Documente Academic
Documente Profesional
Documente Cultură
1. a, c, d
2. d
3. c, d, f
4. b, d
5. a, b, d
6. d
2. what are the minimum ntfs permissions required to allow users to open documents
and run programs stored in a shared folder?
a. full control
b. modify
c. write
d. read & execute
e. list folder contents
3. bill complains that he is unable to access the department plan. you open the
security tab for the plan and you find that all permissions on the document are
inherited from the plan�s parent folder. there is a deny read permission assigned
to a group to which bill belongs. which of the following methods would enable bill
to access the plan?
a. modify the permissions on the parent folder by adding the permission bill:allow
full control.
b. modify the permissions on the parent folder by adding the permission bill:allow
read.
c. modify the permissions on the plan by adding the permission: bill:allow read.
d. modify the permissions on the plan by deselecting allow inheritable
permissions, choosing copy, and removing the deny permission.
e. modify the permissions on the plan by deselecting allow inheritable
permissions, choosing copy, and adding the permission bill:allow full control.
f. remove bill from the group that is assigned the deny permission.
4. which of the following must be done to generate a log of resource access for a
file or folder? select all that apply.
a. configure ntfs permissions to allow the system account to audit resource
access.
b. configure audit entries to specify the types of access to audit.
c. enable the audit privilege use policy.
d. enable the audit object access policy.
5. which of the following are valid criteria for a security log filter to identify
specific file and folder access events? select all that apply.
a. the date of the event
b. the user that generated the event
c. the type of object access that generated the event
d. success or failure audit