Nội dung chính
- What process identifies and grant access to a user who is trying to access a system?
- What process identifies the rights and actions a user can take within a system?
- What is a permission set group quizlet?
- What is it called when files and folders get their permissions from the parent folder?
Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only SGD 41.99/year
- Science
- Computer Science
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (36)
By default, who has complete control over a folder or file?
Owner
What process determines what a legitimate user can and cannot do on a system?
Authorization
On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________.
Local user account
Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders?
Modify
What is the primary tool Windows uses for providing authorization?
NTFS
What does BitLocker require on a motherboard to validate on boot that a Windows computer has not been changed?
TPM
Opening a command line and running _______________ provides access to a utility called Local Security Policy.
secpol.msc
Which NTFS permission allows an account to seize control of a file or folder owned by another account?
Take Ownership permission
In Windows 7, which UAC notification level is the default setting?
Notify me only when programs try to make changes
What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder?
Inheritance
Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.
NTFS
How many notification levels of UAC did Microsoft include in Windows 7?
Four
A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.
eight
Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account.
group
If you have the Full Control permission on a folder and only the Read permission on a file within that folder, you will actually get the ________ permission on the file.
Full Control
How are Libraries folders displayed in Windows File Explorer?
Right-click in the navigation section and click Show Libraries.
What process identifies and grants access to a user who is trying to access a system?
Authentication
With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts.
Change
Which term refers to a unique combination of a user name and an associated password?
user account
A password _______________ policy forces users to select a new password periodically.
expiration
What three letters are used in a Linux terminal to indicated permissions associated with a file or folder?
rwx
Which character in a password is most helpful in defeating common word hacks?
@
What unique key is known only by the system and the person with whom the key is associated?
password
An unpopular, but necessary, security feature introduced in Windows Vista was _______________.
UAC
What type of access is granted if you log on to a computer remotely as administrator with no password?
Guest
What techniques provide the only true way to protect your data from access by any other user?
Encryption
What happens to a file or folder permission if it is copied within an NTFS partition?
The original retains permissions, and the copy inherits permissions from the new location.
The original retains permissions, and the copy inherits permissions from the new location.
chown
Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify?
-rw-rw-r--
What tool is offered by Windows Ultimate and Enterprise editions to encrypt entire hard drives?
BitLocker
Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.
administrative shares
When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder.
owner
What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program?
TPM
Selecting _______________while adding a new user in Windows makes that user a member of the local Users group.
standard user
A user account with the permission can give or take away permissions for other accounts.
Change Permission
What two sets of data does every folder and file on an NTFS partition list?
User and group access and level of access
Recommended textbook solutionsEngineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Sets found in the same folder5.4
35 terms
iyanez88165
2.1
35 terms
iyanez88165
2.2
33 terms
iyanez88165
2.3
31 terms
iyanez88165
Other sets by this creator5.3
12 terms
iyanez88165
5.2
12 terms
iyanez88165
5.1
17 terms
iyanez88165
4.3
28 terms
iyanez88165
Verified questionsCOMPUTER SCIENCE
Write a function that computes the area of a triangle given the length of its three sides as parameters. Use your function to augment triangle2.py so that it also displays the area of the triangle.
Verified answer
COMPUTER SCIENCE
T F The cout statement in the following program segment will display 5: int x = 5; cout << x++;
Verified answer
COMPUTER SCIENCE
The following programs has errors. Find as many as you can. // This program uses an if/else if statement to assign a // letter grade (A, B, C, D, or F) to a numeric test score. #include <iostream> using namespace std; int main () { int testScore; cout << "Enter your test score and I will tell you\n"; cout << "the letter grade you earned: "; cin >> testScore; if (testScore < 60) cout << "Your grade is F.\n"; else if (testScore < 70) cout << "Your grade is D.\n"; else if (testScore < 80) cout << "Your grade is C.\n"; else if (testScore < 90) cout << "Your grade is B.\n"; else cout << "That is not a valid score.\n"; else if (testScore <= 100) cout << "Your grade is A.\n"; return 0; }
Verified answer
COMPUTER SCIENCE
True/False: Object-oriented design is the process of finding and defining a useful set of functions for solving a problem.
Verified answer
Other Quizlet setsforensic science midterm
58 terms
claire_chatellier
Skin structure, growth, and nutrition
35 terms
Kristen_Walter8
Acct 2301 midterm
44 terms
kacie_wallace8
History- Japan Pt.II
26 terms
keziahtorres91210
Related questionsQUESTION
Which network hosts would most likely provide the services needed to allow client access to the internet web pages?
3 answers
QUESTION
If an individual thread is unable to take advantage of the overlap of CPU and I/O operations, the OS can overlap the CPU execution of one thread with the I/O operation of other threads.
2 answers
QUESTION
Clean up your workspace by issuing the appropriate options to the advanced configuration tool (will remove downloaded package files).
5 answers
QUESTION
Direct memory access is the dominant form of transfer that must be supported by the operating system.
15 answers
What process identifies and grant access to a user who is trying to access a system?
Authentication is the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.
What process identifies the rights and actions a user can take within a system?
Explanation: Authentication is the process of identifying an individual, usually based on a username and password. After a user is authenticated, he can access network resources based on his authorization. 3.
What is a permission set group quizlet?
A permission set group includes all permissions in the permission sets. You can even include a permission set in more than one permission set group. You don't want a permission set with too many permissions T/F.
What is it called when files and folders get their permissions from the parent folder?
| 4 min read. | Last updated April 23, 2021. Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all of the folders under that folder in the tree.