Deck 10: Account and Resource Management

Full screen (f)
exit full mode
Question
Which of the following is NOT a Windows share permission?

A) read
B) write
C) change
D) full control
Use Space or
up arrow
down arrow
to flip the card.
Question
Which option found in the Advanced Sharing dialog box controls how offline files are configured?

A) Permissions
B) Caching
C) Share name
D) Limits
Question
What is the correct syntax to map drive letter X: to a share named myshare on a server named server1?

A) net share \\server1\myshare X:
B) net share X: \\server1\myshare
C) net use X: \\server1\myshare
D) net use \\server1\myshare X:
Question
You want to view a list of users on a Linux system. What command should you use?

A) cat /usr/passwd
B) print /usr/passwd
C) print /etc/passwd
D) cat /etc/passwd
Question
Which component of printer sharing in Windows is a storage location for pending print jobs?

A) print device
B) print queue
C) print server
D) printer pool
Question
A new technician sees the following syntax in a batch file: \\server1\accounting. He is unfamiliar with the syntax and asks you what it is called. What do you tell him?

A) URL location
B) share path
C) UNC path
D) mount location
Question
You want to automate the process of mapping drive letters to shares when users log on to a Windows domain. What should you do?

A) install a driver
B) make a BASH script
C) construct a macro
D) create a batch file
Question
You have shared a folder on a Windows server that is a part of a domain. You need to assign permissions to users in this domain so they can access the shared folder. Which type of group should you use to make the permissions assignment?

A) Local
B) Domain local
C) Global
D) Universal
Question
Which type of macOS account can log on to the local Mac computer and run applications but cannot change network settings?

A) Standard
B) Administrator
C) Sharing Only
D) Guest
Question
Domain local groups are primarily used to hold Global groups and provide access to domain resources.
Question
You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers configured-one for each print device. Some of your users have one printer configured on their computer and other users have the other printer configured. You have found that users are often waiting for their print job to start because another print job is running on the same print device while the other print device sits idle. You want to maximize usage of both printers and avoid having users wait. What should you configure?

A) printer priority
B) job management
C) printer pooling
D) availability control
Question
The general rule for securing a computer is to provide maximum access to authorized users so permissions are less difficult to manage.
Question
In Linux, a network drive that is attached to the file system is referenced with a drive letter.
Question
In macOS, a Sharing Only account can log on to the Mac computer where the account is created and access shared files and printers on other computers.
Question
You are explaining to a colleague how she can access a shared folder from her Linux file system. Which of the following terms best describes what you should tell her?

A) map a drive letter
B) mount a drive letter
C) mount a share
D) map a volume
Question
Your company has 30 client computers running Windows 10. You have shared a folder on Bill's Windows 10 computer and set the permissions so all the users in the company can access it. However, periodically some users tell you they are not permitted to access the share. It seems to be different users that can't access the share each time it happens. What is a likely reason that some users cannot access the share at times?

A) The computer with the share runs out of drive letters to assign to clients.
B) The SMB protocol limits the bandwidth and the limit is exceeded.
C) The share permissions prevent access at certain times of the day.
D) Windows 10 only allows ap to 20 users to access a share simultaneously.
Question
On Windows, a redirector allows network resources to be accessed as though they were local from the user's point of view.
Question
You have a multidomain Windows Server 2019 forest. You need to make a shared folder on a member server available to users from several domains. What type of group should you create to add the users to and assign permissions to the resource?

A) Universal
B) Global
C) Domain local
D) Builtin local
Question
Which file sharing client component intercepts requests for resources and examines it to determine whether the resource is local or remote?

A) drive mapper
B) UNC path
C) redirector
D) authenticator
Question
You need to create a user on your Fedora Linux system. What command should you use?

A) newaccount
B) userconf
C) useradd
D) usermod
Question
You want to access shared folders on a Windows computer named WinServ from your macOS computer. What do you type in the Connect to Server dialog box?

A) \\winserv\
B) unc: \\WinServ
C) smb://WinServ
D) net\WinServ
Question
Which of the following is the correct syntax for specifying the UPN for a user named jsmith on the mydomain.local domain?

A) jsmith@mydomain.local
B) mydomain.local/jsmith
C) jsmith$mydomain.local
D) jsmith\mydomain.local
Question
Which of the following is a primary reason for using group accounts on an OS?

