Chapter 4 Flashcards

Managing data access

1
Q

Groups

A

Used to ease network administration by grouping users together who have similar permission requirements (and are an important part of network management).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SID

A

Security Identification number, given when a user is created on a local Windows system or on an Active Directory domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when you assign rights to a user?

A

The rights and permissions get associated to the user’s SID not the username. Because of this you can rename user accounts without issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Folder Options

A

Three tabs: General, View, Search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Search tab do?

A

Used to configure how Windows 10 searches for files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Windows OS have the ability to apply data governance to your file server?

A

Windows Server 2012 R2, Windows 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Dynamic Access Control (DAC)?

A

Allows to identify data using automatic and manual data classifications and then control access to those files based on the classifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is AD RMS?

A

Active Directory Rights Management Service encryption for Microsoft Office documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Difference between rights and permissions?

A

Rights pertain to operations on the system, whereas permissions pertain to operations on specific objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is EFS?

A

Encrypted File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a security descriptor contain?

A

The user/group that owns the object, the users/groups who are allowed/denied access to the object, and the users/groups whose access to the object will be audited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you see who owns a directory?

A

Type dir /q in the command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you use the ICACLS command-line utility to display or modify user access permissions?

A

/grant grants permissions
/remove revokes permissions
/deny denies permissions
/setintegritylevel sets an integrity level of Low/Medium/High.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Sharing?

A

The process of allowing network users access to a resource located on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is BitLocker Drive Encryption?

A

A feature that allows you to encrypt your entire drive (only the OS or internal hard drives).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What OS can use BitLocker?

A

Windows 10 Ent, Pro, Edu; Windows 8 Pro, Ent; Windows 7 Pro, Ent; Windows Server 2012/2008 and 2012/2008 R2.