Deck 5: File, Directory, and Shared Resource Security

Full screen (f)
exit full mode
Question
Security groups are used for e-mail or telephone lists, to provide quick, mass distribution of information, and they cannot be used to assign any permissions.
Use Space or
up arrow
down arrow
to flip the card.
Question
UNIX and Linux files are assigned any combination of three permissions: read, write, and modify.
Question
In Netware 6.x, the user account that creates a directory or file is the default owner, but this does not give that account the rights to configure attributes and trustee rights.
Question
Users typically access folder resources on UNIX/Linux systems by using Telnet or FTP.
Question
NetWare recognizes a type of network drive, called a mapped drive, which is given drive letters such as S1 for the first drive, S2 for the second drive, and so on.
Question
As a guideline for setting permissions, users should be given full control of their own home folders.
Question
The rpc. mountd service enables the Linux kernel to manage specific requests from a client.
Question
In Windows XP/2003, the default permission on a shared folder is to give the Everyone group read permission to the folder.
Question
In Red Hat Linux 9.x, group security information is in the /etc/gshadow file.
Question
In queue -based printing, the network administrator performs several functions to set up a shared printer. The first is to install the printer and its driver in NetWare. The next step is to create a print queue for the printer.
Question
In Linux and UNIX, ownership of a folder or file can be changed by using the chown command from the root account.
Question
There are two general ways in which a system may be evaluated: Orange Book and Blue Book.
Question
Windows 2000/XP/2003, Red Hat Linux 9.x, NetWare 6.x, and Mac OS X all offer ways to access or share resources, such as directories, folders, files, and printers, over a network.
Question
Disk quotas reduce the risk that a user will occupy all available disk space, including an attacker who wants to bring down a system.
Question
When configuring file and folder attributes, if you check Read-only for a folder, the folder and the files in the folder are read-only.
Question
To hide a share in Windows XP/2003, place the # sign just after its name.
Question
In Windows 2000/XP/2003, files can be compressed as well as encrypted at the same time.
Question
In addition to the folder and file attributes on a FAT-formatted disk, files and folders on an NTFS-formatted disk have the Index, Compress, and Encrypt attributes.
Question
If you do not want subdirectories under a specific directory to inherit its rights, you can create an access control list in NetWare 6.x.
Question
In BSD SVR4, the spooling system consists of the lp print program and the lpsched daemon.
Question
Which of the following are components of an access control list?

A) DACL
B) SACL
C) FACL
D) Both a and b
E) Both b and c
Question
In Linux/UNIX, when a directory is flagged with a(n) _____, that means a user or a group can access and list its contents.

A) r
B) x
C) d
D) l
Question
What rating is based on Department of Defense TCSEC, which the U.S. government's NCSC uses to evaluate systems?

A) ASIC
B) C2
C) POSIX
D) S2
Question
When using the octal chmod format, which of the following criteria is omitted?

A) Owner
B) Group
C) Other
D) All
Question
Which NTFS folder and file special permission can add or remove the Read-only and Hidden Folders and attributes?

A) Write Attributes
B) Write Extended Attributes
C) Read Permissions
D) Change Permissions
Question
What command is used to set up permissions in Linux/UNIX?

A) chown
B) perm
C) chmod
D) grep
Question
In Red Hat Linux, permissions are granted on the basis of which of the following?

A) Ownership
B) Group membership
C) Other
D) All
E) All of the above
Question
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) do others have to this file?

A) Read
B) Read, execute
C) Read, write, execute
D) Read, write
Question
Which attribute is checked to indicate that the folder or file needs to be backed up, because the folder or file is new or changed?

A) Backup
B) Change
C) Archive
D) Index
Question
What octal value do the read and write attributes have when combined?

A) 4
B) 5
C) 6
D) 7
Question
Which attributes do NTFS and FAT/FAT16 file systems have in common?

A) Read-only, Archive, Hidden
B) Hidden, Compress, Encrypt
C) Archive, Index, Hidden
D) Index, Archive, Read-only
Question
Which of the following parameters can be specified when using the octal format of the chmod command?

A) Who has the permissions
B) The actions to be taken on the permission
C) The permission
D) None of the above
Question
Which of the following file systems offers the ability to set standard and special permissions on folders and files for user accounts and for groups?

A) FAT
B) FAT16
C) NTFS
D) All of the above
Question
What octal value do the read and execute attributes have when combined?

