Nội dung chính Show
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only SGD 41.99/year
Terms in this set (36)By default, who has complete control over a folder or file? Owner What process determines what a legitimate user can and cannot do on a system? Authorization On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________. Local user account Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders? Modify What is the primary tool Windows uses for providing authorization? NTFS What does BitLocker require on a motherboard to validate on boot that a Windows computer has not been changed? TPM Opening a command line and running _______________ provides access to a utility called Local Security Policy. secpol.msc Which NTFS permission allows an account to seize control of a file or folder owned by another account? Take Ownership permission In Windows 7, which UAC notification level is the default setting? Notify me only when programs try to make changes What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder? Inheritance Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups. NTFS How many notification levels of UAC did Microsoft include in Windows 7? Four A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols. eight Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account. group If you have the Full Control permission on a folder and only the Read permission on a file within that folder, you will actually get the ________ permission on the file. Full Control How are Libraries folders displayed in Windows File Explorer? Right-click in the navigation section and click Show Libraries. What process identifies and grants access to a user who is trying to access a system? Authentication With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts. Change Which term refers to a unique combination of a user name and an associated password? user account A password _______________ policy forces users to select a new password periodically. expiration What three letters are used in a Linux terminal to indicated permissions associated with a file or folder? rwx Which character in a password is most helpful in defeating common word hacks? @ What unique key is known only by the system and the person with whom the key is associated? password An unpopular, but necessary, security feature introduced in Windows Vista was _______________. UAC What type of access is granted if you log on to a computer remotely as administrator with no password? Guest What techniques provide the only true way to protect your data from access by any other user? Encryption What happens to a file or folder permission if it is copied within an NTFS partition? The original retains permissions, and the copy inherits permissions from the new location. The original retains permissions, and the copy inherits permissions from the new location. chown Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify? -rw-rw-r-- What tool is offered by Windows Ultimate and Enterprise editions to encrypt entire hard drives? BitLocker Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely. administrative shares When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder. owner What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program? TPM Selecting _______________while adding a new user in Windows makes that user a member of the local Users group. standard user A user account with the permission can give or take away permissions for other accounts. Change Permission What two sets of data does every folder and file on an NTFS partition list? User and group access and level of access Recommended textbook solutionsEngineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Operating System Concepts9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin 489 solutions Introduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions Sets found in the same folder5.435 terms iyanez88165 2.135 terms iyanez88165 2.233 terms iyanez88165 2.331 terms iyanez88165 Other sets by this creator5.312 terms iyanez88165 5.212 terms iyanez88165 5.117 terms iyanez88165 4.328 terms iyanez88165 Verified questionsCOMPUTER SCIENCE Write a function that computes the area of a triangle given the length of its three sides as parameters. Use your function to augment triangle2.py so that it also displays the area of the triangle. Verified answer COMPUTER SCIENCE T F The cout statement in the following program segment will display 5: int x = 5; cout << x++; Verified answer COMPUTER SCIENCE The following programs has errors. Find as many as you can. // This program uses an if/else if statement to assign a // letter grade (A, B, C, D, or F) to a numeric test score. #include <iostream> using namespace std; int main () { int testScore; cout << "Enter your test score and I will tell you\n"; cout << "the letter grade you earned: "; cin >> testScore; if (testScore < 60) cout << "Your grade is F.\n"; else if (testScore < 70) cout << "Your grade is D.\n"; else if (testScore < 80) cout << "Your grade is C.\n"; else if (testScore < 90) cout << "Your grade is B.\n"; else cout << "That is not a valid score.\n"; else if (testScore <= 100) cout << "Your grade is A.\n"; return 0; } Verified answer COMPUTER SCIENCE True/False: Object-oriented design is the process of finding and defining a useful set of functions for solving a problem. Verified answer Other Quizlet setsforensic science midterm58 terms claire_chatellier Skin structure, growth, and nutrition35 terms Kristen_Walter8 Acct 2301 midterm44 terms kacie_wallace8 History- Japan Pt.II26 terms keziahtorres91210 Related questionsQUESTION Which network hosts would most likely provide the services needed to allow client access to the internet web pages? 3 answers QUESTION If an individual thread is unable to take advantage of the overlap of CPU and I/O operations, the OS can overlap the CPU execution of one thread with the I/O operation of other threads. 2 answers QUESTION Clean up your workspace by issuing the appropriate options to the advanced configuration tool (will remove downloaded package files). 5 answers QUESTION Direct memory access is the dominant form of transfer that must be supported by the operating system. 15 answers What process identifies and grant access to a user who is trying to access a system?Authentication is the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server. What process identifies the rights and actions a user can take within a system?Explanation: Authentication is the process of identifying an individual, usually based on a username and password. After a user is authenticated, he can access network resources based on his authorization. 3. What is a permission set group quizlet?A permission set group includes all permissions in the permission sets. You can even include a permission set in more than one permission set group. You don't want a permission set with too many permissions T/F. What is it called when files and folders get their permissions from the parent folder?| 4 min read. | Last updated April 23, 2021. Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all of the folders under that folder in the tree. What three letters are used in a Linux terminal to indicated permissions associated with a file or folder?The following set of three characters (rwx) is for the owner permissions. The second set of three characters (rwx) is for the Group permissions. The third set of three characters (rwx) is for the All Users permissions.
How are libraries folders displayed in Windows 8.1 File Explorer?To show libraries in File Explorer, select the View tab, and then select Navigation pane > Show libraries.
What tool is offered by Windows Ultimate enterprises to encrypt entire hard drives?Microsoft Windows includes an encryption tool called BitLocker which can be used to encrypt all or part of your hard drive.
Which user name is associated with a process started by Windows itself?All processes have a user name to identify who started the process- A process started by Windows has the user name System.
|