What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Recommended textbook solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Recommended textbook solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Fundamentals of Engineering Economic Analysis

1st EditionDavid Besanko, Mark Shanley, Scott Schaefer

215 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Advanced Engineering Mathematics

10th EditionErwin Kreyszig

4,134 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Introduction to Chemical Engineering Thermodynamics

7th EditionHendrick Van Ness, J.M. Smith, Michael Abbott

582 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Chemical Reaction Engineering

3rd EditionOctave Levenspiel

228 solutions

Recommended textbook solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Starting Out with C++ from Control Structures to Objects

8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis

1,294 solutions

What happens when you move a file with NTFS permissions to a different NTFS volume quizlet?

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

You get a call to set up a computer in a client's home. The client does not know much about computers, so you don't want to make him a local administrator but you do want to give him the right to change Windows Updates manually. How can you configure this?

Modify the LGPO for Windows Update to allow the user to make changes manually.

You do not want this user to have any administrator rights. To allow this user to change Windows Update manually, you must set this in a LGPO.

As a network admit, you hired Bob to be your new network assistant, but you aren't quite ready to give this guy full administrative rights.

In the meantime. you want Bob to be able to restore files on Windows 7 computers in your network, but you do not want him to be able to run the backups. What is the minimum assignment that will allow Will to complete this task?

Grant Bob the user right Restore Files and Directories.

The Restore Files And Directories user right allows a user to restore files and directories regardless of file and directory permissions. Assigning this user right is an alternative to making a user a member of the Backup Operators group.

You have a network folder that resides on an NTFS partition on a Windows 7 computer. NTFS permissions and Share permissions have been applied. Which of the following statements best describes how Share permissions and NTFS permissions work together if they have been applied to the same folder?

The system will look at the cumulative Share permissions and the cumulative NTFS permissions. Whichever set is more restrictive will be applied.

When both NTFS and Share permissions have been applied, the system looks at the effective rights for NTFS and Share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared, and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permissions.

True or false:

Privileges granted to a specific system entity, such as users, groups, or computers, which enable them to perform a task or access a resource are called Rights.

FALSE

Permissions

Permissions are privileges granted to specific system entities, such as users, groups, or computers, which enable them to perform a task or access a resource. For example, you can grant a specific user permission to read a file, while denying that same user the permissions needed to modify or delete the file.

What do you call permissions that run downward through a hierarchy?

Inheritance

The most important principle in permission management is that permissions tend to run downward through a hierarchy. The tendency of permissions to flow downward through a file system or other hierarchy is called permission inheritance. Permission inheritance means that parent elements pass their permissions down to their subordinate elements.

True or false:

Domain networking enables computers configured to use the Home Network location to share the contents of their respective libraries among themselves.

False

Homegroup Networking

Homegroup networking is a new Windows 7 feature that enables computers configured to use the Home network location to share the contents of their respective libraries among themselves.

You copy several files from one folder to another folder within the same drive.

What permissions do the files in the destination folder have?

The same permissions that the source folder has.

When moving files or folders, the behavior is different. If you move files or folders to a new location on the same NTFS volume, their existing permissions move with them.

If you move files or folders to a different volume, they leave their existing permissions behind and inherit permissions from the parent folder at the new location.

You copy several files from one folder to another folder in a different drive.

What permissions do the files in the destination folder have?

The same permissions that the target folder has.

When moving files or folders, the behavior is different. If you move files or folders to a new location on the same NTFS volume, their existing permissions move with them.

If you move files or folders to a different volume, they leave their existing permissions behind and inherit permissions from the parent folder at the new location.

Donatelo has access to the Graphic Designs folder on your network server. His user belongs to the following groups:

Will belongs to the following groups:

NTFS:
Rough Drafts Ready Only
Final Drafts Read Only

Shared Permissions:
Rough Drafts Read Only
Final Drafts Change

When he logs onto the Graphic Designs folder from his Windows 7 Machine, what are his effective permissions?

Read only

Michael's NTFS rights were Read only and the Shared permissions were Change, so Read only would be the effective permission.

Which of the following statements are NOT true?

A) Allow permissions are cumulative.

B) Deny permissions override allow permissions.

C) Explicit permissions take precedence over inherited permissions.

D) Allow Full Control Takes precedence over all other permissions granted.

D) Allow Full Control Takes precedence over all other permissions granted.

