Preview

Chapter 17 WOS review

Good Essays
Open Document
Open Document
627 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 17 WOS review
Chapter 17

Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.
Write, Read
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.
False
Which statements is true about controlling access to folders and files?
Rights are assigned to accounts
Which of the following is NOT true about Group Policy?
All policies are applied before the logon screen appears
To which group does Windows give access to folders that you create which are not part of your user profile?
Authenticated Users
If you want to be able to power up a computer remotely, what feature should you use?
Wol
Which of the following is true about which folders to use to hold shared data when working with a workgroup?
Private data for each user should be kept in their c:\users folder
Which of the following is a task you CAN’T do from the IE General tab?
Disable file downloads
Which of the following is described as computer that intercepts requests that a browser makes of a server and can cache received content.
Proxy server
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\\server\sharedfolder
Which type of permission should you set to control access to files and folders by local and network users?
NTFS on NTFS volumes only
Which built-in group might Windows automatically assign a user account to when determining its permissions?
Anonymous users
When troubleshooting a live network cable, what should you use?
A loopback plug
The default value of the security level in IE is Medium-high.
True
On the IE General tab you can block cookies.
False
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
True
Which of the following is NOT true about Remote Desktop?
By default all users can access Remote Desktop
When all users

You May Also Find These Documents Helpful

  • Satisfactory Essays

    COMP 230 WK 1 7 QUIZ

    • 2401 Words
    • 33 Pages

    (TCO 1) Which one of the following Windows NET commands will allow other computers to access the C:\Data directory under the share nameUserData?…

    • 2401 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 9 Final Paper

    • 1822 Words
    • 8 Pages

    Which of the following activities is not part of the computer agreement of batch totals?…

    • 1822 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 1

    • 627 Words
    • 6 Pages

    Overview The Remote Desktop feature in Windows 7 does not require a user to be…

    • 627 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    The workstation domain is where a user can connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled. A strong password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic screen lock, which requires the user to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Chapter 20 WOS review

    • 512 Words
    • 3 Pages

    A setting called airplane mode lowers the output power of the Wi-Fi and Bluetooth antennas allowing these networks to function, but at a reduced range?…

    • 512 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1430 Chapter 6 labs

    • 297 Words
    • 3 Pages

    1. Determine the permissions of various files and directories on the system. Fill in the chart below:…

    • 297 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Quiz 5

    • 507 Words
    • 9 Pages

    When assigning permissions, it is best to assign them to ____________ rather than to individual…

    • 507 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? What type of access control would best describe this access control situation?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    7. Your workstation is running Windows 7 Professional and you decide to share a folder on your computer. Twenty-two people in your office are trying to connect to that folder at the same time over the network. The first 20 people can connect, the other two cannot. To fix this you could __.…

    • 747 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays