Preview

Nt1330 Unit 5 Study Guide

Powerful Essays
Open Document
Open Document
603 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 5 Study Guide
Lab 5 – CITM315 – RAHUL GOPAL 940758642
PART 1
Question 1) Create the following OU structure below your Dovercorp012.

Question 2) Create two global groups HRMGR012 and SOUTHMGR012 in HR012 and South012 OUs.

Question 3) Create two users Mikexxx and Suexxx and make them member of HRMGRxxx

Question 4) Create two users Paulxxx and Cathyxxx and make them member of SOUTHMGRxxx group.

Question 5) Create Normanxx, Jamesxxx and Parisxxx in Northxxx OU

Question 6) Add the following attribute to Mikexxx & Suexxx (you need to find proper command parameters for the following attributes)

Question 7) Using a proper command delete Jamesxxx

Question 8) Create a Computer under HRxxx OU called WSxxx.

Question 9) Create A domain
…show more content…
Question 13) Login as Mikexxx with his assigned password (you need to know how to login as a new user).

Question 14) Right click on Mikexxx user and make a print screen that shows his profile (indicating his assigned home directory).

Part 2
1.
The two types of access control lists are Discretionary (DACL) and System (SACL).

DACL is a list of Access Control Entries (ACE) that store the information about which user(s) has access to a secure object, such as a file.

SACL logs the attempts to access a secure object. This is used to audit files to see who has attempted to access files that they do not have permission for.

2.
Active Directory in Windows Server 2008 houses information about:
a) Computers in the domain
d) User
…show more content…
The exception to this would be if the permissions on /bar were changed to a more strict setting. These settings will be able to manage access to resources for network and local users.
Share permissions: The shared permissions are only applicable to users that are accessing a file over the network. If the user is local administrator to the server (or workstation) the directory resides on that user would be able to access.
4. You are managing a Windows Server 2008 Standard edition which has the File Server role added. You explicitly gave a user “Modify” access to a file. However, when this user tried to append data to that file, he got access denied message. What might be the problem?
This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Study Guide

    • 5747 Words
    • 23 Pages

    Where the energy of capacitor does resides? Do electrons tend to go to region of low or high potential? What is the net charge on the charged capacitor? A Gaussian surface encloses an electric dipole within it. What is the total flux across sphere? 5. Find the dimension of 1/2εoE2. 6. In a certain l m3 of space, electric potential is found to be V Volt throughout. What is the electric field in this Region? 7. If Coulomb law involves 1/r3 instead of 1/r2 dependence, would Gauss law be still true? 8. An electrostatic field line can’t be discontinuous, why? 9. The given graph shows that the variation of charge versus potential difference V for the two capacitors C1 & C2. The two capacitors have same plate separation but the plate area of C2 is doubled than that of C1.Which of the line in the graph corresponds to C1 &C2 and why? 1. 2. 3. 4.…

    • 5747 Words
    • 23 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Study Guide

    • 359 Words
    • 2 Pages

    1. Explain how both the waterfall model and the prototyping model can be accommodated in the spiral process model.*…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    1. DACL (Discretionary access control list) allows or denies trustees access to computer and network resources. It identifies group permissions and determines whether to allow access a securable object or process.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    To create Schema definition: It is a database administrator responsible to installation, configuration and upgrading hardware and operating system on given database and also to decide what information to be held in database.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password) that would have higher level administrative permissions in case this particular user did not…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    “Note that the permissions that apply to a directory are distinct from those that apply to any file or directory it contains. The fact that a user has the right to write to the directory does not give the user the right to write to a file in that directory. That is governed by the permissions of the specific file. The user would, however, have the right to rename the file,(Stallings, 2012).”…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? What type of access control would best describe this access control situation?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Using the data/folder properties it can be added the users that the creator users is allowing to access the data.…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    you dont want to give some to many permissions or access to something they need no access too.…

    • 266 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. What Windows file security attribute allows a user to move through a folder to access files and folders beneath it??…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File System and Group

    • 788 Words
    • 4 Pages

    User accounts: User accounts are those accounts that through which system interactive operations can be performed by normal users and groups of users. General users are typically assigned to these accounts and usually have limited access to critical system files and directories.…

    • 788 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Each permission can be given the right to read (r), write (w), execute (x), or (-) which means no permission or permission is denied. The (r) will allow you to read only, (w) will allow you to create, modify, copy, and delete the file, and (x) will allow you to execute the file and in a directory you can cd into other directories (Echeverria, 2012).…

    • 1336 Words
    • 6 Pages
    Good Essays
  • Good Essays

    File Management

    • 775 Words
    • 4 Pages

    A review of how users are set up should be understood first and permissions can then be set. A UNIX system administrator sets up each user of the system to have a unique user name, whereas the UNIX operating system identifies users with a number, known as the user identifier or UID. Users are not limited to the humans that work on the system but the system functions are considered users as well (“Practical Unix & Internet Security”, n.d.).…

    • 775 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Computer Networking

    • 1332 Words
    • 6 Pages

    For sharing files, data, and information: Any authorized user can access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many…

    • 1332 Words
    • 6 Pages
    Powerful Essays