A) To allow many users to sign into the OS using a single group account and password.
B) To simplify the assignment of rights and permissions to users with common requirements.
C) To easily send messages to a group of users through the computer messaging system.
D) To make deletion or disabling of many user accounts at one time easier.
Question
Which of the following is NOT a typical password policy option?

A) minimum length
B) complexity requirements
C) password change frequency
D) password storage location
Question
You have configured a shared printer on a Windows Server 2016 server that is a domain member. You want uses to be able to easily find this printer in Active Directory. What option should you enable?

A) Additional drivers
B) List in the directory
C) Add to the domain
D) Make printer searchable
Question
Michael Thomas has a user account named mthomas. Michael has just left the company and his replacement is in the process of being hired. Michael's account was a member of several groups that are assigned rights and permissions throughout the network. His replacement will require the same level of access that Michael had including access to all his work files. What is the best approach to ensuring that Michael's replacement can easily be assigned the necessary rights and permissions?

A) Delete Michael's account. Ask him which groups his account was a member of and add the new user's account to those groups.
B) Disable Michael's account. When his replacement is hired, rename the account, change the password, and re-enable it.
C) Disable Michael's account. Find the groups his account is a member of, create an account for the new user and add the new user's account to those groups.
D) Delete Michael's account to clear security information. Create the mthomas account again so it is still a member of the groups it was before and then rename the account.
Question
You have hired a junior IT administrator that will administer user and group accounts in the domain but you do not want to give the new hire greater administrative authority. What should you do?

A) Add the junior IT administrator's account to the Account Operators group.
B) Add the junior IT administrator's account to the Server Operators group.
C) Add the junior IT administrator's account to the Administrators group.
D) Add the junior IT administrator's account to the Backup Operators group.
Question
You added the user jsmith to the file and folder permissions list of a folder named Accounting on a Windows 10 computer and gave the user Full Control to the folder. When you checked the permissions on a subfolder of the Accounting folder, you see that jsmith is also on that permissions list with Full Control permissions. What is the most likely reason jsmith on the subfolder's permissions list if you didn't add the account?

A) The jsmith user has Full Control sharing permissions.
B) The user jsmith added the account to the subfolder.
C) The Full Control permission always applies to subfolders.
D) Subfolders acquire parent folder permissions due to permission inheritance.
Question
The user Jack has been assigned the Change permission to a Windows share and the Read and Write permission to the shared folder in file and folder permissions. Which of the following actions can Jack NOT perform on files in the share when accessing them from the network?

A) modify the files
B) delete the files
C) open the files
D) view file attributes
Question
You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What should you do?

A) use the runas command
B) preface the command with sudo
C) run the command followed by /root
D) type superuser and then the command
Question
What is the default location for a print queue on a Windows computer?

A) C : \System\Printers\Queues
B) C: \Windows\System32\Printers\Queue
C) C: \Windows\System32\Spool\Printers
D) C: \System\Spool\Printers
Question
What command can you use on a Linux computer to access a Windows share named mydocs on a server name WinServ?

A) open //WinServ/mydocs
B) smbclient //WinServ/mydocs
C) ftp WinServ:mydocs
D) use WinServ\mydocs
Question
Which of the following is a native Linux printer sharing protocol?

A) TCP
B) SMB
C) CUPS
D) NFS
Question
Which of the following is an example of applying the least privileges rule?

A) Giving a user that needs to open and view the contents of a file Modify permission to the file.
B) Giving a group Read permission to a folder that contains policy documents that should be read but not changed by the members of the group.
C) Giving the Everyone group Read access to a share that contains documents needed by the accounting department.
D) Adding a new technician's user account to the Administrator group because the technician will need full administrative access after training has been completed in a few months.
Question
You have mapped a drive letter to a share named hrdocs on a server named hr. After mapping the drive, you need to access a file named hiring.pdf in a subfolder named employment. What is the correct syntax for accessing this file using the drive mapping?

A) H:\employment\hiring.pdf
B) H:\\hr\hrdocs\employment\hiring.pdf
C) H:hrdocs\employment\hiring.pdf
D) H:\\hr\employment\hiring.pdf
Question
You have created several shares on your macOS computer, and you want to be able to easily set permissions on the shares so several other users on other macOS computers can access the shares. What type of account should you create?

A) Standard
B) Group
C) Sharing Only
D) Network
Question
You want to share files from your Linux computer with Windows client computers using the Server Message Block protocol. You have installed the Samba package and started the daemon, but your Windows clients can't access the shares. What should you do?