A) 3
B) 5
C) 6
D) 7
Question
Which NTFS folder and file permission includes the capabilities of both List Folder Contents and Read?

A) Read
B) Modify
C) Execute
D) Read & Execute
Question
Which NTFS folder and file permission only applies to folders?

A) Modify
B) List Folder Contents
C) Write
D) Read & Execute
Question
Which NTFS folder and file permission can traverse files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents?

A) Full Control
B) List Folder Contents
C) Modify
D) Read
Question
Which NTFS folder and file special permission can add new folders and add new data at the end of files?

A) Create Files/Write Data
B) Create Folders/Append Data
C) Write Attributes
D) Delete Subfolders and Files
Question
If you want to compress files, which attribute cannot be set on the files?

A) Index
B) Read-only
C) Hidden
D) Encrypt
Question
Which NTFS folder and file special permission can add or remove the Archive, Index, Compress, and Encrypt attributes?

A) Read Extended Attributes
B) Write Attributes
C) Write Extended Attributes
D) Read Permissions
Question
Which Netware 6.x directory attribute flags the directory to show it contains operating system files?

A) H
B) Sy
C) N
D) Dc
Question
Can a security descriptor for a server control which accounts have access to the server, or whether that server can even be accessed over the network?
Question
Which Netware 6.x file attribute keeps a file from being deleted, but the file can be renamed or the contents can be changed?

A) Di
B) Ro
C) Sh
D) T
Question
Which Red Hat Linux system directory is a virtual file system allocated in memory only, and contain files that refer to various processes running on the system, as well as details about the operating system kernel?

A) /etc
B) /bin
C) /proc
D) /sbin
Question
<strong>  What is displayed in the figure above?</strong> A) Attributes in Windows 2000 Server B) Folder properties Security tab in Windows Server 2003 C) NetWare directory attributes D) NetWare trustee rights for a folder <div style=padding-top: 35px> What is displayed in the figure above?

A) Attributes in Windows 2000 Server
B) Folder properties Security tab in Windows Server 2003
C) NetWare directory attributes
D) NetWare trustee rights for a folder
Question
In Windows 2000, are files and folders automatically flagged to archive when they are changed?
Question
In Netware 6.x are groups created by using the ConsoleOne tool?
Question
Which Red Hat Linux system directory contains configuration files that the system uses when the computer starts, most of which are reserved for the system administrator, because they contain system-critical information?

A) /bin
B) /etc
C) /proc
D) /root
Question
In Windows 2000/XP/2003, which of the following share permissions allows a user to access the share, change share permissions, turn off sharing, configure printer properties, and delete the share?

A) Print
B) Manage Documents
C) Manage Printers
D) Manage Print Jobs
Question
In Windows Server 2003, does FAT32 enable disk quotas to be set on users and groups?
Question
<strong>  The figure above displays attributes of a folder on a(n) ____ formatted disk in Windows Server 2003.</strong> A) FAT32 B) FAT C) NTFS D) NFS <div style=padding-top: 35px> The figure above displays attributes of a folder on a(n) ____ formatted disk in Windows Server 2003.

A) FAT32
B) FAT
C) NTFS
D) NFS
Question
Which Netware 6.x access right, when applied to a directory, enables the contents to be viewed, and when applied to a file, allows viewing the filename, whether or not the file scan right is given at the directory level?

A) R
B) M
C) F
D) A
Question
<strong>  What is displayed in the figure above?</strong> A) Evaluating effective rights in NetWare 6.x B) NetWare trustee rights for a folder C) Netware access rights D) NetWare directory attributes <div style=padding-top: 35px> What is displayed in the figure above?

A) Evaluating effective rights in NetWare 6.x
B) NetWare trustee rights for a folder
C) Netware access rights
D) NetWare directory attributes
Question
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) does the file's owner have to this file?

A) Read, write, execute
B) Read, execute
C) Read, write
D) Write, execute
Question
Which Netware 6.x file attribute enables a file's contents to be modified?

A) Ci
B) X
C) Ri
D) Rw
Question
Which Red Hat Linux system directory contains executables, which are the programs needed to start the system and perform other essential system tasks?

A) /boot
B) /etc
C) /bin
D) /proc
Question
Which Netware 6.x file attribute enables a file to be read, but prevents the file's contents from being altered and prevents the file from being deleted?

