Security Technologies Flashcards
Directory permissions: Read
Effect on folder: User can view the contents of a folder and any subfolders.
Effect on file: User can view the contents of the file.
Directory permissions: Write
Effect on folder: Read permission, plus the user can add files and create new subfolders.
Effect on file: Read permission, plus the user can make changes (write) to the file.
Directory permissions: Read & Execute
Effect on folder: Read permission, plus the user can run executable files contained in the folder. This permission is inherited by any subfolders and files.
Effect on file: Read permission, plus the user can run a file if it is executable.
Directory permissions: List Folder Contents
Effect on folder: Read permission, plus the user can run executable files contained in the folder. This permission is inherited by subfolders only.
Effect on file: N/A
Directory permissions: Modify
Effect on folder: Read and Write permissions, plus the user can delete the folder.
Effect on file: Read and Write permissions, plus the user can delete the file.
Directory permissions: Full Control
Effect on folder: Read, Write, and Modify permissions and the user can delete all files and subfolders.
Effect on file: Read, write, modify, and delete the file.
Security Enhanced Linux (SELinux)
A component included with many Linux distributions that allows more options for setting file and folder permissions.
Inherited permissions
The permissions assigned to a parent object that flows down and apply to a child object.
Credential Manager
A Control Panel utility which allows individual users to access their stored user names, passwords, and certificates.
Folder redirection
A flexible approach which allows an administrator to decide which folders are stored only on the network and which are copied locally.
Email filtering
A software-based tool that can sort or block emails from being delivered to a user’s inbox based on the configured criteria.
Port security
A switch feature that tracks device MAC addresses connected to each port on a switch, and allows or blocks traffic based on source MAC addresses.
Proxy server
A server which intercepts and mediates communications between internal and external hosts on the network.
File attributes: R
Read-Only - Allows a user or the operating system to read a file, but not write to it.
File attributes: A
Archive - Specifies the file should be backed up.
File attributes: S
System - Indicates the file is a system file and shouldn’t be altered or deleted. By default, system files are hidden.
File attributes: H
Hidden - Suppresses the display of the file in directory lists, unless you issue the command to list hidden files.
File attributes: D
Directory - Indicates a folder or sub-folder, differentiating them from files.
File attributes: I
Not content-indexed - Windows has a search function that indexes all files and directories on a drive to achieve faster search results.
File attributes: C
Compressed - On an NTFS file system volume, each file and directory has a compression attribute. Other file systems may also implement a compression attribute for individual files and directories.
File attributes: E
Encrypted - On an NTFS file system volume, each file and directory has an encryption attribute as part of the Encrypting File System (EFS).
Linux permissions: Read (r)
User can view the contents of a file.
Linux permissions: Write (w)
User can write to (modify) the contents of a file or directory.
Linux permissions: Execute (x)
User can run an executable file and view the contents of a directory.