Preview

Lab 2 Questions Answears Benson kungu

Powerful Essays
Open Document
Open Document
906 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2 Questions Answears Benson kungu
Lab #2 - Assessment Worksheet

Using Access Control Lists to Modify File System Permissions on Windows Systems

Course Name and Number: ISSC342 Student Name: Benson K kungu Instructor Name: Peter Mylonakos Lab Due Date: June 14, 2015
Overview

In this lab, you used the Windows command-line utility, icacls.exe, to establish file level permissions following a set of access control requirements. You tested those permissions by remotely accessing the Windows server and attempting to modify files in the secured folders. You used screen captures to document the access control changes you made in this lab were properly applied.

Lab Assessment Questions & Answers

1. What is the principle of least privilege?
1. What is the principle of least privilege? The least privilege principle is when it’s provided the just the necessary access required to carry out a task.

2. What does ACL stand for and how it is used?

The ACL is the Access Control List. Can be used to allow or deny access to objects by user or groups

3. Why would you add permissions to a group instead of the individual?

When working with group you can keep it organized and if there are for example 100+ users and they need basically the same permissions, it’s time consuming if it’s done one by one. Windows Server have the option to create and manage groups permissions for better organization and less time consuming.

4. List at least three different types of access control permissions you can enable for a file using icacls.exe.

RX- Read and Execute Access M- Modify Access
F-Full Access

5. Which access control permissions allow you to change files and/or folders?

The Full access allows you to change files and/or folders.

6. If you don't remember the syntax when using icacls.exe, what command do you type to see the options?

The command is:

icacls /?

7. Without using the icacls.exe tool, how could you view and modify the privileges of the files or folders

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20 percent while the warehouse-shipping rate increased by 10 percent, and the overall profit has increased by a modest amount of 0.005 percent for the first reporting period.…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    The security controls for this or any project should be a high priority and should be understood by every individual involved in the project. To determine this we will use the questions…

    • 775 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Part 1: Configure Access Rights to Folder & Files Using Microsoft GPO Manager & Enable Microsoft BSA to Define a Security Baseline Definition…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control list (ACL) A collection of access control entries that defines the access that all users and groups have to an object.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions and/or assign security attributes. (The traditional UNIX system of users, groups, and read-write-execute permissions is an example of DAC.) MAC-enabled systems allow policy administrators to implement organization-wide security policies. Unlike with DAC, users cannot override or modify this policy, either accidentally or intentionally. This allows security administrators to define a central policy that is guaranteed (in principle) to be enforced for all users.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    6. Perform SQL injection attacks against sample vulnerable Web applications with e-commerce data 
entry fields…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user would like to secure files stored on a floppy disk. Which file system should they select to format the disk?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Study Guide

    • 2971 Words
    • 12 Pages

    Share permissions are typically found on a Share Permissions tab, and NTFS permissions are located on a Security tab. All Windows permission systems use the same interface, although the permissions themselves differ.…

    • 2971 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    1. Which among the following is the process of process of proving that provided identity credentials are valid and correct?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays