Preview

microsoft notes

Good Essays
Open Document
Open Document
1216 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
microsoft notes
1.
A user would like to secure files stored on a floppy disk. Which file system should they select to format the disk?
A) NTFS
B) UDF
C) FAT
D) CDFS
Points Earned: 1.0/1.0
Correct Answer(s): C
Correct
2.
A hard link can point to a folder on a different computer. True or False?
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s): B
Correct
3.
When assigning NTFS permissions an ACE entry can explicitly define who is denied access to a resource, True or False?
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s): A

Correct
4.
A user would like to secure files stored on a hard disk. Which file system should they select to format the disk?
A) NTFS
B) UDF
C) FAT16
D) FAT32
E) SECF
Points Earned: 1.0/1.0
Correct Answer(s): A
Correct
5.
A user is given Read permission to a file stored on a NTFS formatted volume. The file is then copied to a folder on the same NTFS formatted volume where the user has been given Full Control permission to that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter what is the user’s effective permission to the file?
A) Read
B) Full Control
C) No access
D) Modify
E) None of the above
Points Earned: 1.0/1.0
Correct Answer(s): B

Correct
6.
A user has been granted Full Control to a NTFS folder on your computer. The user has created all the documents that exist in the folder. Another administrator accidentally adds a permission setting denying the Write permission to that user. The next time that user logs in and opens the file, when they try to save their changes to the file they will notice?
A) The changes to the file are written as expected
B) Access to save the changes is denied
C) User Access Control will prompt them to allow administrative access
D) The permissions will automatically update to allow the user access
E) A shadow copy is created
Points Earned: 1.0/1.0
Correct Answer(s): B
Correct

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Week 1 Lab 1

    • 107 Words
    • 1 Page

    The Physical storage location of the file changed. Once it was saved the Networking folder the data went from memory to the hard drive.…

    • 107 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Encryption Wizard is an easy-to-use Java-based file and folder encryption tool. It 's been developed by the US military but this version is free for anyone to use. The program is extremely small, just a 1.23MB JAR file and a couple of help files, which means it 's ideal for protecting files on USB drives. And being written in Java is another advantage, as it will work anywhere there 's an up-to-date Java engine installed: PCs, Macs or Linux. Encryption Wizard is also very easy to use. All you have to do is drag and drop the files (or folders) you 'd like to encrypt onto the program, click Encrypt and enter a passphrase (or it can generate one for you, if you prefer). You then have the option to securely delete the original…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1230 CLIENT

    • 374 Words
    • 2 Pages

    6. If you, as a home computer user, were to purchase a form of RAID, which would you choose and why? I would use RAID 1 because I would want my files backed up for security in case something went wrong.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    10. Which partition style is recommended for disks larger than 2TB or for disks that are used in Itanium computers? GPT…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Which file system provides support for larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users? NTFS is use for security encryption. FAT32 has no security encryption that one reason why Microsoft made NTSF so people can some type of security encryption. It is available in all versions of Windows developed for business environments from Windows 2000 onwards. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 2971 Words
    • 12 Pages

    Share permissions are typically found on a Share Permissions tab, and NTFS permissions are located on a Security tab. All Windows permission systems use the same interface, although the permissions themselves differ.…

    • 2971 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    network drive. This practice is also risky because in most LANs, local systems are not…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lesson 2

    • 959 Words
    • 4 Pages

    6. The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is called the file’s effective permissions.…

    • 959 Words
    • 4 Pages
    Good Essays
  • Good Essays

    -Conduct a write-protection mechanism to protect the files against the accidental erasing of data files stores on magnetic media.…

    • 1493 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Lotus Notes

    • 1398 Words
    • 6 Pages

    OK, so here goes on a lengthy post for the admins amongst us on NSD Analysis. An area I feel I know quite well …. however as you’ll remember from my last post this is based on publicly available information. NSD (or Notes System Diagnostic) is the name given to software bundled in Domino to give a snapshot of what the Domino system is doing. The tool produces text files with enormous ammounts of information and can be run manually or will run automatically during a crash. Interested ? …… (it may seem a bit dull but the information here could save you a lot of time!). Memory Without memory nothing works. In the operating system memory is divided into Kernel and User Address Space. The Kernel looks after the OS, hardware drivers and communications with the hardware. The User Address Space is where our applications run, and this includes Domino. So when Domino crashes it happens in the User Address Space ….. this means that Domino won’t directly cause a blue screen of death!!!! However Domino may, for example, be attempting to read or write to an area of disk which could cause a kernel memory error remembering that the kernel must deal with the disk. As we know, Domino is made up of a number of individual processes (nserver, nreplica, nrouter etc). Each of these processes all do their own little bit to make up the server. Each process is doing a number of tasks at any one time, these are called threads. And within each thread there is a specific set of individual actions. These are called function calls. Crashes (in a paragraph!) Yeah, Yeah, Blah, Blah so what does this mean for me? Well Domino is a fairly complex beast. Now and again a thread will try and use some memory which is reserved or in use by another process. This is a memory exception and at this point everything will go a bit messy. A panic will be recorded in the thread, Domino will freeze everything that it is doing and the nsd task will run. This will gain a snapshot of…

    • 1398 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Title

    • 1464 Words
    • 6 Pages

    Welcome to SanDisk® SecureAccess™! SanDisk SecureAccess is a fast, simple way to store and protect critical and sensitive files on any SanDisk® USB flash drive. Create a private vault and simply drag-and-drop your valuable files inside. Access to your vault is protected by a personal password, and your files are automatically encrypted – so even if you share your SanDisk USB flash drive or it becomes lost or stolen, access to your files are safe. SanDisk SecureAccess software also provides you the added protection of secure online backup with Dmailer Online (*Up to 2GB; registration required. Terms and conditions apply.) When it comes to protecting your private files, you can trust SanDisk®! Supported Operating Systems:  Windows® XP (Service Pack 2 is recommended)  Windows Vista®  Windows® 7  Mac OS® X v10.5+ Required Hardware:  Available USB port  SanDisk USB flash drive…

    • 1464 Words
    • 6 Pages
    Good Essays