700 Flash Cards

Submitted by: Submitted by

Views: 37

Words: 1593

Pages: 7

Category: Science and Technology

Date Submitted: 04/06/2015 07:53 AM

Report This Essay

the network resource receiving permissions

Which of the following is the best description of a security principal?

ACLs are composed of ACEs.; Basic permissions are composed of advanced permissions.; All permissions are stored as part of the protected resource.

Which of the following statements about permissions are true?

authorization

Which of the following terms describes the process of granting users access to file server shares by reading their permissions?

basic; standard

In the NTFS permission system, combinations of advanced permissions are also known as __________ permissions.

The traditional NTFS file system

You are deciding which file system to use. You need NTFS permission system support. You don't presently need encryption or compression, but might at a later date. What file system is your best choice?

File and Storage Services in Server Manager - Use File and Storage Services in Server Manager to take control of the shares on all your disks on all your servers and exercise granular control over their properties.

What is the primary tool in Windows Server 2012 to take control of the shares on all your disks on all your servers and exercise granular control over their properties?

Understanding effective access - The combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership, is called the effective access for that element.

Knowing how permissions can be cumulative or override each other is an important factor in understanding what?

Volume Shadow Copies - Volume Shadow Copies is a Windows Server 2012 feature that enables you to maintain previous versions of...