Because the Deny permissions override Allow permissions, Allow Full Control does not take precedence over all other permissions granted.

True or False:

Full Control is the NTFS permission that allows you to take ownership of a folder on an NTFS volume.

True

Allow Full Control permission allows you to modify the folder permissions, take ownership of the folder, delete subfolders and the files contained in the folder, and perform all other actions from other Allowed permissions.

Tue or False:

Read is the NTFS permission allows you to navigate through restricted folders to reach other files and folders.

False.

Read & Execute

The Read & Execute permission includes allowing you to navigate through restricted folders to reach other files and folders as well as the Read and List Folder permissions.

You have a user named Jon Show who has access to the Crow folder on your network server.

Will belongs to the following groups:

NTFS:
Admin Full Control
Crow Modify

Shared Permissions:
Admin Full Control
Crow Modify

When Jon Show logs into the Crow folder from his Windows 7 machine, what are his effective permissions?

Full Control

Jon Snow's NTFS rights were Full Control and the Shared permissions were Full Control, so Full Control would be the effective permission.

Which type of sharing is new to Windows 7?

Homegroup Sharing

Homegroup networking is a new Windows 7 feature that enables computers configured to use the Home network location to share the contents of their respective libraries among themselves.

What virtualized folders enable users to access files from different locations as if they were all in the same place?

Libraries

Libraries are virtualized folders that enable users to access files from different locations as if they were all in the same place. The Windows 7 libraries point to the standard user profile folders by default, but you can add additional locations to a library as well, and any files at those locations appear in Windows Explorer as part of the library, even though they remain in their original places.

What do you need to do to activate Public folder sharing?

Enable Network Discovery and Public Folder Sharing in the Network and Sharing Center.

All you have to do to activate Public folder sharing is enable Network Discovery and Public Folder Sharing in the Change sharing options for different network profiles dialog box, accessible from the Network and Sharing Center. After you have done that, any files and folders that the user copies to the Public folder are automatically shared. Users on other network computers can browse to the Public share on the client's computer and access any of the files placed there.

True or False:

"Modify" is the minimum that allows you to add files to a Shared folder.

False

Change

The Change permission allows you to create folders, add files to folders, change data in folders, delete folders and files, and perform all actions permitted by the Read permission.

True or False:

Effective Permissions is the combination of Allow permissions and Deny permissions that a security principal receives for a giving system element.

True

A security principal can receive permissions in many different ways, and it is important for an administrator to understand how these permissions interact. Effective permissions are the combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership. Because a security principal can receive permissions from so many sources, it is not unusual for those permissions to conflict, so there are rules defining how the permissions combine to form the effective permissions.

_________.exe is used to grant or revoke standard or special permissions by allowing or denying them.

Icacls.exe

In addition to configuring NTFS permissions graphically, you can also use the Icacls.exe command line utility. Using Icacls.exe, you can grant or revoke standard or special permissions by allowing or denying them to specific security principals.

You can use _____ to encrypt files stored on the FAT32 file system.

EFS

EFS provides per-user encryption of files and folders. EFS is available
for the Professional, Enterprise, and Ultimate editions of Windows 7. EFS is different from BitLocker and BitLocker To Go, which offer full volume encryption. EFS can be used only on volumes formatted with NTFS. If you encrypt a file using EFS and then copy it to a USB stick formatted with the FAT32 file system, the file is automatically decrypted.

You can configure a recovery agent certificate using the _____.exe command-line utility.

cipher.exe

Recovery agents are special certificates that allow EFS-encrypted files
to be decrypted. In domain environments, the first administrator account in the domain is configured by the Default Domain Policy as a recovery agent. You can create a separate recovery agent by using the following command:

Cipher.exe /r:recoveryagent

Running this command will create two files: recoveryagent.cer and recoveryagent.pfx. You can edit the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node and specify the location of the recoveryagent.cer file. By importing recoveryagent.pfx, a user can perform recovery of EFS recovery operations. If your organization has deployed a Microsoft Windows Server 2008 or Microsoft Windows Server 2008 R2 Active Directory Certificate Services CA, you can issue a special data recovery agent certificate and use it in place of the certificate generated with cipher.exe.

Users granted the _____ permission to a folder can execute program files in that folder.

Modify

The security principal can change existing files and folders, but can't create new files and folders. Granting this permission also grants the Read & Execute, List Folder Contents, Read, and Write permissions.