A) Edit the /etc/samba/smb.conf file and add the share paths.
B) Install the Network File System protocol on the Windows clients.
C) Configure Linux subsystem for Windows on your Windows computers.
D) Sign in as the root user and start the Samba service.
Question
Which command can you use in Linux to give the current logged on user temporary root permissions?

A) admin
B) root
C) su
D) ls
Question
You are setting up an Active Directory environment for a business that has three locations and 300 users. You want the users to be easily found in Active Directory based on the location and department they work in. What feature of Active Directory should you use?

A) Universal groups
B) ADAC
C) OUs
D) UPNs
Question
A user has signed into a Windows domain and the user is trying to change the video card driver on their computer. The OS does not allow the user to make this change. What process determined whether the user could change the video card driver?

A) authentication
B) remediation
C) enumeration
D) authorization
Question
You run the Linux ls command and see the following next to a file name: d rw- --- ---. What does this mean?

A) The file has been deleted but the group had read and write access to it.
B) The file is a directory and the owner has read and write access.
C) All users have read and write access to the regular file.
D) Only the root user has the ability to delete, open, or write to the file.
Question
How should a user sign into a computer to gain interactive access to the computer and its resources?

A) sign into the console
B) use the SMB protocol
C) using a VPN
D) sign in remotely
Question
What is the least file and folder permission necessary to open and run an application?

A) List folder contents
B) Read
C) Read & execute
D) Full control
Question
You are examining a file named smb.conf on a Linux computer and see the line: read only = no. What does this mean?

A) Read access to the specified share is not permitted.
B) Users have read and write access to the specified file on the local file system.
C) Read and write access to the specified share is permitted.
D) Users cannot read the specified file on the local file system.
Question
What property of permissions defines how permissions are transmitted from a parent object to a child object?

A) interactive permissions
B) effective permissions
C) advanced permissions
D) permission inheritance
Question
A user is trying to access a file in a shared Windows folder. The user can open the share but cannot open the file in the share. You check the sharing permissions and the user has Change permission to the share. Why can't the user open the file?

A) The Change permission does allow users to open files; the user must have Read permission.
B) The user does not have Read file and folder permissions to the file.
C) The user doesn't have at least Read sharing permissions to the file.
D) The user's password might have expired after they signed into the share.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Account and Resource Management
1
Which of the following is NOT a Windows share permission?

A) read
B) write
C) change
D) full control
B
2
Which option found in the Advanced Sharing dialog box controls how offline files are configured?

A) Permissions
B) Caching
C) Share name
D) Limits
B
3
What is the correct syntax to map drive letter X: to a share named myshare on a server named server1?

A) net share \\server1\myshare X:
B) net share X: \\server1\myshare
C) net use X: \\server1\myshare
D) net use \\server1\myshare X:
C
4
You want to view a list of users on a Linux system. What command should you use?

A) cat /usr/passwd
B) print /usr/passwd
C) print /etc/passwd
D) cat /etc/passwd
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
Which component of printer sharing in Windows is a storage location for pending print jobs?

A) print device
B) print queue
C) print server
D) printer pool
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
A new technician sees the following syntax in a batch file: \\server1\accounting. He is unfamiliar with the syntax and asks you what it is called. What do you tell him?

A) URL location
B) share path
C) UNC path
D) mount location
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
You want to automate the process of mapping drive letters to shares when users log on to a Windows domain. What should you do?

A) install a driver
B) make a BASH script
C) construct a macro
D) create a batch file
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
You have shared a folder on a Windows server that is a part of a domain. You need to assign permissions to users in this domain so they can access the shared folder. Which type of group should you use to make the permissions assignment?

A) Local
B) Domain local
C) Global
D) Universal
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
Which type of macOS account can log on to the local Mac computer and run applications but cannot change network settings?

A) Standard
B) Administrator
C) Sharing Only
D) Guest
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
Domain local groups are primarily used to hold Global groups and provide access to domain resources.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers configured-one for each print device. Some of your users have one printer configured on their computer and other users have the other printer configured. You have found that users are often waiting for their print job to start because another print job is running on the same print device while the other print device sits idle. You want to maximize usage of both printers and avoid having users wait. What should you configure?