A) Ci
B) Di
C) H
D) Ro
Question
Which Mac OS X Get Info folder and file permission enables the user to copy the folder's contents to the Drop Box folder in the Public folder of that user's home directory?

A) Read & Write
B) Read only
C) Write only
D) No Access
Question
When using NFS in Red Hat Linux 9.x, which service establishes and manages the remote connections through designated UDP ports?

A) portmap
B) rpc.mountd
C) rpc.nfsd
D) rpc.mapd
Question
Does Mac OS X Server enable you to create groups, called workgroups, through the Server Manager utility?
Question
As an administrator, you can easily verify how groups are set up by periodically reviewing the contents of the ____________________ file.
Question
Folders can be marked as ____________________ to prevent users from viewing their contents.
Question
In Windows Server 2003 a(n) ____________________ group is used when there is a single domain, or is used to manage resources in a particular domain so that global and universal groups can access those resources.
Question
When setting NTFS file and folder permissions, does the Deny option override all other access?
Question
In Red Hat Linux 9.x, you can set up a printer and start lpd by using the Red Hat ____________________ tool.
Question
Can shared folders be offered from either a FAT16/FAT32-formatted drive or an NTFS drive?
Question
What are three guidelines that will help to simplify your planning for using groups?
Question
What four types of groups are available in Windows 2000/XP/2003? (List and describe their associated scope.)
Question
To map the PUBLIC directory as search drive S1 in Netware 6.x, you would type ____________________.
Question
To use NFS in Red Hat Linux 9.x, which three services must be enabled?
Question
___________________________________ is a print service designed to work with printers that have NetWare's printer agent software built in.
Question
Is the Netware 6.x FLAG command useful if you want to see a listing of how the attributes are set on all directories?
Question
What are the three Windows 2000/XP/2003 share permissions for folders?
Question
When setting up printing in Windows 2000/XP/2003, which four share permissions are checked for allow or deny?
Question
When you create a shared folder in Windows 2000 and in earlier Windows versions, the default permission is to give ____________________ to the Everyone group.
Question
To ensure proper security, use ____________________ authentication on Linux/UNIX systems.
Question
Does the Linux Write permission allow a user or a group of users to run a program?
Question
A(n) ____________________ security rating is not a guarantee that an attack on a system will be unsuccessful, but it indicates strong security capabilities.
Question
____________________ permissions are used when the default standard permission settings do not provide enough customization for the current security need.
Question
Does the Red Hat Linux /lib directory contain configuration files that the system uses when the computer starts?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: File, Directory, and Shared Resource Security
1
Security groups are used for e-mail or telephone lists, to provide quick, mass distribution of information, and they cannot be used to assign any permissions.
False
2
UNIX and Linux files are assigned any combination of three permissions: read, write, and modify.
False
3
In Netware 6.x, the user account that creates a directory or file is the default owner, but this does not give that account the rights to configure attributes and trustee rights.
False
4
Users typically access folder resources on UNIX/Linux systems by using Telnet or FTP.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
NetWare recognizes a type of network drive, called a mapped drive, which is given drive letters such as S1 for the first drive, S2 for the second drive, and so on.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
As a guideline for setting permissions, users should be given full control of their own home folders.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
The rpc. mountd service enables the Linux kernel to manage specific requests from a client.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
In Windows XP/2003, the default permission on a shared folder is to give the Everyone group read permission to the folder.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
In Red Hat Linux 9.x, group security information is in the /etc/gshadow file.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
In queue -based printing, the network administrator performs several functions to set up a shared printer. The first is to install the printer and its driver in NetWare. The next step is to create a print queue for the printer.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
In Linux and UNIX, ownership of a folder or file can be changed by using the chown command from the root account.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
There are two general ways in which a system may be evaluated: Orange Book and Blue Book.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
Windows 2000/XP/2003, Red Hat Linux 9.x, NetWare 6.x, and Mac OS X all offer ways to access or share resources, such as directories, folders, files, and printers, over a network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
Disk quotas reduce the risk that a user will occupy all available disk space, including an attacker who wants to bring down a system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
When configuring file and folder attributes, if you check Read-only for a folder, the folder and the files in the folder are read-only.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
To hide a share in Windows XP/2003, place the # sign just after its name.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
In Windows 2000/XP/2003, files can be compressed as well as encrypted at the same time.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
In addition to the folder and file attributes on a FAT-formatted disk, files and folders on an NTFS-formatted disk have the Index, Compress, and Encrypt attributes.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
If you do not want subdirectories under a specific directory to inherit its rights, you can create an access control list in NetWare 6.x.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
In BSD SVR4, the spooling system consists of the lp print program and the lpsched daemon.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following are components of an access control list?

