LA B | Configure Windows File System Permissions
LAB – ASSESSMENT WORKSHEET
Configure Windows File System Permissions
Course Name and Number:
IS3230
Student Name:
Jeremy Cox
Instructor Name:
Lab Due Date:
Overview
In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed.
Lab Assessment Questions & Answers
1. When you designed a file system in the first section of this lab, why did you choose the structure that you
selected?
Because it is the most basic and easy to understand. Only people who need access will have access and everyone is separate from one another
2. As you look back on the file structure that you created, what changes would you want to make if you
were to use it for a real college environment?
I would have anything to do with the faculty or faculty business separate from the students information or folders that they have access too.
38399_LMxx_Lab03.indd 52
9/10/12 1:08 PM
Assessment Worksheet
53
3. In this lab, you assigned members of the Faculty group full control of the Assignments folder. What risk
does this pose?
Any faculty member or anyone with proper credentials can do whatever they like with the folder including corruption and deletion.
4. What could you do to correct the situation described in question 3?
I would not give full permissions. They can have permission to read write and execute
5. What Windows file security attribute allows a user to move through a folder to access files and folders
beneath it?
List data/Read file
Read
38399_LMxx_Lab03.indd 53
Configure Windows File
System Permissions
6. What Windows file security attribute allows a user to view a file’s contents?
9/10/12 1:08 PM
38399_LMxx_Lab03.indd 54
9/10/12 1:08 PM
You May Also Find These Documents Helpful
-
• Depositor - user/users group with access rights to create database documents and not view them afterwards (excluding, possible, Public…
- 767 Words
- 4 Pages
Good Essays -
4. You are managing a Windows Server 2008 Standard edition which has the File Server role added. You explicitly gave a user “Modify” access to a file. However, when this user tried to append data to that file, he got access denied message. What might be the problem?…
- 603 Words
- 3 Pages
Powerful Essays -
3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…
- 766 Words
- 4 Pages
Good Essays -
8. In terms of permissions, what does 777 mean? Everyone can read write and execute…
- 989 Words
- 4 Pages
Powerful Essays -
This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…
- 308 Words
- 2 Pages
Good Essays -
Lab Part 1: Configure Access Rights to Folder & Files Using Microsoft GPO Manager & Enable Microsoft BSA to Define a Security Baseline Definition…
- 952 Words
- 4 Pages
Satisfactory Essays -
Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…
- 689 Words
- 3 Pages
Good Essays -
1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…
- 565 Words
- 3 Pages
Satisfactory Essays -
If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…
- 680 Words
- 3 Pages
Good Essays -
D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…
- 285 Words
- 2 Pages
Satisfactory Essays -
Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…
- 2205 Words
- 6 Pages
Powerful Essays -
assigned you to set up a small server to provide basic file services to faculty, staff, and students in that…
- 2626 Words
- 11 Pages
Powerful Essays -
If you want to organize your information into "file cabinets" which you can access easily, quickly view, and work from what is contained within, see Section A.…
- 261 Words
- 2 Pages
Satisfactory Essays -
Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…
- 833 Words
- 3 Pages
Powerful Essays -
1 - The person who transfers and the person to the one that is transferred the power must be identified.…
- 372 Words
- 2 Pages
Satisfactory Essays