Current Location 1. 13FA - WINDOWS NETWORK ADMINISTRATION133CSC46512440 2. Assignments 3. Review Test Submission: Chapter 7 Review Questions Menu Management Options Course Menu: 13FA - WINDOWS NETWORK ADMINISTRATION (133CSC46512440) Instructor Information Announcements Discussions My Grades My Tools Course Information Course Documents Assignments Course Resources Review Test Submission: Chapter 7 Review Questions Content User Anil Kumar Lanka Course 13FA - WINDOWS NETWORK ADMINISTRATION Test Chapter 7 Review Questions Started 10/7/13 10:08 PM Submitted 10/15/13 1:19 AM Due Date 10/15/13 7:59 PM Status Needs Grading Attempt Score Grade not available. Time Elapsed 171 hours, 11 …show more content…
Selected Answer: True Correct Answer: True Question 11 2 out of 2 points You have created a GPO named RestritU and linked it to the Operations OU (containing 30 users) with link order 3. RestrictU sets serveral policies in the User Configuration node. After a few days, you realize the Operations OU has three users who should be exempt from the restrictions in this GPO. You need to make sure these three users are exempt from the RestrictU's settings, but all other policy settings are in effect for them. What's the best way to proceed? Selected Answer: Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO Correct Answer: Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO Question 12 2 out of 2 points You have a new sales forecasting application that you want to make available to all users the sales OU. You want them to be able to find this application on the start menu of any computer they log on to. What's the best way to do this? Selected Answer: Create a new GPO, and configure a Software installation policy in the User Configuration node to assign the application. Link the GPO to the Sales OU Correct Answer: Create a new GPO, and configure a Software installation
3. How would you enable Sam to publish Web pages from his ~/website directory directory but not allow anyone else to publish to the web?
Group Policy can be used to install, upgrade, patch, or remove software applications when a computer is started, when a user logs on to the network, or when a user accesses a file associated with a program that is not currently on the user’s computer.
“New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.”
When deciding how to grant access to users, the main concept is limiting access. Users should be granted only based on level of permissions they need in order to perform their job duties. By placing users into groups according to their job titles in an organization, this will provide these users access to company information and resources in the network. These group assignments will allow an organization to give users only what they need to complete their job tasks and ensure that unauthorized access is limited.
The following questions would guide you on your way to implementing a good authorization concept.
Only authorized personnel are allowed unescorted access to the Computer Room with proper security credentials.
It must be possible to deny a particular login access to the server if necessary
Called and got permission from Steven to make the permission changes Simone specified. Confirmed she had access to the Payroll folder. Created a new Personnel listing RW group and added Simon to the group. Locked down the vacation and reimbursement folder and created an RW group for both. Added Simone to both groups. Called Simone and had her log off and back on. Confirmed her permissions were
This implementation of secure remote access extends the secure network to the remote user using a secure PSTN (Public Switched Telephone Network) connection.
A firewall will be used so that UN authorized users will be restricted. Parts of security will be different user account and password for each member.
The roles for logins should be controlled by the administrator and setup under the server management>Add Roles tool especially for the File share server. A domain could be setup to control user access, but it would also need to be assigned on each and every local machine. For a company so small it might just be easier to assign permissions for specific groups for the read, write, modify and full control on the file
a general partnership. It should be noted, however, that the specific steps and requirements to start an
You are a valued colleague and friend of this threesome, and they have come to you seeking advice as to how to structure their new business. They have
Users accounts should be limited and not granted excessive authorizations especially ability to access to administrative functions such as read and/or write source code and source code trees.
The traditional model of software distribution, in which software is purchased for and installed on personal computers, is