An unpopular, but necessary, security feature introduced in windows vista was _______________.

Nội dung chính

  • What process identifies and grant access to a user who is trying to access a system?
  • What process identifies the rights and actions a user can take within a system?
  • What is a permission set group quizlet?
  • What is it called when files and folders get their permissions from the parent folder?

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only SGD 41.99/year

  1. Science
  2. Computer Science
  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (36)

By default, who has complete control over a folder or file?

Owner

What process determines what a legitimate user can and cannot do on a system?

Authorization

On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________.

Local user account

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders?

Modify

What is the primary tool Windows uses for providing authorization?

NTFS

What does BitLocker require on a motherboard to validate on boot that a Windows computer has not been changed?

TPM

Opening a command line and running _______________ provides access to a utility called Local Security Policy.

secpol.msc

Which NTFS permission allows an account to seize control of a file or folder owned by another account?

Take Ownership permission

In Windows 7, which UAC notification level is the default setting?

Notify me only when programs try to make changes

What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder?

Inheritance

Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.

NTFS

How many notification levels of UAC did Microsoft include in Windows 7?

Four

A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.

eight

Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account.

group

If you have the Full Control permission on a folder and only the Read permission on a file within that folder, you will actually get the ________ permission on the file.

Full Control

How are Libraries folders displayed in Windows File Explorer?

Right-click in the navigation section and click Show Libraries.

What process identifies and grants access to a user who is trying to access a system?

Authentication

With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts.

Change

Which term refers to a unique combination of a user name and an associated password?

user account

A password _______________ policy forces users to select a new password periodically.

expiration

What three letters are used in a Linux terminal to indicated permissions associated with a file or folder?

rwx

Which character in a password is most helpful in defeating common word hacks?

@

What unique key is known only by the system and the person with whom the key is associated?

password

An unpopular, but necessary, security feature introduced in Windows Vista was _______________.

UAC

What type of access is granted if you log on to a computer remotely as administrator with no password?

Guest

What techniques provide the only true way to protect your data from access by any other user?

Encryption

What happens to a file or folder permission if it is copied within an NTFS partition?

The original retains permissions, and the copy inherits permissions from the new location.

The original retains permissions, and the copy inherits permissions from the new location.

chown

Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify?

-rw-rw-r--

What tool is offered by Windows Ultimate and Enterprise editions to encrypt entire hard drives?

BitLocker

Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.

administrative shares

When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder.

owner

What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program?

TPM

Selecting _______________while adding a new user in Windows makes that user a member of the local Users group.

standard user

A user account with the permission can give or take away permissions for other accounts.

Change Permission

What two sets of data does every folder and file on an NTFS partition list?

User and group access and level of access

Recommended textbook solutions

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Sets found in the same folder

5.4

35 terms

iyanez88165

2.1

35 terms

iyanez88165

2.2

33 terms

iyanez88165

2.3

31 terms

iyanez88165

Other sets by this creator

5.3

12 terms

iyanez88165

5.2

12 terms

iyanez88165

5.1

17 terms

iyanez88165

4.3

28 terms

iyanez88165

Verified questions

COMPUTER SCIENCE

Write a function that computes the area of a triangle given the length of its three sides as parameters. Use your function to augment triangle2.py so that it also displays the area of the triangle.

Verified answer

COMPUTER SCIENCE

T F The cout statement in the following program segment will display 5: int x = 5; cout << x++;

Verified answer

COMPUTER SCIENCE

The following programs has errors. Find as many as you can. // This program uses an if/else if statement to assign a // letter grade (A, B, C, D, or F) to a numeric test score. #include <iostream> using namespace std; int main () { int testScore; cout << "Enter your test score and I will tell you\n"; cout << "the letter grade you earned: "; cin >> testScore; if (testScore < 60) cout << "Your grade is F.\n"; else if (testScore < 70) cout << "Your grade is D.\n"; else if (testScore < 80) cout << "Your grade is C.\n"; else if (testScore < 90) cout << "Your grade is B.\n"; else cout << "That is not a valid score.\n"; else if (testScore <= 100) cout << "Your grade is A.\n"; return 0; }

Verified answer

COMPUTER SCIENCE

True/False: Object-oriented design is the process of finding and defining a useful set of functions for solving a problem.

Verified answer

Other Quizlet sets

forensic science midterm

58 terms

claire_chatellier

Skin structure, growth, and nutrition

35 terms

Kristen_Walter8

Acct 2301 midterm

44 terms

kacie_wallace8

History- Japan Pt.II

26 terms

keziahtorres91210

Related questions

QUESTION

Which network hosts would most likely provide the services needed to allow client access to the internet web pages?

3 answers

QUESTION

If an individual thread is unable to take advantage of the overlap of CPU and I/O operations, the OS can overlap the CPU execution of one thread with the I/O operation of other threads.

2 answers

QUESTION

Clean up your workspace by issuing the appropriate options to the advanced configuration tool (will remove downloaded package files).

5 answers

QUESTION

Direct memory access is the dominant form of transfer that must be supported by the operating system.

15 answers

What process identifies and grant access to a user who is trying to access a system?

Authentication is the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

What process identifies the rights and actions a user can take within a system?

Explanation: Authentication is the process of identifying an individual, usually based on a username and password. After a user is authenticated, he can access network resources based on his authorization. 3.

What is a permission set group quizlet?

A permission set group includes all permissions in the permission sets. You can even include a permission set in more than one permission set group. You don't want a permission set with too many permissions T/F.

What is it called when files and folders get their permissions from the parent folder?

| 4 min read. | Last updated April 23, 2021. Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all of the folders under that folder in the tree.

What three letters are used in a Linux terminal to indicated permissions associated with a file or folder?

The following set of three characters (rwx) is for the owner permissions. The second set of three characters (rwx) is for the Group permissions. The third set of three characters (rwx) is for the All Users permissions.

How are libraries folders displayed in Windows 8.1 File Explorer?

To show libraries in File Explorer, select the View tab, and then select Navigation pane > Show libraries.

What tool is offered by Windows Ultimate enterprises to encrypt entire hard drives?

Microsoft Windows includes an encryption tool called BitLocker which can be used to encrypt all or part of your hard drive.

Which user name is associated with a process started by Windows itself?

All processes have a user name to identify who started the process- A process started by Windows has the user name System.