Top-Rated Free Essay
Preview

Unit 3 Assessment

Satisfactory Essays
321 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assessment
52

LA B | Configure Windows File System Permissions

LAB – ASSESSMENT WORKSHEET

Configure Windows File System Permissions
Course Name and Number:
IS3230 Access Security

Student Name:
Steve Guzman

Instructor Name:
Ms. Matykowski

Lab Due Date:

Overview
In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed.

Lab Assessment Questions & Answers
1. When you designed a file system in the first section of this lab, why did you choose the structure that you

selected?
To keep an organizational structure of the classes being offered.

2. As you look back on the file structure that you created, what changes would you want to make if you

were to use it for a real college environment?
I would probably add a couple of folders under each course folder labeled "Completed Students
Assignments", other than that the structure is simple enough to maintain and keep organized.

38399_LMxx_Lab03.indd 52

9/10/12 1:08 PM

Assessment Worksheet

53

3. In this lab, you assigned members of the Faculty group full control of the Assignments folder. What risk

does this pose?
They can make unwarranted changes the folders, throwing off the structure of the folders or files.

4. What could you do to correct the situation described in question 3?

Assigning permissions to correct users based on what access they need.

5. What Windows file security attribute allows a user to move through a folder to access files and folders

beneath it?
Traverse Folder

Read Attributess

38399_LMxx_Lab03.indd 53

Configure Windows File
System Permissions

6. What Windows file security attribute allows a user to view a file’s contents?

9/10/12 1:08 PM

38399_LMxx_Lab03.indd 54

9/10/12 1:08 PM

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    8. In terms of permissions, what does 777 mean? Everyone can read write and execute…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    If you want to organize your information into "file cabinets" which you can access easily, quickly view, and work from what is contained within, see Section A.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Assignment1

    • 354 Words
    • 5 Pages

    Use the table in the data file below to answer these questions regarding file structure:…

    • 354 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    3. There is a proper management of files because they are stored at the same place; files are easier to find.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Application Excersice 4

    • 429 Words
    • 2 Pages

    1. Identify whether each characteristic listed below generally belongs to a file-based system or to a database system.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unix File

    • 566 Words
    • 3 Pages

    In order to understand how to control access to a file in a system that supports 5,000 users to 4,990 of those users, a basic understanding of the file permissions of a file on a UNIX system is necessary. A user has the ability to perform three basic actions to a file, read, write and execute. These three actions will be represented by r, w, and x respectively. A UNIX system uses a combination of these characters to control the file permissions. The first three characters represent the owner’s permissions, the middle three characters represent the group’s permissions, and the last three characters represent others permission. A sample of file permission would look like the following:…

    • 566 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    UNIX Commands Table

    • 426 Words
    • 3 Pages

    Allows the user to read only on specific files not allowing them to change the file.…

    • 426 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    – Describe the physical and logical attributes of aggregates and flexible and traditional volumes – Use the command line and FilerView to create and manage aggregates, flexible volumes and traditional volumes. – Describe space considerations associated with flexible volume creation and resizing options – List the conditions required for the removal of aggregates and flexible and traditional volumes – Describe the performance characteristics and benefits of using Aggregates and Flexible volumes – Analyze and execute the available tools to fix inconsistent file systems with aggregates and flexible volumes – Describe and execute new maintenance mode commands on aggregates and flexible volumes…

    • 11355 Words
    • 46 Pages
    Powerful Essays
  • Powerful Essays

    Isys104 Tutorial – Week 7

    • 3300 Words
    • 14 Pages

    Problems with the traditional file environment include data redundancy and confusion, program-data dependence, lack of flexibility, poor security, and lack of data sharing and availability. Data redundancy is the presence of duplicate data in multiple data files. In this situation, confusion results because the data can have different meanings in different files. Program-data dependence is the tight relationship between data stored in files and the specific programs required to…

    • 3300 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Physical Design

    • 7944 Words
    • 32 Pages

    * Arranging similarly structured records in secondary memory (primary hard disks) so that individual and groups of records (called file organizations) can be stored, retrieved and updated rapidly. Consideration may also be given to protect data and recovering data after errors are found.…

    • 7944 Words
    • 32 Pages
    Good Essays
  • Good Essays

    Linux Security

    • 8388 Words
    • 34 Pages

    As for file permission, all files and directories pertaining to a UNIX system are marked with three sets of file permissions. These permissions are used to establish the way these files can be accessed and the…

    • 8388 Words
    • 34 Pages
    Good Essays
  • Good Essays

    File Management

    • 572 Words
    • 2 Pages

    File management in any computer system is a very crucial function. Proper file management alleviates everyday issues in file protection, to allow a smooth experience for users. Using file protection for operating systems, such as Unix, can be very easy and simple. Unix is a multiuser operating system that is used on a wide range of machines from powerful microcomputers to supercomputers (Stallings, 2012). In Unix, permissions are configured to allow owner(s) to define different permissions of files by restricting or permitting access where needed. These permissions are set to categories of owner, group, and other permissions. In early versions of file control and access for Unix, users where assigned a user identification number. These users also were members of groups and a group identification number identified each group. Now when a file is created by a user, not only is the file owned by a specific owner, but by the owners primary group as well. Attached to files are protection bits, where read, write, and execute permissions are specified and carried down to other users of the group/groups the owner belongs to. Anyone can see the issue that lies in this type of file access control. What happens when the owner desires only specific users or no users at all to have access to the created file?…

    • 572 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Db vs File System

    • 536 Words
    • 3 Pages

    A customised file system provides hierarchical storage and organization of files mostly on a single computer and it is usually part of the operating system of the computer the files are stored.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Each file is assigned a set of 12 protection bits. Nine of the protection bits assigned to a file are used to specify read, write, and execute permission for the owner, members of the group, and all other users. The other three bits are used to specify the file’s other behaviors. Two of the remaining bits are the SetUID and SetGID, and the final bit is known as the “Sticky” bit. The Sticky bit is no longer used, but was used to tell the system to keep a file in many after it is executed.…

    • 491 Words
    • 2 Pages
    Good Essays

Related Topics