What is the best way to enable access-denied assistant

Assignment Help Auditing
Reference no: EM131059183

Part 1-

1. What are the two actions that need to be done when you need to audit whether a file is being read by a certain user? (Choose two answers.)

a. You need to specify which folders and files to audit.
b. You need to add a checksum to the file to be audited.
c. You need to enable object auditing.
d. You need to add an audit digital certificate to the system where the files reside.

2. What do you use to extend the Active Directory schema to store UNIX attributes?

a. NFS Management console
b. Server for NFS role
c. Computer Management console
d. Identity Management for UNIX

3. At the corporate office, you have a file server called Server01 . At a remote site, you installed BranchCache on Server02, which is acting as a BranchCache hosted cache server. To move things along, you decide to preload the data from the file shares on Server1 to the cache on Server02. What would generate the hashes for the file share on Server01?

a. Use the Enable- BCCache PowerShell cmdlet.
b. Use the Publish-BCCache PowerShell cmdlet.
c. Use the Export-BCCachepackage PowerShell cmdlet.
d. Use the Set-BCCache PowerShell cmdlet.

4. To fully use Identity Management for UNIX, what are the three components that you have to install? (Choose three answers.)

a. nis
b. adminui
c. Unix-add
d. psync

5. Which two commands allow you to specify the cache size for BranchCache hosted cache server?

a. netsh set cachsize command
b. netsh set publicationcachezie command
c. Set-BCCacheSize PowerShell cmdlet
d. Set-BCCache PowerShell cmdlet

Part 2-

1. What is the best way to enable Access-Denied Assistant for all of your file servers?

a. Dynamic Access Control console
b. File Server Resource Manager
c. Active Directory Administrative Center
d. Group Policy Objects

2. Which of the following can you perform when using DAC? (Choose all that apply.)

a. Audit access by using an audit policy.
b. Encrypt all files on a server.
c. Classify and tag data.
d. Provide Access-Denied Assistance when a user is denied access to a shared file.
e. Allow connections from mobile phones to files protected by DAC.

3. Which of the following are required when using DAC? (Choose two answers.)

a. Classification rules
b. Resource properties
c. Claim types
d. Staging

4. What would you use to perform targeted auditing?

a. Staging
b. Advanced logging
c. Dynamic logging
d. Global Object Access Auditing

5. How can you manually classify files in a folder?

a. Folder properties
b. File Server Resource Manager
c. Dynamic Access Control console
d. Active Directory Administrative Center

Part 3-

1. You have around 30 servers, all running Windows Server 2012 and each using iSCSI storage. Your small team of administrators is complaining that it is becoming difficult to locate the available iSCSI resources on the network. What can you use to help administrators quickly locate iSCSI resources?

a. DNS
b. iSNS
c. iSCSI Target Storage Provider
d. Windows Standard-Based Storage Management feature

2. You have a new virtual machine running Windows Server 2012. It has a C drive and a D drive. The D drive is a 200 GB fixed disk. However, you notice that after a couple of months, much of the drive is not being used. What should you do so that you don't use as much space?

a. Convert the disk to the dynamically expanding disk.
b. Create a differencing disk so that you can remove the unused space.
c. Compact the disk.
d. Run a defrag.

3. You have a physical server running Windows Server 2012. It has a 40 GB fixed disk. You are running out of space on the C drive and you don't want to replace the hard drive. Therefore, what can you do to free up disk space on the C drive?

a. Convert the drive to a dynamically expanding disk.
b. Compact the disk.
c. Defrag the hard drive.
d. Remove binaries for features that are not being used.

4. Which Windows PowerShell cmdlet would you use to view the iSCSI initiator connections?

a. Get-IscsiConnection
b. Get-IscsiSession
c. Get-IscsiTarget
d. Connect-IscsiTarget

5. You are configuring an iSCSI Target Server role and multiple volumes that will be assigned to multiple servers using iSCSI initiators. Because these servers contain confidential information, you want to make sure that they are not accessed by other servers using an iSCSI initiator. What should you do?

a. Specify the initiator ID that can connect when creating the iSCSI virtual disk.
b. Specify the initiator ID that can connect when creating the iSCSI target.
c. Enable IPSec.
d. Configure the iSCSI ACL list when you configure the iSCSI initiator.