A) DACL
B) SACL
C) FACL
D) Both a and b
E) Both b and c
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
In Linux/UNIX, when a directory is flagged with a(n) _____, that means a user or a group can access and list its contents.

A) r
B) x
C) d
D) l
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
What rating is based on Department of Defense TCSEC, which the U.S. government's NCSC uses to evaluate systems?

A) ASIC
B) C2
C) POSIX
D) S2
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
When using the octal chmod format, which of the following criteria is omitted?

A) Owner
B) Group
C) Other
D) All
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
Which NTFS folder and file special permission can add or remove the Read-only and Hidden Folders and attributes?

A) Write Attributes
B) Write Extended Attributes
C) Read Permissions
D) Change Permissions
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
What command is used to set up permissions in Linux/UNIX?

A) chown
B) perm
C) chmod
D) grep
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
In Red Hat Linux, permissions are granted on the basis of which of the following?

A) Ownership
B) Group membership
C) Other
D) All
E) All of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) do others have to this file?

A) Read
B) Read, execute
C) Read, write, execute
D) Read, write
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
Which attribute is checked to indicate that the folder or file needs to be backed up, because the folder or file is new or changed?

A) Backup
B) Change
C) Archive
D) Index
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
What octal value do the read and write attributes have when combined?

A) 4
B) 5
C) 6
D) 7
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
Which attributes do NTFS and FAT/FAT16 file systems have in common?

A) Read-only, Archive, Hidden
B) Hidden, Compress, Encrypt
C) Archive, Index, Hidden
D) Index, Archive, Read-only
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following parameters can be specified when using the octal format of the chmod command?

A) Who has the permissions
B) The actions to be taken on the permission
C) The permission
D) None of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following file systems offers the ability to set standard and special permissions on folders and files for user accounts and for groups?

A) FAT
B) FAT16
C) NTFS
D) All of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
What octal value do the read and execute attributes have when combined?

A) 3
B) 5
C) 6
D) 7
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
Which NTFS folder and file permission includes the capabilities of both List Folder Contents and Read?

A) Read
B) Modify
C) Execute
D) Read & Execute
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
Which NTFS folder and file permission only applies to folders?

A) Modify
B) List Folder Contents
C) Write
D) Read & Execute
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
Which NTFS folder and file permission can traverse files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents?

A) Full Control
B) List Folder Contents
C) Modify
D) Read
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
Which NTFS folder and file special permission can add new folders and add new data at the end of files?

A) Create Files/Write Data
B) Create Folders/Append Data
C) Write Attributes
D) Delete Subfolders and Files
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
If you want to compress files, which attribute cannot be set on the files?

A) Index
B) Read-only
C) Hidden
D) Encrypt
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
Which NTFS folder and file special permission can add or remove the Archive, Index, Compress, and Encrypt attributes?

A) Read Extended Attributes
B) Write Attributes
C) Write Extended Attributes
D) Read Permissions
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
Which Netware 6.x directory attribute flags the directory to show it contains operating system files?

A) H
B) Sy
C) N
D) Dc
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
Can a security descriptor for a server control which accounts have access to the server, or whether that server can even be accessed over the network?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
Which Netware 6.x file attribute keeps a file from being deleted, but the file can be renamed or the contents can be changed?

A) Di
B) Ro
C) Sh
D) T
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
Which Red Hat Linux system directory is a virtual file system allocated in memory only, and contain files that refer to various processes running on the system, as well as details about the operating system kernel?

A) /etc
B) /bin
C) /proc
D) /sbin
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
<strong>  What is displayed in the figure above?</strong> A) Attributes in Windows 2000 Server B) Folder properties Security tab in Windows Server 2003 C) NetWare directory attributes D) NetWare trustee rights for a folder What is displayed in the figure above?

A) Attributes in Windows 2000 Server
B) Folder properties Security tab in Windows Server 2003
C) NetWare directory attributes
D) NetWare trustee rights for a folder
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
In Windows 2000, are files and folders automatically flagged to archive when they are changed?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
In Netware 6.x are groups created by using the ConsoleOne tool?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
Which Red Hat Linux system directory contains configuration files that the system uses when the computer starts, most of which are reserved for the system administrator, because they contain system-critical information?