A) printer priority
B) job management
C) printer pooling
D) availability control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
The general rule for securing a computer is to provide maximum access to authorized users so permissions are less difficult to manage.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
In Linux, a network drive that is attached to the file system is referenced with a drive letter.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
In macOS, a Sharing Only account can log on to the Mac computer where the account is created and access shared files and printers on other computers.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
You are explaining to a colleague how she can access a shared folder from her Linux file system. Which of the following terms best describes what you should tell her?

A) map a drive letter
B) mount a drive letter
C) mount a share
D) map a volume
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
Your company has 30 client computers running Windows 10. You have shared a folder on Bill's Windows 10 computer and set the permissions so all the users in the company can access it. However, periodically some users tell you they are not permitted to access the share. It seems to be different users that can't access the share each time it happens. What is a likely reason that some users cannot access the share at times?

A) The computer with the share runs out of drive letters to assign to clients.
B) The SMB protocol limits the bandwidth and the limit is exceeded.
C) The share permissions prevent access at certain times of the day.
D) Windows 10 only allows ap to 20 users to access a share simultaneously.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
On Windows, a redirector allows network resources to be accessed as though they were local from the user's point of view.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
You have a multidomain Windows Server 2019 forest. You need to make a shared folder on a member server available to users from several domains. What type of group should you create to add the users to and assign permissions to the resource?

A) Universal
B) Global
C) Domain local
D) Builtin local
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
Which file sharing client component intercepts requests for resources and examines it to determine whether the resource is local or remote?

A) drive mapper
B) UNC path
C) redirector
D) authenticator
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
You need to create a user on your Fedora Linux system. What command should you use?

A) newaccount
B) userconf
C) useradd
D) usermod
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
You want to access shared folders on a Windows computer named WinServ from your macOS computer. What do you type in the Connect to Server dialog box?

A) \\winserv\
B) unc: \\WinServ
C) smb://WinServ
D) net\WinServ
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is the correct syntax for specifying the UPN for a user named jsmith on the mydomain.local domain?

A) jsmith@mydomain.local
B) mydomain.local/jsmith
C) jsmith$mydomain.local
D) jsmith\mydomain.local
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is a primary reason for using group accounts on an OS?

A) To allow many users to sign into the OS using a single group account and password.
B) To simplify the assignment of rights and permissions to users with common requirements.
C) To easily send messages to a group of users through the computer messaging system.
D) To make deletion or disabling of many user accounts at one time easier.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is NOT a typical password policy option?

A) minimum length
B) complexity requirements
C) password change frequency
D) password storage location
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
You have configured a shared printer on a Windows Server 2016 server that is a domain member. You want uses to be able to easily find this printer in Active Directory. What option should you enable?

A) Additional drivers
B) List in the directory
C) Add to the domain
D) Make printer searchable
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
Michael Thomas has a user account named mthomas. Michael has just left the company and his replacement is in the process of being hired. Michael's account was a member of several groups that are assigned rights and permissions throughout the network. His replacement will require the same level of access that Michael had including access to all his work files. What is the best approach to ensuring that Michael's replacement can easily be assigned the necessary rights and permissions?

A) Delete Michael's account. Ask him which groups his account was a member of and add the new user's account to those groups.
B) Disable Michael's account. When his replacement is hired, rename the account, change the password, and re-enable it.
C) Disable Michael's account. Find the groups his account is a member of, create an account for the new user and add the new user's account to those groups.
D) Delete Michael's account to clear security information. Create the mthomas account again so it is still a member of the groups it was before and then rename the account.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
You have hired a junior IT administrator that will administer user and group accounts in the domain but you do not want to give the new hire greater administrative authority. What should you do?

A) Add the junior IT administrator's account to the Account Operators group.
B) Add the junior IT administrator's account to the Server Operators group.
C) Add the junior IT administrator's account to the Administrators group.
D) Add the junior IT administrator's account to the Backup Operators group.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
You added the user jsmith to the file and folder permissions list of a folder named Accounting on a Windows 10 computer and gave the user Full Control to the folder. When you checked the permissions on a subfolder of the Accounting folder, you see that jsmith is also on that permissions list with Full Control permissions. What is the most likely reason jsmith on the subfolder's permissions list if you didn't add the account?

A) The jsmith user has Full Control sharing permissions.
B) The user jsmith added the account to the subfolder.
C) The Full Control permission always applies to subfolders.
D) Subfolders acquire parent folder permissions due to permission inheritance.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
The user Jack has been assigned the Change permission to a Windows share and the Read and Write permission to the shared folder in file and folder permissions. Which of the following actions can Jack NOT perform on files in the share when accessing them from the network?

