Exam 5: File, Directory, and Shared Resource Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

As an administrator, you can easily verify how groups are set up by periodically reviewing the contents of the ____________________ file.

(Short Answer)
4.8/5
(49)

Which attributes do NTFS and FAT/FAT16 file systems have in common?

(Multiple Choice)
4.8/5
(34)

  What is displayed in the figure above? What is displayed in the figure above?

(Multiple Choice)
4.8/5
(27)

Which Netware 6.x directory attribute flags the directory to show it contains operating system files?

(Multiple Choice)
5.0/5
(25)

Security groups are used for e-mail or telephone lists, to provide quick, mass distribution of information, and they cannot be used to assign any permissions.

(True/False)
4.8/5
(41)

If you want to compress files, which attribute cannot be set on the files?

(Multiple Choice)
4.8/5
(33)

Which Red Hat Linux system directory is a virtual file system allocated in memory only, and contain files that refer to various processes running on the system, as well as details about the operating system kernel?

(Multiple Choice)
4.9/5
(34)

In Linux/UNIX, when a directory is flagged with a(n) _____, that means a user or a group can access and list its contents.

(Multiple Choice)
4.9/5
(40)

List seven system directories in Red Hat Linux.

(Essay)
4.8/5
(32)

What six folder and file permissions are supported by NTFS?

(Essay)
4.9/5
(32)

Which of the following are components of an access control list?

(Multiple Choice)
4.9/5
(26)

Does the Red Hat Linux /lib directory contain configuration files that the system uses when the computer starts?

(True/False)
4.9/5
(33)

To ensure proper security, use ____________________ authentication on Linux/UNIX systems.

(Short Answer)
4.9/5
(41)
Match the following terms to the appropriate definitions.
A list of all security properties that have been set up for a particular object
NDPS
A list of users or groups that are allowed or denied permissions to an object
NFS
Used to manage resources on a workstation
Map
Correct Answer:
Verified
Premises:
Responses:
A list of all security properties that have been set up for a particular object
NDPS
A list of users or groups that are allowed or denied permissions to an object
NFS
Used to manage resources on a workstation
Map
Attaching to a shared resource, and using it as though it were a local resource
SACL
Used by a Linux computer to mount a partition on another Linux computer
Universal group
Enables one computer to use services and software on another computer
Global group
Determines events associated with an object to be audited for user activity
DACL
Enable printers to attach to the network as agents
Local group
Provides access to resources in any domain within a Windows AD forest
RPC
Typically contains user accounts from its home domain
ACL
(Matching)
4.7/5
(39)

Which Red Hat Linux system directory contains configuration files that the system uses when the computer starts, most of which are reserved for the system administrator, because they contain system-critical information?

(Multiple Choice)
4.9/5
(39)

Folders can be marked as ____________________ to prevent users from viewing their contents.

(Short Answer)
4.8/5
(34)

What command is used to set up permissions in Linux/UNIX?

(Multiple Choice)
4.8/5
(25)

What are the three Windows 2000/XP/2003 share permissions for folders?

(Essay)
4.8/5
(38)

Can a security descriptor for a server control which accounts have access to the server, or whether that server can even be accessed over the network?

(True/False)
4.9/5
(34)

To map the PUBLIC directory as search drive S1 in Netware 6.x, you would type ____________________.

(Short Answer)
4.8/5
(33)
Showing 61 - 80 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)