Top-Rated Free Essay
Preview

Ballad Access Lab03 AW 1ER

Satisfactory Essays
336 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ballad Access Lab03 AW 1ER
52

LA B | Configure Windows File System Permissions

LAB – ASSESSMENT WORKSHEET

Configure Windows File System Permissions
Course Name and Number:
IS3230

Student Name:
Jeremy Cox

Instructor Name:
Lab Due Date:

Overview
In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed.

Lab Assessment Questions & Answers
1. When you designed a file system in the first section of this lab, why did you choose the structure that you

selected?
Because it is the most basic and easy to understand. Only people who need access will have access and everyone is separate from one another

2. As you look back on the file structure that you created, what changes would you want to make if you

were to use it for a real college environment?
I would have anything to do with the faculty or faculty business separate from the students information or folders that they have access too.

38399_LMxx_Lab03.indd 52

9/10/12 1:08 PM

Assessment Worksheet

53

3. In this lab, you assigned members of the Faculty group full control of the Assignments folder. What risk

does this pose?
Any faculty member or anyone with proper credentials can do whatever they like with the folder including corruption and deletion.

4. What could you do to correct the situation described in question 3?

I would not give full permissions. They can have permission to read write and execute

5. What Windows file security attribute allows a user to move through a folder to access files and folders

beneath it?
List data/Read file

Read

38399_LMxx_Lab03.indd 53

Configure Windows File
System Permissions

6. What Windows file security attribute allows a user to view a file’s contents?

9/10/12 1:08 PM

38399_LMxx_Lab03.indd 54

9/10/12 1:08 PM

You May Also Find These Documents Helpful

  • Good Essays

    • Depositor - user/users group with access rights to create database documents and not view them afterwards (excluding, possible, Public…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    Share permissions: The shared permissions are only applicable to users that are accessing a file over the network. If the user is local administrator to the server (or workstation) the directory resides on that user would be able to access.…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Create a new domain wide GPO and enable "Deny logon locally" user right to the source domain user accounts and disable multiple logon. Teach strong password use and force change through Password GPO.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    7. In terms of file or directory permissions, what does U-G-O stand for? User Group Other What are the 3 permission that can be given to a file or directory? r=read w=write x=execute…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Study Guide

    • 2626 Words
    • 11 Pages

    assigned you to set up a small server to provide basic file services to faculty, staff, and students in that…

    • 2626 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    If you want to organize your information into "file cabinets" which you can access easily, quickly view, and work from what is contained within, see Section A.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    1 - The person who transfers and the person to the one that is transferred the power must be identified.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays

Related Topics