Reference no: EM131059183

Questions Cloud

Change in momentum of the clay and ball : You throw a bouncy rubber ball and a wet lump of clay, both of mass m, at a wall. Both strike the wall at speed v, but while the ball bounces off with no loss of speed, the clay sticks. What is the change in momentum of the clay and ball
Complete the robins federal tax return : Warner and Augustine Robins, both 33 years old, have been married for 9 years. They live at 638 Russell Parkway, Macon, GA 31207. The Dragon Lady stock is owned 40 percent by Warner, 40 percent by Augustine, and 20 percent by Warner father. Complete ..
Distance from the bottom of the tube : It turns out that the winner manages to wash away 14.2 cm of sand. How deep did the winner dive? Note: define the depth as the distance from the bottom of the tube to the surface of the water.
Electric force due to the other two particles : Where must a third charged particle be placed along the y-axis so that it does not experience any net electric force due to the other two particles?
What is the best way to enable access-denied assistant : What is the best way to enable Access-Denied Assistant for all of your file servers? Which two commands allow you to specify the cache size for BranchCache hosted cache server?
How companies use the theory relating to adaptation : Use the Theory relating to Adaptation, Aggregation and Arbitrage to explain how companies from the following industries have used this theory for the pursuit of their businesses
Total productive efficiency can be defined : Total productive efficiency can be defined as
Approval rules for reimbursing those faculty members : The approval rules for reimbursing those faculty members at Upstate University who attend professional conferences are somewhat complicated, and in the opinion of most, "hardly generous."
What is the net income for firm and earnings per share : Fyre, Inc., has sales of $625,000, costs of $260,000, depreciation expense of $79,000, interest expense of $43,000, and a tax rate of 35 percent. What is the net income for this firm? Suppose the firm had 40,000 shares of common stock outstanding. Wh..

Reviews

Write a Review

Auditing Questions & Answers

  Journal entries for howe office supply

On September 1, Howe Office Supply had an inventory of 30 calculators at a cost of $18 each.The company uses a perpetual inventory system. During September, the following transactions occurred.

  Auditing issues-kent-cpa and davidson corp

Kent, CPA, is engaged in the audit of Davidson Corp.'s financial statements for the year ended December 31, 20XX. Kent is about to commence auditing Davidson's employee pension expense,

  Instructionsthe following is the secs accounting and

instructionsthe following is the secs accounting and auditing enforcement releases where a fraud and related industry

  Identify the weaknesses in the stocktake procedures

Identify the weaknesses in the stocktake procedures above and identify how they could be improved and describe audit procedures to ensure the accuracy of the summary of property plant and equipment.

  Autonomy of mexico central bank

In 1993, President Carlos Salinas de Gortari proposed a bill that would formally grant the Bank of Mexico-As an investor, how would you view such a proposal? What other changes might help to amplify the signals sent by this proposal?

  Your audit firm has recently been engaged

Your audit firm has recently been engaged as the new auditor for Pinnacle Manufacturing effective for the audit of the financial statements for the year ended December 31, 2013.

  Bank and investor

Do some research on your bank using the Internet and the CyberLibrary, and write a short paper that put it all together in making a recommendation on whether or not you think one should buy shares in your bank as part of your own investment portfo..

  Companies and auditors now operate in a global environment

1.Companies and auditors now operate in a global environment and need to be aware of potential risks that stem from subsidiaries,

  Increase the value of the audit service

Busch Corporation has an existing loan in the amount of $6 million with an annual interest rate of 6.0%. The company provides an internal company prepared financial statement to the bank under the loan agreement.

  Identify principal audit risk

To identify principal audit risk and corresponding audit procedures

  Describe any limitations of the given research paper

Why is this paper important to auditors, and what are the implications of this paper for the auditing profession? Describe the research methodology used as a basis for the conclusions. Describe any limitations of the research.

  Audit program and purposes it serves

List at least eight different types of procedures an auditor would use in examining financial statements. For example, a type of procedure an auditor would use frequently is the observation of activities and conditions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd