Ask Auditing Expert

Part 1-

1. What are the two actions that need to be done when you need to audit whether a file is being read by a certain user? (Choose two answers.)

a. You need to specify which folders and files to audit.
b. You need to add a checksum to the file to be audited.
c. You need to enable object auditing.
d. You need to add an audit digital certificate to the system where the files reside.

2. What do you use to extend the Active Directory schema to store UNIX attributes?

a. NFS Management console
b. Server for NFS role
c. Computer Management console
d. Identity Management for UNIX

3. At the corporate office, you have a file server called Server01 . At a remote site, you installed BranchCache on Server02, which is acting as a BranchCache hosted cache server. To move things along, you decide to preload the data from the file shares on Server1 to the cache on Server02. What would generate the hashes for the file share on Server01?

a. Use the Enable- BCCache PowerShell cmdlet.
b. Use the Publish-BCCache PowerShell cmdlet.
c. Use the Export-BCCachepackage PowerShell cmdlet.
d. Use the Set-BCCache PowerShell cmdlet.

4. To fully use Identity Management for UNIX, what are the three components that you have to install? (Choose three answers.)

a. nis
b. adminui
c. Unix-add
d. psync

5. Which two commands allow you to specify the cache size for BranchCache hosted cache server?

a. netsh set cachsize command
b. netsh set publicationcachezie command
c. Set-BCCacheSize PowerShell cmdlet
d. Set-BCCache PowerShell cmdlet

Part 2-

1. What is the best way to enable Access-Denied Assistant for all of your file servers?

a. Dynamic Access Control console
b. File Server Resource Manager
c. Active Directory Administrative Center
d. Group Policy Objects

2. Which of the following can you perform when using DAC? (Choose all that apply.)

a. Audit access by using an audit policy.
b. Encrypt all files on a server.
c. Classify and tag data.
d. Provide Access-Denied Assistance when a user is denied access to a shared file.
e. Allow connections from mobile phones to files protected by DAC.

3. Which of the following are required when using DAC? (Choose two answers.)

a. Classification rules
b. Resource properties
c. Claim types
d. Staging

4. What would you use to perform targeted auditing?

a. Staging
b. Advanced logging
c. Dynamic logging
d. Global Object Access Auditing

5. How can you manually classify files in a folder?

a. Folder properties
b. File Server Resource Manager
c. Dynamic Access Control console
d. Active Directory Administrative Center

Part 3-

1. You have around 30 servers, all running Windows Server 2012 and each using iSCSI storage. Your small team of administrators is complaining that it is becoming difficult to locate the available iSCSI resources on the network. What can you use to help administrators quickly locate iSCSI resources?

a. DNS
b. iSNS
c. iSCSI Target Storage Provider
d. Windows Standard-Based Storage Management feature

2. You have a new virtual machine running Windows Server 2012. It has a C drive and a D drive. The D drive is a 200 GB fixed disk. However, you notice that after a couple of months, much of the drive is not being used. What should you do so that you don't use as much space?

a. Convert the disk to the dynamically expanding disk.
b. Create a differencing disk so that you can remove the unused space.
c. Compact the disk.
d. Run a defrag.

3. You have a physical server running Windows Server 2012. It has a 40 GB fixed disk. You are running out of space on the C drive and you don't want to replace the hard drive. Therefore, what can you do to free up disk space on the C drive?

a. Convert the drive to a dynamically expanding disk.
b. Compact the disk.
c. Defrag the hard drive.
d. Remove binaries for features that are not being used.

4. Which Windows PowerShell cmdlet would you use to view the iSCSI initiator connections?

a. Get-IscsiConnection
b. Get-IscsiSession
c. Get-IscsiTarget
d. Connect-IscsiTarget

5. You are configuring an iSCSI Target Server role and multiple volumes that will be assigned to multiple servers using iSCSI initiators. Because these servers contain confidential information, you want to make sure that they are not accessed by other servers using an iSCSI initiator. What should you do?

a. Specify the initiator ID that can connect when creating the iSCSI virtual disk.
b. Specify the initiator ID that can connect when creating the iSCSI target.
c. Enable IPSec.
d. Configure the iSCSI ACL list when you configure the iSCSI initiator.

Auditing, Accounting

  • Category:- Auditing
  • Reference No.:- M91783579
  • Price:- $15

Priced at Now at $15, Verified Solution

Have any Question?


Related Questions in Auditing

Group assignment themedeveloping an audit program for a

Group Assignment Theme: "Developing an Audit Program for a selected ASX listed Company" The objective of this group assignment is to provide you with an opportunity to design a "risk-based" audit program for a real world ...

Question 1while assessing the risk of material misstatement

Question 1 While assessing the risk of material misstatement and determining the appropriate response with regard to the inventory of Computing Solutions Limited (Computing Solutions) for the 30 June 2018 audit, you beco ...

Case - target energyin this assignment you are assumed to

Case - Target energy In this assignment you are assumed to be an auditor who has just been appointed by your auditing firm to perform the audit at a particular client. You are in the process of understanding the client a ...

Assignment total quality management -question 1 -a a

Assignment total quality management - QUESTION 1 - A. A defense contractor, manufacturers rifles for the military. The military has exerting quality standards that the contractor must meet. The military is very much plea ...

Questionit has been recommended that lsquoaudit working

Question It has been recommended that ‘Audit working papers should always be sufficiently complete and detailed to enable an experienced auditor with no previous connection with the audit subsequently to ascertain from t ...

Audit current file -mighty mining ltdaudit tasks1

AUDIT CURRENT FILE -MIGHTY MINING LTD AUDIT TASKS: 1. ACCEPTANCE DECISION - AUDIT OF MIGHTY MINING LTD 2018 - Assess whether it is ethical for BMS to accept the audit engagement of MML for 2018. Refer to APES110 (2017 ve ...

Audit assurance and compliance assignment -topic how is

Audit, Assurance and Compliance Assignment - Topic: How is Enhanced Auditor Reporting being embraced in Australia? Background and Context: Since 2016, there has been a strong push to improve the quality of audit reportin ...

Audit assurance and compliance assignment -topic how is

Audit, Assurance and Compliance Assignment - Topic: How is Enhanced Auditor Reporting being embraced in Australia? Background and Context: Since 2016, there has been a strong push to improve the quality of audit reportin ...

Audit assurance and compliance assignment -topic how is

Audit, Assurance and Compliance Assignment - Topic: How is Enhanced Auditor Reporting being embraced in Australia? Background and Context: Since 2016, there has been a strong push to improve the quality of audit reportin ...

Topic how is enhanced auditor reporting being embraced in

Topic: How is Enhanced Auditor Reporting being embraced in Australia? Background and Context: Since 2016, there has been a strong push to improve the quality of audit reporting. Listed entities now have to report on "key ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As