Question C09

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Question C09 as PDF for free.

More details

  • Words: 476
  • Pages: 2
chapter 9 1. a, 2. d 3. c, 4. b, 5. a, 6. d

c, d d, f d b, d

1. which of the following tools allows you to administer a share on a remote server? select all that apply. a. the shared folders snap-in. b. windows explorer running on the local machine, connected to the remote server�s share or hidden drive share. c. windows explorer running on the remote machine in a terminal services or remote desktop session. d. the file server management console. 2. what are the minimum ntfs permissions required to allow users to open documents and run programs stored in a shared folder? a. full control b. modify c. write d. read & execute e. list folder contents 3. bill complains that he is unable to access the department plan. you open the security tab for the plan and you find that all permissions on the document are inherited from the plan�s parent folder. there is a deny read permission assigned to a group to which bill belongs. which of the following methods would enable bill to access the plan? a. modify the permissions on the parent folder by adding the permission bill:allow full control. b. modify the permissions on the parent folder by adding the permission bill:allow read. c. modify the permissions on the plan by adding the permission: bill:allow read. d. modify the permissions on the plan by deselecting allow inheritable permissions, choosing copy, and removing the deny permission. e. modify the permissions on the plan by deselecting allow inheritable permissions, choosing copy, and adding the permission bill:allow full control. f. remove bill from the group that is assigned the deny permission. 4. which of the following must be done to generate a log of resource access for a file or folder? select all that apply. a. configure ntfs permissions to allow the system account to audit resource access. b. configure audit entries to specify the types of access to audit. c. enable the audit privilege use policy. d. enable the audit object access policy. 5. which of the following are valid criteria for a security log filter to identify specific file and folder access events? select all that apply. a. the date of the event b. the user that generated the event c. the type of object access that generated the event d. success or failure audit 6. users at contoso ltd. use microsoft office applications to access resources on server01. your job is to monitor server01 to ensure that permissions are not too

restrictive, so that users are not prevented from achieving their assignments. which log, and which type of event, will provide the information you require? a. application log; success event b. application log; failure event c. security log; success event d. security log; failure event e. system log; success event f. system log; failure event

Related Documents

Question C09
November 2019 2
C09
November 2019 5
Nova C09 Srbija
July 2020 6
Kit Digital C09
November 2019 12
Question
May 2020 22