You need to ensure that all users see only their own ho…

Your network contains an Active Directory domain named adatum.com. The domain contains a file server
named Server2 that runs Windows Server 2012 R2. Server2 contains a shared folder named Home. Home
contains the home folder of each user.
All users have the necessary permissions to access only their home folder.
A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that all users see only their own home folder when they access Home.
What should you do from Server2?

Your network contains an Active Directory domain named adatum.com. The domain contains a file server
named Server2 that runs Windows Server 2012 R2. Server2 contains a shared folder named Home. Home
contains the home folder of each user.
All users have the necessary permissions to access only their home folder.
A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that all users see only their own home folder when they access Home.
What should you do from Server2?

A.
From Windows Explorer, modify the properties of Home.

B.
From Server Manager, modify the properties of the volume that contains Home.

C.
From Windows Explorer, modify the properties of the volume that contains Home.

D.
From Server Manager, modify the properties of Home.

Explanation:
Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature
based file servers to list only the files and folders to which they have allows users of Windows Server 2003
access when browsing content on the file server. This eliminates user confusion that can be caused when
users connect to a file server and encounter a large number of files and folders that they cannot access.
Access-based Enumeration filters the list of available files and folders on a server to include only those that the
requesting user has access to. This change is important because this allows users to see only those files and
directories that they have access to and nothing else. This mitigates the scenario where unauthorized users
might otherwise be able to see the contents of a directory even though they don’t have access to it.



Leave a Reply 0

Your email address will not be published. Required fields are marked *