Top-Rated Free Essay
Preview

Lab 3 Questions And Answers

Satisfactory Essays
350 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 3 Questions And Answers
Lab #3: Worksheet
Configure Windows File System Permissions
Student Name: _____________________________________________________________
Lab Due Date: April 10, 2015

If you may work in groups to complete this lab.
Folder Structure Drawing
You are asked to draw a folder structure that meets the scenario’s requirements. You may draw the structure on paper, use Visio or another drawing program. If you draw the structure on a separate sheet of paper, turn this in to your instructor. If you use Visio or another drawing program, paste your diagram here:

Screenshots
The lab requires the student to provide several screen captures at specific points in the process. Place your screen captures here in the appropriate order.

Assessment Questions
Overview
In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed.
Questions
1. When you designed a file system in the first section of this lab, why did you choose the structure that you selected?
a. What I learned how to do in the associates program

2. As you look back on the file structure that you created, what changes would you want to make if you were to use it for a real college environment?
a. Make sure OU stay together

3. In this lab, you assigned members of the Faculty group full control of the Assignments folder. What risk does this pose?
a. Faculty can go in and read, write, or execute anything in the Assignments folder

4. What could you do to correct the situation described in question 3?
a. Only give them read, and execute permissions

5. What Windows file security attribute allows a user to move through a folder to access files and folders beneath it??
a. Read permission allows users to move through a folder and access files

6. What Windows file security attribute allows a user to view a file’s contents?
a. List folders/ read data

You May Also Find These Documents Helpful

  • Satisfactory Essays

    LAB 3 Report

    • 737 Words
    • 5 Pages

    A. Create a solubility curve for NH4Cl by plotting g NH4Cl/100 mL H20 on the y-axis, and crystallization temperature on the x-axis. Make sure to label each axis. On the same graph as the solubility curve for NH4Cl, add the solubility curve for NaCl using the data provided in Data Table 3.…

    • 737 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Question Answers 02

    • 415 Words
    • 1 Page

    They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…

    • 415 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following is not a feature of a file system that might be used with a hard disk drive?…

    • 605 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Good Essays

    Guide to Unix Chapter 2

    • 999 Words
    • 4 Pages

    8. Some of the users in your company create and delete so many files that they have…

    • 999 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    (TCO 1) Each _____ has one or more access control entries (ACEs) that state which objects have permissions to the file or folder and what permissions they have.…

    • 2202 Words
    • 36 Pages
    Satisfactory Essays
  • Powerful Essays

    Level 3 Teaching Assistant

    • 1040 Words
    • 5 Pages

    Consider the role of a learning support professional in a school. Outline the considerations for someone in that role when dealing with confidential information.…

    • 1040 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    58. A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    File Management

    • 372 Words
    • 2 Pages

    Next would be giving all users universal access to the files, now if their name shows up on the access control list and has different permission then they will not have the access. Basically by doing using this scheme, you can put the remaining users (10) on the control list but you would not give them access privileges like the 4990 users have.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File Management

    • 803 Words
    • 4 Pages

    In a system that supports 5,000 users whereas 4,990 of those users are to be allowed access to a particular file, those users can be grouped up with their own specific access that has been set by administrative access. Most UNIX systems depend on file access control scheme with each user assigned unique user identification number or user ID. Since the access control data is focused on one singular place,…

    • 803 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    In this practical you will practice working with windows and learn some basic file management techniques (creating, copying, moving, deleting & renaming folders and files). Exercise 1 - Windows 1. Open a Notepad application window by clicking on the Start button followed by Programs then…

    • 2401 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Discipline

    • 1190 Words
    • 5 Pages

    h. Any student found responsible for any damage to the Institute fittings, furniture and equipment…

    • 1190 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Problem facing Education

    • 360 Words
    • 2 Pages

    21). In many districts, required to be an "advisor" for clubs, student organizations, athletics, etc or not be allowed to teach.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays