Deck 14: Users, Groups, and Permissions

Full screen (f)
exit full mode
Question
Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account.

A)network
B)directory
C)group
D)owner
Use Space or
up arrow
down arrow
to flip the card.
Question
A password _______________ policy forces users to select a new password periodically.

A)permissions
B)disabling
C)expiration
D)anti-hack
Question
When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder.

A)administrator
B)developer
C)owner
D)editor
Question
What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer?

A)Parental Controls
B)User Account Control
C)Primary Controls
D)Mandatory Control
Question
Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.

A)command line
B)encrypting
C)NTFS
D)administrative
Question
On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________.

A)Group account
B)Single account
C)Specialized account
D)Local user account
Question
What two sets of data does every folder and file on an NTFS partition list?

A)User and group access and level of access
B)Read and Execute permissions
C)NTFS and FAT permissions
D)Encryption and decryption attributes
Question
_______________ ratings such as E, T, and M can be used to allow or block computer game use.

A)ESRB
B)ETM
C)UAC
D)TPM
Question
What process determines what a legitimate user can and cannot do on a system?

A)Accessibility
B)Authorization
C)Permission propagation
D)Inheritance
Question
What unique key is known only by the system and the person with whom the key is associated?

A)token
B)user name
C)user ID
D)password
Question
A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.

A)six
B)eight
C)10
D)256
Question
If your Vista computer is on a workgroup, what applet is used to manage user accounts?

A)User Accounts
B)User Accounts and Family Safety
C)Users and Passwords
D)Users and Groups
Question
Which character in a password is most helpful in defeating common word hacks?

A)@
B)3
C)X
D)w
Question
Which term refers to a unique combination of a user name and an associated password?

A)user authorization
B)user account
C)user authentication
D)user identity
Question
What is the primary tool Windows uses for providing authorization?

A)NTFS
B)Shared folders
C)Local Security Policy
D)Parental Controls
Question
What process identifies and grants access to a user who is trying to access a system?

A)Credibility
B)Authorization
C)Authentication
D)Honesty
Question
Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group.

A)restricted user
B)standard user
C)new user
D)default user
Question
With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts.

A)Change
B)List
C)Read & Execute
D)Modify
Question
Which NTFS permission allows an account to seize control of a file or folder owned by another account?

A)File permissions
B)Take Ownership permission
C)Folder permissions
D)Change permission
Question
What is the Windows Vista tool for managing users and groups?

A)Users and Passwords applet
B)User accounts and Groups applet
C)Users and Groups applet
D)User Accounts applet
Question
What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program?

A)southbridge
B)TPM
C)GPU
D)northbridge
Question
Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders?

A)Full Control
B)Modify
C)List Folder Contents
D)Read
Question
By default, who has complete control over a folder or file?

A)Owner
B)Administrator
C)All users
D)Power users
Question
In Windows 7, which UAC notification level is the default setting?

A)Always notify
B)Notify me only when programs try to make changes
C)Notify me only when programs try to make changes (do not dim my desktop)
D)Never notify
Question
An unpopular, but necessary, security feature introduced in Windows Vista was _______________.

A)NTFS
B)UAC
C)EFS
D)WAC
Question
What techniques provide the only true way to protect your data from access by any other user?

A)Regular backups
B)Authorization
C)Encryption
D)Authentication
Question
What three letters are used in a Linux terminal to indicated permissions associated with a file or folder?

A)omc
B)rwx
C)awk
D)lsp
Question
How many notification levels of UAC did Microsoft include in Windows 7?

A)One
B)Two
C)Three
D)Four
Question
What type of access is granted if you log on to a computer remotely as administrator with no password?

A)Administrator
B)Standard user
C)Power user
D)Guest
Question
Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify?

A)-rm-rm-r--
B)-rw-rw-r--
C)-rwxr--rw-
D)-rmxrm-rm-
Question
What UAC classification is associated with a digitally signed, third-party program or non-core OS program?

A)Verified
B)Published by Windows
C)Unverified
D)Blocked program
Question
What happens to a file or folder permission if it is copied within an NTFS partition?

A)The original retains permissions, and the copy inherits permissions from the new location.
B)Both original and copy retain permissions of the original location.
C)Both original and copy inherit permissions from the new location.
D)The original inherits permissions from the new location, and the copy retains permissions.
Question
Opening a command line and running _______________ provides access to a utility called Local Security Policy.

A)rwx.msc
B)ls -l
C)dir /p
D)secpol.msc
Question
Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.

A)administrative shares
B)simple file sharing
C)shared folders
D)public folders
Question
Which Linux command enables you to change the owner and the group with which a file or folder is associated?

A)mount
B)chmod
C)crontab
D)chown
Question
If you use the System Configuration utility (msconfig) and select Disable UAC on the Tools tab, what further action is required to turn off UAC?

A)Log off
B)Log on as a different user
C)Reboot
D)None
Question
How are Libraries folders displayed in Windows 8.1 File Explorer?

A)Simply open File Explorer; they display automatically.
B)Navigate to the folder C : \Users\MyLibraries.
C)Right-click in the navigation section and click Show Libraries.
D)Double click on Favorites and click Show Libraries in the dialog box.
Question
What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder?

A)Inheritance
B)Traversal
C)NTFS propagation
D)Permission sharing
Question
What tool is offered by Windows Vista Ultimate and Enterprise editions to encrypt entire hard drives?

A)NTFS
B)BitLocker
C)TPMs
D)TrueCrypt
Question
What does BitLocker require on a motherboard to validate on boot that a Windows Vista computer has not been changed?

A)EFS
B)IPC$
C)Core i7
D)TPM
Question
In a Windows system, a container that holds user accounts and defines the capabilities of its members is called a(n) ____________________.
Question
In a Windows XP system, the recommended user-account type known as _______________ prevented users from performing common tasks, such as running certain programs, installing applications, updating applications, and updating Windows.
Question
In a Windows system, ____________________ have rights almost equal to that of the administrator, except that they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.
Question
In a Windows system, at least one account must be a(n) _______________ account.
Question
In Windows systems, the _______________ account might be used to provide casual Internet
access to users at a library terminal.
Question
In Windows Vista, managers and parents can use _______________ to monitor and limit the activities of standard users.
Question
In a Windows system, members of the Users group are called _______________ users.
Question
Strong passwords should include letters, numbers, and _______________ symbols.
Question
In reference to Windows groups, _______________ privileges grant complete control over a machine.
Question
In a Windows XP system, ____________________ are almost as powerful as administrators, but they cannot install new devices or access other users' files unless access is provided.
Question
To create and manage user accounts in Windows, you must be a member of the ____________________ group.
Question
Through the combination of user accounts and groups and _______________ permissions, Windows provides incredibly powerful file and folder security.
Question
Parental Controls allow you to limit _______________ logged on as well as restrict access to types of games and specific applications.
Question
To create a new user in Windows 7, open the User Accounts Control Panel applet, select Manage another account, and then click ____________________.
Question
Starting with Windows 8, Microsoft shifted the focus of user accounts from local accounts to _______________-wide Microsoft accounts.
Question
Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.
Question
A strong password should be at least _______________ characters in length.
Question
In professional editions of Windows, the _______________ is a powerful too that can be used to create, modify, and remove users and groups.
Question
You create three accounts when you set up a Windows Vista computer: guest, administrator, and a(n) _______________ that is a member of the Administrators group.
Question
To add a user in Windows Vista, open the _______________ applet.
Question
The primary way to set NTFS permissions is through the _______________ tab under the folder or files Properties.
Question
In Linux, the _______________ command is used to change permissions.
Question
The process of determining the default NTFS permissions any newly introduced files or subfolders contained in a folder receive is called ________________.
Question
You can do anything you want to a file or folder with the NTFS _______________ permission.
Question
In defining exactly what any particular account can or cannot do to a file or folder, it is considered best practice to assign _______________ to groups and then add user accounts to groups.
Question
User Account Control (UAC) can be turned on or off in the ____________________ applet.
Question
The ls -l command in a Linux terminal displays a detailed list of files and folder, including permissions for three groups: owner, group, and _______________.
Question
By default, all new Windows shares only have _______________ permission.
Question
A user account with the _______________ permission can give or take away permissions for other accounts.
Question
In a Windows Vista system, the _______________library folders are accessible by all users on the computer.
Question
Both Linux and Mac OS X have been using one UAC function for a long time-it is called _______________.
Question
The only account that can truly perform any task on a Windows system is the _______________.
Question
A(n) ____________________ disk should be created and used at a later time to help users if they forget a password.
Question
If an object is _______________ within an NTFS-based volume, that object retains its permissions.
Question
Current versions of Windows refer to groupings of cylinders or transistors on an HDD or SSD as _______________ while earlier versions refer to such groupings as _______________.
Question
When copied from one NTFS volume to another, the copy of the object in the new location _______________ the permissions from that new location.
Question
The UAC classification of an unknown third-party program is known as _______________.
Question
Clicking the _______________ checkbox for a particular NTFS permission tells Windows to overrule inheritance and stop that particular NTFS permission.
Question
If an administrator wants to access a folder or file they do not have permission to access, they can go through a process called _______________.
Question
If you have the Full Control permission on a folder and only the Read permission on a file within that folder, you will actually get the _______________ permission on the file.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/120
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Users, Groups, and Permissions
1
Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account.

A)network
B)directory
C)group
D)owner
C
2
A password _______________ policy forces users to select a new password periodically.

A)permissions
B)disabling
C)expiration
D)anti-hack
C
3
When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder.

A)administrator
B)developer
C)owner
D)editor
C
4
What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer?

A)Parental Controls
B)User Account Control
C)Primary Controls
D)Mandatory Control
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
5
Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.

A)command line
B)encrypting
C)NTFS
D)administrative
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
6
On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________.

A)Group account
B)Single account
C)Specialized account
D)Local user account
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
7
What two sets of data does every folder and file on an NTFS partition list?

A)User and group access and level of access
B)Read and Execute permissions
C)NTFS and FAT permissions
D)Encryption and decryption attributes
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
8
_______________ ratings such as E, T, and M can be used to allow or block computer game use.

A)ESRB
B)ETM
C)UAC
D)TPM
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
9
What process determines what a legitimate user can and cannot do on a system?

A)Accessibility
B)Authorization
C)Permission propagation
D)Inheritance
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
10
What unique key is known only by the system and the person with whom the key is associated?

A)token
B)user name
C)user ID
D)password
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
11
A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.

A)six
B)eight
C)10
D)256
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
12
If your Vista computer is on a workgroup, what applet is used to manage user accounts?

A)User Accounts
B)User Accounts and Family Safety
C)Users and Passwords
D)Users and Groups
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
13
Which character in a password is most helpful in defeating common word hacks?

A)@
B)3
C)X
D)w
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
14
Which term refers to a unique combination of a user name and an associated password?

A)user authorization
B)user account
C)user authentication
D)user identity
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
15
What is the primary tool Windows uses for providing authorization?

A)NTFS
B)Shared folders
C)Local Security Policy
D)Parental Controls
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
16
What process identifies and grants access to a user who is trying to access a system?

A)Credibility
B)Authorization
C)Authentication
D)Honesty
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
17
Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group.

A)restricted user
B)standard user
C)new user
D)default user
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
18
With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts.

A)Change
B)List
C)Read & Execute
D)Modify
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
19
Which NTFS permission allows an account to seize control of a file or folder owned by another account?

A)File permissions
B)Take Ownership permission
C)Folder permissions
D)Change permission
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
20
What is the Windows Vista tool for managing users and groups?

A)Users and Passwords applet
B)User accounts and Groups applet
C)Users and Groups applet
D)User Accounts applet
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
21
What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program?

A)southbridge
B)TPM
C)GPU
D)northbridge
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
22
Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders?

A)Full Control
B)Modify
C)List Folder Contents
D)Read
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
23
By default, who has complete control over a folder or file?

A)Owner
B)Administrator
C)All users
D)Power users
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
24
In Windows 7, which UAC notification level is the default setting?

A)Always notify
B)Notify me only when programs try to make changes
C)Notify me only when programs try to make changes (do not dim my desktop)
D)Never notify
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
25
An unpopular, but necessary, security feature introduced in Windows Vista was _______________.

A)NTFS
B)UAC
C)EFS
D)WAC
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
26
What techniques provide the only true way to protect your data from access by any other user?

A)Regular backups
B)Authorization
C)Encryption
D)Authentication
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
27
What three letters are used in a Linux terminal to indicated permissions associated with a file or folder?

A)omc
B)rwx
C)awk
D)lsp
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
28
How many notification levels of UAC did Microsoft include in Windows 7?

A)One
B)Two
C)Three
D)Four
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
29
What type of access is granted if you log on to a computer remotely as administrator with no password?

A)Administrator
B)Standard user
C)Power user
D)Guest
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
30
Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify?

A)-rm-rm-r--
B)-rw-rw-r--
C)-rwxr--rw-
D)-rmxrm-rm-
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
31
What UAC classification is associated with a digitally signed, third-party program or non-core OS program?

A)Verified
B)Published by Windows
C)Unverified
D)Blocked program
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
32
What happens to a file or folder permission if it is copied within an NTFS partition?

A)The original retains permissions, and the copy inherits permissions from the new location.
B)Both original and copy retain permissions of the original location.
C)Both original and copy inherit permissions from the new location.
D)The original inherits permissions from the new location, and the copy retains permissions.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
33
Opening a command line and running _______________ provides access to a utility called Local Security Policy.

A)rwx.msc
B)ls -l
C)dir /p
D)secpol.msc
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
34
Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.

A)administrative shares
B)simple file sharing
C)shared folders
D)public folders
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
35
Which Linux command enables you to change the owner and the group with which a file or folder is associated?

