Configure Windows File System Permissions
Student Name: _____________________________________________________________
Lab Due Date: April 10, 2015
If you may work in groups to complete this lab.
Folder Structure Drawing
You are asked to draw a folder structure that meets the scenario’s requirements. You may draw the structure on paper, use Visio or another drawing program. If you draw the structure on a separate sheet of paper, turn this in to your instructor. If you use Visio or another drawing program, paste your diagram here:
Screenshots
The lab requires the student to provide several screen captures at specific points in the process. Place your screen captures here in the appropriate order.
Assessment Questions
Overview
In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed.
Questions
1. When you designed a file system in the first section of this lab, why did you choose the structure that you selected?
a. What I learned how to do in the associates program
2. As you look back on the file structure that you created, what changes would you want to make if you were to use it for a real college environment?
a. Make sure OU stay together
3. In this lab, you assigned members of the Faculty group full control of the Assignments folder. What risk does this pose?
a. Faculty can go in and read, write, or execute anything in the Assignments folder
4. What could you do to correct the situation described in question 3?
a. Only give them read, and execute permissions
5. What Windows file security attribute allows a user to move through a folder to access files and folders beneath it??
a. Read permission allows users to move through a folder and access files
6. What Windows file security attribute allows a user to view a file’s contents?
a. List folders/ read data
You May Also Find These Documents Helpful
-
3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…
- 766 Words
- 4 Pages
Good Essays -
A. Create a solubility curve for NH4Cl by plotting g NH4Cl/100 mL H20 on the y-axis, and crystallization temperature on the x-axis. Make sure to label each axis. On the same graph as the solubility curve for NH4Cl, add the solubility curve for NaCl using the data provided in Data Table 3.…
- 737 Words
- 5 Pages
Satisfactory Essays -
You follow certain step’s to access the supplementary readings for a course when u sing your organizations library management system. These steps that you follow are examples of the _________ components of an information system.…
- 2478 Words
- 10 Pages
Satisfactory Essays -
They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…
- 415 Words
- 1 Page
Satisfactory Essays -
1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…
- 565 Words
- 3 Pages
Satisfactory Essays -
Unit Five: Lab Assignment #1 1. How does Newton's law apply to a company's brand? Explain, citing at least one example. A= The more massive a brand the more force it need to change its position. 2.…
- 431 Words
- 2 Pages
Satisfactory Essays -
Which of the following is not a feature of a file system that might be used with a hard disk drive?…
- 605 Words
- 3 Pages
Good Essays -
The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…
- 302 Words
- 1 Page
Good Essays -
8. Some of the users in your company create and delete so many files that they have…
- 999 Words
- 4 Pages
Good Essays -
(TCO 1) Each _____ has one or more access control entries (ACEs) that state which objects have permissions to the file or folder and what permissions they have.…
- 2202 Words
- 36 Pages
Satisfactory Essays -
Consider the role of a learning support professional in a school. Outline the considerations for someone in that role when dealing with confidential information.…
- 1040 Words
- 5 Pages
Powerful Essays -
In a system that supports 5,000 users whereas 4,990 of those users are to be allowed access to a particular file, those users can be grouped up with their own specific access that has been set by administrative access. Most UNIX systems depend on file access control scheme with each user assigned unique user identification number or user ID. Since the access control data is focused on one singular place,…
- 803 Words
- 4 Pages
Good Essays -
In this practical you will practice working with windows and learn some basic file management techniques (creating, copying, moving, deleting & renaming folders and files). Exercise 1 - Windows 1. Open a Notepad application window by clicking on the Start button followed by Programs then…
- 2401 Words
- 10 Pages
Powerful Essays -
Next would be giving all users universal access to the files, now if their name shows up on the access control list and has different permission then they will not have the access. Basically by doing using this scheme, you can put the remaining users (10) on the control list but you would not give them access privileges like the 4990 users have.…
- 372 Words
- 2 Pages
Satisfactory Essays -
h. Any student found responsible for any damage to the Institute fittings, furniture and equipment…
- 1190 Words
- 5 Pages
Powerful Essays