A) /bin
B) /etc
C) /proc
D) /root
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
In Windows 2000/XP/2003, which of the following share permissions allows a user to access the share, change share permissions, turn off sharing, configure printer properties, and delete the share?

A) Print
B) Manage Documents
C) Manage Printers
D) Manage Print Jobs
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
In Windows Server 2003, does FAT32 enable disk quotas to be set on users and groups?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
<strong>  The figure above displays attributes of a folder on a(n) ____ formatted disk in Windows Server 2003.</strong> A) FAT32 B) FAT C) NTFS D) NFS The figure above displays attributes of a folder on a(n) ____ formatted disk in Windows Server 2003.

A) FAT32
B) FAT
C) NTFS
D) NFS
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
Which Netware 6.x access right, when applied to a directory, enables the contents to be viewed, and when applied to a file, allows viewing the filename, whether or not the file scan right is given at the directory level?

A) R
B) M
C) F
D) A
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
<strong>  What is displayed in the figure above?</strong> A) Evaluating effective rights in NetWare 6.x B) NetWare trustee rights for a folder C) Netware access rights D) NetWare directory attributes What is displayed in the figure above?

A) Evaluating effective rights in NetWare 6.x
B) NetWare trustee rights for a folder
C) Netware access rights
D) NetWare directory attributes
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) does the file's owner have to this file?

A) Read, write, execute
B) Read, execute
C) Read, write
D) Write, execute
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
Which Netware 6.x file attribute enables a file's contents to be modified?

A) Ci
B) X
C) Ri
D) Rw
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
Which Red Hat Linux system directory contains executables, which are the programs needed to start the system and perform other essential system tasks?

A) /boot
B) /etc
C) /bin
D) /proc
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Which Netware 6.x file attribute enables a file to be read, but prevents the file's contents from being altered and prevents the file from being deleted?

A) Ci
B) Di
C) H
D) Ro
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
Which Mac OS X Get Info folder and file permission enables the user to copy the folder's contents to the Drop Box folder in the Public folder of that user's home directory?

A) Read & Write
B) Read only
C) Write only
D) No Access
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
When using NFS in Red Hat Linux 9.x, which service establishes and manages the remote connections through designated UDP ports?

A) portmap
B) rpc.mountd
C) rpc.nfsd
D) rpc.mapd
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
Does Mac OS X Server enable you to create groups, called workgroups, through the Server Manager utility?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
As an administrator, you can easily verify how groups are set up by periodically reviewing the contents of the ____________________ file.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
Folders can be marked as ____________________ to prevent users from viewing their contents.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
In Windows Server 2003 a(n) ____________________ group is used when there is a single domain, or is used to manage resources in a particular domain so that global and universal groups can access those resources.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
When setting NTFS file and folder permissions, does the Deny option override all other access?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
In Red Hat Linux 9.x, you can set up a printer and start lpd by using the Red Hat ____________________ tool.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
Can shared folders be offered from either a FAT16/FAT32-formatted drive or an NTFS drive?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
What are three guidelines that will help to simplify your planning for using groups?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
What four types of groups are available in Windows 2000/XP/2003? (List and describe their associated scope.)
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
To map the PUBLIC directory as search drive S1 in Netware 6.x, you would type ____________________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
To use NFS in Red Hat Linux 9.x, which three services must be enabled?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
___________________________________ is a print service designed to work with printers that have NetWare's printer agent software built in.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
Is the Netware 6.x FLAG command useful if you want to see a listing of how the attributes are set on all directories?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
What are the three Windows 2000/XP/2003 share permissions for folders?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
When setting up printing in Windows 2000/XP/2003, which four share permissions are checked for allow or deny?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
When you create a shared folder in Windows 2000 and in earlier Windows versions, the default permission is to give ____________________ to the Everyone group.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
To ensure proper security, use ____________________ authentication on Linux/UNIX systems.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
Does the Linux Write permission allow a user or a group of users to run a program?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) ____________________ security rating is not a guarantee that an attack on a system will be unsuccessful, but it indicates strong security capabilities.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
____________________ permissions are used when the default standard permission settings do not provide enough customization for the current security need.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
Does the Red Hat Linux /lib directory contain configuration files that the system uses when the computer starts?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 86 flashcards in this deck.