answersLogoWhite

0

What else can I help you with?

Related Questions

What type of permissions control access to folders over a network?

Share Permission


The NTFS permission allows users to reach files and folders through folders in which they do not have access permission it allows users to view and access the contents of the folder?

Read & Execute


What NTFS permission allows users to reach files and folders through folders in which they do not have access permission so it allows users to view and access the contents of the folder?

Read & Execute


Which permission will you grant a user for a folder he need to be able to create and delete files in if you do not want him to be able to change permissions for the folder?

Write, Access control lists are used to specify the permissions that users will have to resources on the network. The Write permission allows a user to modify folders and files that already exist in the environment as well as create new files and folders as required.


If you have access to ssn but do not have permission to view certain folders or documents in that SSN those folders and documents will be what?

Files are hidden


If you have access to an SSN but do not have permission to view certain folders or documents in that SSN those folders and documents will be what in IPERMS?

Files are hidden


What two access controls can be set up for Windows Server 2003 folders and authentication?

The two access controls can be set up with "Authentication and Access Control. These are available in the Windows Server 2003 folders.


Is the process that requires a user to prove he or she has permission to access a computer network?

Authentication.


In order to gain illegitimate access to a network attackers often by-pass access control lists by . How can one bypass security network?

in order to gain illegitimate access to a network attackers often by -pass access control list by


What would one do with control access?

Access control allows an admin to control the system or network from one central location. This level of control make administering a network much easier.


Is the network media control the purpose of the Network Access layer?

Yes it is


How can you control the access to a system?

You can control the access to a system by buying or downloading certain programs. An example of a program that gives you the ability to control the access to a system is Network Access Control.