A) modify the files
B) delete the files
C) open the files
D) view file attributes
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What should you do?

A) use the runas command
B) preface the command with sudo
C) run the command followed by /root
D) type superuser and then the command
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
What is the default location for a print queue on a Windows computer?

A) C : \System\Printers\Queues
B) C: \Windows\System32\Printers\Queue
C) C: \Windows\System32\Spool\Printers
D) C: \System\Spool\Printers
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
What command can you use on a Linux computer to access a Windows share named mydocs on a server name WinServ?

A) open //WinServ/mydocs
B) smbclient //WinServ/mydocs
C) ftp WinServ:mydocs
D) use WinServ\mydocs
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is a native Linux printer sharing protocol?

A) TCP
B) SMB
C) CUPS
D) NFS
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is an example of applying the least privileges rule?

A) Giving a user that needs to open and view the contents of a file Modify permission to the file.
B) Giving a group Read permission to a folder that contains policy documents that should be read but not changed by the members of the group.
C) Giving the Everyone group Read access to a share that contains documents needed by the accounting department.
D) Adding a new technician's user account to the Administrator group because the technician will need full administrative access after training has been completed in a few months.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
You have mapped a drive letter to a share named hrdocs on a server named hr. After mapping the drive, you need to access a file named hiring.pdf in a subfolder named employment. What is the correct syntax for accessing this file using the drive mapping?

A) H:\employment\hiring.pdf
B) H:\\hr\hrdocs\employment\hiring.pdf
C) H:hrdocs\employment\hiring.pdf
D) H:\\hr\employment\hiring.pdf
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
You have created several shares on your macOS computer, and you want to be able to easily set permissions on the shares so several other users on other macOS computers can access the shares. What type of account should you create?

A) Standard
B) Group
C) Sharing Only
D) Network
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
You want to share files from your Linux computer with Windows client computers using the Server Message Block protocol. You have installed the Samba package and started the daemon, but your Windows clients can't access the shares. What should you do?

A) Edit the /etc/samba/smb.conf file and add the share paths.
B) Install the Network File System protocol on the Windows clients.
C) Configure Linux subsystem for Windows on your Windows computers.
D) Sign in as the root user and start the Samba service.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
Which command can you use in Linux to give the current logged on user temporary root permissions?

A) admin
B) root
C) su
D) ls
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
You are setting up an Active Directory environment for a business that has three locations and 300 users. You want the users to be easily found in Active Directory based on the location and department they work in. What feature of Active Directory should you use?

A) Universal groups
B) ADAC
C) OUs
D) UPNs
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
A user has signed into a Windows domain and the user is trying to change the video card driver on their computer. The OS does not allow the user to make this change. What process determined whether the user could change the video card driver?

A) authentication
B) remediation
C) enumeration
D) authorization
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
You run the Linux ls command and see the following next to a file name: d rw- --- ---. What does this mean?

A) The file has been deleted but the group had read and write access to it.
B) The file is a directory and the owner has read and write access.
C) All users have read and write access to the regular file.
D) Only the root user has the ability to delete, open, or write to the file.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
How should a user sign into a computer to gain interactive access to the computer and its resources?

A) sign into the console
B) use the SMB protocol
C) using a VPN
D) sign in remotely
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
What is the least file and folder permission necessary to open and run an application?

A) List folder contents
B) Read
C) Read & execute
D) Full control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
You are examining a file named smb.conf on a Linux computer and see the line: read only = no. What does this mean?

A) Read access to the specified share is not permitted.
B) Users have read and write access to the specified file on the local file system.
C) Read and write access to the specified share is permitted.
D) Users cannot read the specified file on the local file system.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
What property of permissions defines how permissions are transmitted from a parent object to a child object?

A) interactive permissions
B) effective permissions
C) advanced permissions
D) permission inheritance
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
A user is trying to access a file in a shared Windows folder. The user can open the share but cannot open the file in the share. You check the sharing permissions and the user has Change permission to the share. Why can't the user open the file?

A) The Change permission does allow users to open files; the user must have Read permission.
B) The user does not have Read file and folder permissions to the file.
C) The user doesn't have at least Read sharing permissions to the file.
D) The user's password might have expired after they signed into the share.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 46 flashcards in this deck.