answersLogoWhite

0

What else can I help you with?

Related Questions

Which file and folder stored on a workstation or server that contain user data need to be classified as assigned data?

permissions


What are the differences between User and Administrator accounts?

An admin account allows for the user to have all the permissions to the computer and is known as the top level user. A user account has some permissions but not full access permissions to the OS that an admin would have. Based on greater permissions: 1. Admin 2. User 3. Guest


In a networked environment no authorized computer user can access data and information stored on other computers on the network?

I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so. I understand what you mean, and the answer to that is FALSE.


What does the permissions assigned to a user account do?

The permissions helps to restrict/monitor the movement(accessing of resources) of the user in the domain.


When a user or group is not listed on the Security tab for an object does that user or group have no effective permissions to that object?

Yes, they have no effective permissions.


A predefined set of permissions and rights assigned to user accounts?

User Group


If you turn off a user on your laptop will it delete the items on it?

In Windows, if you disable permissions for a user, the user's files will remain. If you delete the user profile, Windows will prompt you to keep or delete the files. If you delete the user folder manually through Windows Explorer, then the user's files stored under that folder will be deleted. Many user files may still remain in the computer though, if the user's files were stored under a custom location or if the application doesn't support user specific saves (such as a saved video game).


Which NTFS permission allows a user to change the permissions associated with a file?

In order to modify permissions, a user would need to have "Full Control"


How come a user without calendar permissions can see another user's Outlook 2010 Calendar?

If another user can see another users Outlook 2010 calendar but doesn't have permission than the owner needs to restrict permissions.


What is the su command in Unix?

The su command is used to assume the permissions of another user. Without any parameters, it is used to assume the superuser, or root, account. When followed by the name of a user account, it will allow you to use that user's account and permissions.


Which tool can be used to determine the final set of permissions that affect a user trying to access resources on an NTFS partition?

A. The Effective Permissions tab


How do you do presence check on access?

Presence check on access refers to verifying if a user or entity has the necessary permissions to access a system or resource. This is typically done by authenticating the user's identity via credentials (such as username and password), and then checking if the user's access rights match the required permissions for the requested action. If the permissions are sufficient, access is granted; if not, access is denied.