Chapter 13, users , groups and permissions 1002

Ace your homework & exams now with Quizwiz!

An unpopular, but necessary, security feature introduced in Windows Vista was _______________.

UAC

----------- applet in Control panel enables ou to make changes to local user accounts. Three types of account while windows set up are ---------. To make changes to your group memberships and as well as make simple changes to your account and other accounts, you need to be a member of --------

User Account local user account, domain account and child account administrator group

__________________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.

User Account Control (UAC)

The __________________ enables you to manage user accounts in Windows.

User Accounts applet

Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account

group

What type of access is granted if you log on to a computer remotely as administrator with no password?

guest

The Deny checkbox always overrides the NTFS --------.

inheritance

what is password

it is unique key is known only by the system and the person with whom the key is associated?

Which term refers to a unique combination of a user name and an associated password?

user account. trap ans: user identity

Windows 10 Home users need to use Accounts in settings or ----------- in Control panel to manage

user accounts

Definitely make a password reset disk if you use encryption of any type, as the encryption key for EFS is tied to the ----------

user's password

Which of the following is the strongest password?

479love*

only two groups can be assigned to a user in home editions of windows which are

Administrator note: power users are part of administrator group Users guest users do not have the account

Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify?-rwxrw-r--

-rw-rw-r-- (ignore dashes) rwx ----owners permissions. ( r=read, w=modify/write and x=execute) rw------group permissions (read and modify) r--------Everyone permissions. (read)

Which of the following user account types can create other user accounts?

Administrator

What process determines the identity of a user?

Authentication

Authentication is the process of giving a user access to a system. ------ is how we determine what an authenticated user can do to a system

Authorization

Which tool in certain Windows editions enables you to encrypt the contents of a drive, including folders of users other than you?

BitLocker

__________________ requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.

BitLocker Drive Encryption

The default behavior for --------- in Windows is the second-from-top option. Do you want to allow the following program to make changes to this computer

Darkened UAC

------------- is just one possible attribute of a file. You can also make files hidden, read-only, and more, all from a file or folder's Properties dialog box.

Encryption

The __________________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.

Encryption

Marjorie has files of a delicate nature that she doesn't want other users on a shared Windows system to access. What must she use to secure these files, even from administrators?

Encryption.

Which of the following are a standard NTFS permission?

Full control, modify and Read and execute

A(n) __________________ is a collection of user accounts that share the same access capabilities.

Group

Which of the following groups enables someone who does not have an account on the system to log on? Assume the group is enabled.

Guests

By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called __________________.

Inheritance

What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder?

Inheritance

Which utility enables you to add users and groups in Windows 7 Professional?

Local Users and Groups ( Control panel - administrative tool, computer management , local users and group or lusrmgr.msc) trap: user account applet ( it creates users in window 10.

Difference between full control vs Modify permissions

Modify: defined as enabling you to read, write, and delete both files and subfolders Full control: you can also execute programs (read and execute) and list programs ( List Folder permisions)

What is the primary tool Windows uses for providing authorization?

NTFS

In Windows 7, which UAC notification level is the default setting?

Notify me only when programs try to make changes

In Windows 7 and later, how do the two middle levels of UAC security differ?

One uses a consent prompt that blocks all other actions; the other uses a consent prompt that does not block other actions

When you create a new file or folder on an NTFS partition, you become the __________________of that file or folder.

Owner

Which tool in Windows enables an administrator to create a log that shows all of the applications a user runs or attempts to run?

Parental Controls

As a member of the accounting group, John has Write permission to the Database folder; as a member of the technicians group, John has Read permission to the Database folder. What permission or permissions does John have to the Database folder?

Read and Write

How are Libraries folders displayed in Windows File Explorer?

Right-click in the navigation section and click Show Libraries.

a standard user can perform administrative tasks using the tool called -------

Run as a administrator in context menu. trap answer: UAC ( it is warning that comes after run as administrator. it is not a tool)

John needs to perform many changes and updates to a Windows 8.1 system. How does he turn UAC off?

Select User Account Control settings in the User Accounts Control Panel applet, change the slider to Never notify.

When you copy a file from one folder on the C: drive to another folder on the C: drive, by default what permissions will the copy of that file have if the C: drive is formatted with NTFS?

The copy will inherit the permissions of the new location.

What happens to a file or folder permission if it is copied within an NTFS partition?

The original retains permissions, and the copy inherits permissions from the new location. this is called migration permissions.

----------- do not have file-level permissions. it uses only a limited set of permissions you can assign. As far as folder permissions go, you can assign only one: ------------. To see this in action, right-click on a file or folder and select Sharing and Security from the options. Note that you can't just select Properties and see a Security tab as you can in the professional-oriented editions of Windows.

Windows Home editions Make This Folder Private

Make sure you know what each of the four UAC levels does. 1) Always Notify 2) Never Notify 3) Notify me only when programs try to make changes to my computer 4) Notify me only when programs try to make changes to my computer ( do not dim my desktop)

a) Apps try to install or make changes to me b) I make changes to windows settings. 1) a,b applies 2) A and B applies 3) only B applies 4) only B applies

Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.

administrative share ( indicated by dollar sign)

Once a user gains access to the system through whatever method of authentication (such as a user name and password), the NTFS permissions associated with various objects (files, folders, programs, etc.) determine what that user can do. This is called ------

authorization

The process that defines what resources an authenticated user may access and what he or she may do with those resources is called __________________.

authorization

What tool is offered by Windows Ultimate and Enterprise editions to encrypt entire hard drives?

bit locker it requires TPM module to work. This chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program

With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts

change. trap: modify

Which of the following commands is used to change file permissions in Linux?

chmod

8. The __________________command enables you to change the owner and the group with which a file or folder is associated in Linux and Mac OS X.

chown

-------------- command Enables you to change owner and group with which a file or folder is associated whereas ---------- command Used to change permissions Using a numbering system such as 4-2-1-------------

chown: Syntax: chown <new owner> filename chmod r:4; w:2, x:1

Run as administrator commands is UAC feature which is called ------

elevated privileges.

2. To log on to a standalone Windows PC, you need a(n) __________________.

local user account

On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________.

local user account

shortkey to open local users and groups. Note: Make sure run it as an administrator to make changes which is called elevated privileges.

lusrmgr.msc. trap: lusrmgr.exe

By default, who has complete control over a folder or file

owner. trap: administrator ( it can take ownership)

When you move from NTFS partition to FAT partition, you will lose --------.

permissions

Administrative shares have been exploited by malware programs, especially because many users who set up their computers never give the administrator account a password. Starting with Windows XP Home, Microsoft changed the ----------------- for such machines. If you log on to a computer remotely as administrator with no password, you get guest access rather than administrator access. That neatly nips potential exploits in the bud.

remote access permissions

Opening a command line and running _______________ provides access to a utility called Local Security Policy.

secpol.msc

Selecting _______________while adding a new user in Windows makes that user a member of the local Users group

standard user


Related study sets

Biochemistry CH4: Carbohydrate structure + function

View Set

Entrepreneurship Final T/F Section

View Set