 points


 


What is the most common method by which phishing attacks are launched?


 


  • Question 13

2 out of 2 points


 


What is the intended function of the User Account Control (UAC) feature in Windows?


 


  • Question 14

2 out of 2 points


 


How long after you complete the configuration of local security policies on a computer will it take for those policies to become effective?


 


  • Question 15

0 out of 2 points


 


How can you fully disable UAC in Windows 8?


 


  • Question 16

2 out of 2 points


 


What must you do, at a minimum, before you can manage domain objects on a Windows 8 workstation?


 


  • Question 17

2 out of 2 points


 


Where are user accounts stored for computers that are in a workgroup?


 


  • Question 18

2 out of 2 points


 


Which of the following is not an allowed gesture for a picture password?


 


 


  • Question 19

2 out of 2 points


 


Which of the following items is not supported as a method of authentication in Windows 8?


 


  • Question 20

2 out of 2 points


 


Generally speaking, which of the following password conditions is not considered to be part of a strong password?


 


  • Question 21

2 out of 2 points


 


If you have Windows 8 Professional workstation clients on your network, what single BranchCache protocol will they be limited to using?


 


  • Question 22

2 out of 2 points


 


When using distributed-cache mode for BranchCache, where is the cache hosted in the branch office?


 


On Windows 8 computers in the branch office


 


  • Question 23

2 out of 2 points


 


You must deploy at least one or more BranchCache-enabled servers at your main office to enable BranchCache. Which of the following server types is not an option as a BranchCache-enabled server?


 


  • Question 24

0 out of 2 points


 


What is the main difference between BranchCache version 1 and version 2?


 


  • Question 25

0 out of 2 points


 


What advantage does the usage of SSTP for VPN connections offer firewall administrators?


Course Home Work aims to provide quality study notes and tutorials to the students of  CIS 329 Week 8 Quiz 3 in order to ace their studies.


Course Home Work – Best Home Work Tutorials


Home Work CIS 329 Week 8 Quiz 3

CIS 329 Week 8 Quiz 3


Course Home Work,  CIS 329 Week 8 Quiz 3  , Home Work Tutorials, Home Work Solutions, Home Work Essay, Home Work Questions.ACC 565 Wk 7 Assignment 3, ACC403 week 2 assignment, ACC565 Week 10, ACCT 212 (Financial Accounting),  ACCT 344 (Entire Course) – Devry, ACCT 344 Final Exam Latest 2014 – Devry,  ACCT 346 (Managerial Accounting), ACCT 346 Midterm Exam Updated DeVry, ACCT 504, ACCT 504 Week 8, ACCT 553, ART 101 Week 8, Ashford BUS 401, ASHFORD BUS 640, Ashford HIS 204, ASHFORD MAT 222 Week 3, BA 215 (Business Statistics), BA 215 All Assignments Week 1 -8 – Grantham, BA 225, BA 260, BA 265 (Business Law II), BA 265 (Business Law II) FINAL EXAM, BA 340 All Course Assignments, BA 340 Human Resource, BA 370 (Employment Law), BA 405 Multinational Management, BA 470 Week 3 – 5 – 6 – 7, BA 470 Entrepreneurship, BA350 Principles Of Finance, BIS 155 Final Exam – DeVry, BIS 220 Final Exam, BSOP 429, BSOP 434 Entire Course – Devry, BUS 303 Week 2, BUS 303 Week 3, BUS 303 Week 5, BUS 311 Business Law, BUS 330 Week 1, BUS 330 Week 3, BUS 330 Week 5, BUS 401 Week 4 DQ 1, BUS 401 Week 4 DQ 2, BUS 402 WEEK 4, BUS 405 (Principles of Investment), BUS 475, BUS 475 Final Exam 100 MCQS, BUS 475 Final Exam 600 MCQS, BUS 599 (STRAYER), BUS 599 Assignment, BUS 620 Week 4, BUS 640 Week 1, BUS499 Asignment 4, BUS508 Asignment 1, BUS499 Assignment 3.



CIS 329 Week 8 Quiz 3

No comments:

Post a Comment