A)mount
B)chmod
C)crontab
D)chown
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
36
If you use the System Configuration utility (msconfig) and select Disable UAC on the Tools tab, what further action is required to turn off UAC?

A)Log off
B)Log on as a different user
C)Reboot
D)None
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
37
How are Libraries folders displayed in Windows 8.1 File Explorer?

A)Simply open File Explorer; they display automatically.
B)Navigate to the folder C : \Users\MyLibraries.
C)Right-click in the navigation section and click Show Libraries.
D)Double click on Favorites and click Show Libraries in the dialog box.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
38
What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder?

A)Inheritance
B)Traversal
C)NTFS propagation
D)Permission sharing
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
39
What tool is offered by Windows Vista Ultimate and Enterprise editions to encrypt entire hard drives?

A)NTFS
B)BitLocker
C)TPMs
D)TrueCrypt
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
40
What does BitLocker require on a motherboard to validate on boot that a Windows Vista computer has not been changed?

A)EFS
B)IPC$
C)Core i7
D)TPM
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
41
In a Windows system, a container that holds user accounts and defines the capabilities of its members is called a(n) ____________________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
42
In a Windows XP system, the recommended user-account type known as _______________ prevented users from performing common tasks, such as running certain programs, installing applications, updating applications, and updating Windows.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
43
In a Windows system, ____________________ have rights almost equal to that of the administrator, except that they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
44
In a Windows system, at least one account must be a(n) _______________ account.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
45
In Windows systems, the _______________ account might be used to provide casual Internet
access to users at a library terminal.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
46
In Windows Vista, managers and parents can use _______________ to monitor and limit the activities of standard users.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
47
In a Windows system, members of the Users group are called _______________ users.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
48
Strong passwords should include letters, numbers, and _______________ symbols.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
49
In reference to Windows groups, _______________ privileges grant complete control over a machine.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
50
In a Windows XP system, ____________________ are almost as powerful as administrators, but they cannot install new devices or access other users' files unless access is provided.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
51
To create and manage user accounts in Windows, you must be a member of the ____________________ group.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
52
Through the combination of user accounts and groups and _______________ permissions, Windows provides incredibly powerful file and folder security.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
53
Parental Controls allow you to limit _______________ logged on as well as restrict access to types of games and specific applications.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
54
To create a new user in Windows 7, open the User Accounts Control Panel applet, select Manage another account, and then click ____________________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
55
Starting with Windows 8, Microsoft shifted the focus of user accounts from local accounts to _______________-wide Microsoft accounts.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
56
Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
57
A strong password should be at least _______________ characters in length.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
58
In professional editions of Windows, the _______________ is a powerful too that can be used to create, modify, and remove users and groups.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
59
You create three accounts when you set up a Windows Vista computer: guest, administrator, and a(n) _______________ that is a member of the Administrators group.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
60
To add a user in Windows Vista, open the _______________ applet.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
61
The primary way to set NTFS permissions is through the _______________ tab under the folder or files Properties.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
62
In Linux, the _______________ command is used to change permissions.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
63
The process of determining the default NTFS permissions any newly introduced files or subfolders contained in a folder receive is called ________________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
64
You can do anything you want to a file or folder with the NTFS _______________ permission.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
65
In defining exactly what any particular account can or cannot do to a file or folder, it is considered best practice to assign _______________ to groups and then add user accounts to groups.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
66
User Account Control (UAC) can be turned on or off in the ____________________ applet.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
67
The ls -l command in a Linux terminal displays a detailed list of files and folder, including permissions for three groups: owner, group, and _______________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
68
By default, all new Windows shares only have _______________ permission.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
69
A user account with the _______________ permission can give or take away permissions for other accounts.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
70
In a Windows Vista system, the _______________library folders are accessible by all users on the computer.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
71
Both Linux and Mac OS X have been using one UAC function for a long time-it is called _______________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
72
The only account that can truly perform any task on a Windows system is the _______________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
73
A(n) ____________________ disk should be created and used at a later time to help users if they forget a password.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
74
If an object is _______________ within an NTFS-based volume, that object retains its permissions.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
75
Current versions of Windows refer to groupings of cylinders or transistors on an HDD or SSD as _______________ while earlier versions refer to such groupings as _______________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
76
When copied from one NTFS volume to another, the copy of the object in the new location _______________ the permissions from that new location.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
77
The UAC classification of an unknown third-party program is known as _______________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
78
Clicking the _______________ checkbox for a particular NTFS permission tells Windows to overrule inheritance and stop that particular NTFS permission.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
79
If an administrator wants to access a folder or file they do not have permission to access, they can go through a process called _______________.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
80
If you have the Full Control permission on a folder and only the Read permission on a file within that folder, you will actually get the _______________ permission on the file.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 120 flashcards in this deck.