Preview

Nt1330 Unit 5 Study Guide

Powerful Essays
Open Document
Open Document
603 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 5 Study Guide
Lab 5 – CITM315 – RAHUL GOPAL 940758642
PART 1
Question 1) Create the following OU structure below your Dovercorp012.

Question 2) Create two global groups HRMGR012 and SOUTHMGR012 in HR012 and South012 OUs.

Question 3) Create two users Mikexxx and Suexxx and make them member of HRMGRxxx

Question 4) Create two users Paulxxx and Cathyxxx and make them member of SOUTHMGRxxx group.

Question 5) Create Normanxx, Jamesxxx and Parisxxx in Northxxx OU

Question 6) Add the following attribute to Mikexxx & Suexxx (you need to find proper command parameters for the following attributes)

Question 7) Using a proper command delete Jamesxxx

Question 8) Create a Computer under HRxxx OU called WSxxx.

Question 9) Create A domain
…show more content…
Question 13) Login as Mikexxx with his assigned password (you need to know how to login as a new user).

Question 14) Right click on Mikexxx user and make a print screen that shows his profile (indicating his assigned home directory).

Part 2
1.
The two types of access control lists are Discretionary (DACL) and System (SACL).

DACL is a list of Access Control Entries (ACE) that store the information about which user(s) has access to a secure object, such as a file.

SACL logs the attempts to access a secure object. This is used to audit files to see who has attempted to access files that they do not have permission for.

2.
Active Directory in Windows Server 2008 houses information about:
a) Computers in the domain
d) User
…show more content…
The exception to this would be if the permissions on /bar were changed to a more strict setting. These settings will be able to manage access to resources for network and local users.
Share permissions: The shared permissions are only applicable to users that are accessing a file over the network. If the user is local administrator to the server (or workstation) the directory resides on that user would be able to access.
4. You are managing a Windows Server 2008 Standard edition which has the File Server role added. You explicitly gave a user “Modify” access to a file. However, when this user tried to append data to that file, he got access denied message. What might be the problem?
This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 1 Study Guide

    • 359 Words
    • 2 Pages

    1. Explain how both the waterfall model and the prototyping model can be accommodated in the spiral process model.*…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    1. DACL (Discretionary access control list) allows or denies trustees access to computer and network resources. It identifies group permissions and determines whether to allow access a securable object or process.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    To create Schema definition: It is a database administrator responsible to installation, configuration and upgrading hardware and operating system on given database and also to decide what information to be held in database.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password) that would have higher level administrative permissions in case this particular user did not…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    When we take a look at the access control list some users have a R by their name which means that they are able to only read the file that they are associated with. Some users with have a W which means that they will be able to actually write and make changes to the file. Some users will have a X which means that they can execute the file. In order to add users to a group a manager, or the company 's system administrator would have to go in and assign individual users to each group.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using the data/folder properties it can be added the users that the creator users is allowing to access the data.…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    you dont want to give some to many permissions or access to something they need no access too.…

    • 266 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. What Windows file security attribute allows a user to move through a folder to access files and folders beneath it??…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File System and Group

    • 788 Words
    • 4 Pages

    User accounts: User accounts are those accounts that through which system interactive operations can be performed by normal users and groups of users. General users are typically assigned to these accounts and usually have limited access to critical system files and directories.…

    • 788 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Each permission can be given the right to read (r), write (w), execute (x), or (-) which means no permission or permission is denied. The (r) will allow you to read only, (w) will allow you to create, modify, copy, and delete the file, and (x) will allow you to execute the file and in a directory you can cd into other directories (Echeverria, 2012).…

    • 1336 Words
    • 6 Pages
    Good Essays
  • Good Essays

    File Management

    • 775 Words
    • 4 Pages

    A review of how users are set up should be understood first and permissions can then be set. A UNIX system administrator sets up each user of the system to have a unique user name, whereas the UNIX operating system identifies users with a number, known as the user identifier or UID. Users are not limited to the humans that work on the system but the system functions are considered users as well (“Practical Unix & Internet Security”, n.d.).…

    • 775 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Computer Networking

    • 1332 Words
    • 6 Pages

    For sharing files, data, and information: Any authorized user can access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many…

    • 1332 Words
    • 6 Pages
    Powerful Essays