You are the network administrator of Bob's Burgers. Your company requires a fair degree of security and you have been tasked with defining and implementing a security policy.

You have configured password policies so that users must change their passwords every 30 days. Which password policy would you implement if you want to prevent users from reusing passwords they have used recently?

A) Passwords must be Unique
B) Enforce Password History
C) Passwords must be Advanced
D) Passwords must meet complexity requirements

B) Enforce Password History

The Enforce Password History policy allows the system to keep track of a user's password history for up to 24 passwords. This prevents a user from using the same password over and over again.

True or False:

A file inherits the permissions of the target folder when moved to a new folder on the same volume.

False.

NTFS permissions work differently depending on whether a file is copied or moved on the same volume or to a different volume. For example:

1. When you copy a file or folder from one folder to another, the file or folder will inherit the permissions of the target folder. This applies if the file is being copied within the same volume or to a different volume.

2. A file or folder will retain its original permissions when you move that file or folder between folders on the same volume.

3. A file or folder moved from one volume to a separate volume inherits the permissions of the destination volume.

_________ can be used to configure password and account lockout policies.

Secpol.msc

By using the Local Security Policy console (accessible by typing secpol.msc in the Search Programs And Files dialog box), you can manage policy items that are usually located in the Computer Configuration\Windows Settings\Security Settings node of a typical Group Policy object (GPO).

True or False:

You can configure UAC so that a standard user can respond to a UAC prompt by entering the credentials of a user who is a member of the local Administrators group.

True.

You have the following options for controlling elevation prompt behavior for standard users:

1. Automatically Deny Elevation Requests Any attempt at privilege elevation is automatically blocked.

2. Prompt For Credentials On The Secure Desktop A non-privileged user can provide the credentials of a privileged user when providing a response to a UAC prompt. This request occurs on the secure desktop.

3. Prompt For Credentials A non-privileged user can provide the credentials of a privileged user on the standard interactive desktop. This can be overridden by User Account Control: Switch To The Secure Desktop When Prompting For Elevation policy and the secure desktop would be used.

True or False: You can force administrators to re-enter their credentials when responding to UAC prompts.

True.

True or false:

You have a Windows 7 machine that multiple users access. All users have the rights to use USB removable devices but you need to deny Danny from using USB removable devices because he ate your sandwich last week.

You can do this by creating a removable storage access policy through an LGPO.

True.

LGPOs are policies that you can set on a local Windows 7 machine to limit hardware and user usage. You also have the ability to control individual users within the Local Group Policy.

True or False:

Secure Desktop can protect against malware that can mask the UAC prompt.

True.

Secure Desktop is a special mode that Windows 7 enters when providing a UAC consent or credentials prompt. When in Secure Desktop mode, the UAC dialog box appears on a dimmed screenshot of the desktop when the operating system invokes UAC.

True or false:

You can configure all prompts for consent or prompts for credentials to appear on the secure desktop.

True.

You can configure the User Account Control: Switch To The Secure Desktop When Prompting For Elevation policy to ensure that all prompts for credentials and prompts for consent appear on the secure desktop. It occurs no matter which settings you configure in the following policies:

■ User Account Control: Behavior Of The Elevation Prompt For Administrators in Admin Approval Mode
■ User Account Control: Behavior of the Elevation Prompt For Standard Users

What happens when you move a file with NTFS permissions to a different NTFS volume?

When you move a folder or file within an NTFS partition, the folder or file retains its original permissions. When you move a folder or file to a different NTFS partition, the folder or file inherits the permissions of the destination folder.

What happens to the NTFS permissions of files when a user moves them to a folder on a different volume?

When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory. However, when you move a protected file to a different location on the same volume, the file retains its access permission setting as though it is an explicit permission.

When you copy a file or folder to a different NTFS partition the copy of the folder or file inherits the permissions of the destination folder?

When you copy a folder or file, either between different partitions or within the same partition, the copy inherits the destination folder permissions. 2. When you move a folder or file between different partitions, it inherits the destination folder permissions. 3.

How do share and NTFS permissions interact with each other?

If the share permissions are “Read”, NTFS permissions are “Full control”, when a user accesses the file on the share, they will be given “Read” permission. If the share permissions are “Full Control”, NTFS permissions are “Read”, when a user accesses the file on the share, they will still be given a “Read” permission.