What permission should you identify?

You have a computer that runs Windows 8.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows:

UserA is a member of both the Everyone group and the Marketing group. UserA must access
C:\Marketing from across the network.
You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?

You have a computer that runs Windows 8.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows:

UserA is a member of both the Everyone group and the Marketing group. UserA must access
C:\Marketing from across the network.
You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?

A.
Read

B.
Full Control

C.
Modify

D.
Read and Execute

Explanation:
Determining Effective NTFS Permissions in Windows
Reference:
http://www.serverwatch.com/tutorials/article.php/2107311/Getting-Results-Part-2-Determining-Effective-NTFS-Permissions-in-Windows-Server-2003.htm
For example, a user named Dan is directly granted the Allow Read and Execute permission for a folder called
Marketing. However, the Dan user account is a member of the group Marketing Users, which is granted the
Allow Full Control permission, and the group Everyone, which granted the Allow Read permission
Based on the cumulative nature of NTFS permissions,the user Dan would be granted the effective permission
Allow Full Control. This example is fairly basic, and production environments typically involve a muchgreater
number of groups, with both allowed and denied permissions. In these cases, the Effective Permissions tab can
greatly ease the burden of attempting to determine which permissions will or will not apply for a particular user.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


jj

jj

A is correct!!! across network the most restrictive

ctc

ctc

The answer here is A. Read.

UserA’s effective permissions:
NTFS – Modify (NTFS is cumulative, meaning the least restrictive, modify, will apply.)
Share – Read (Share assumes the most restrictive, so read will take priority over full control)

When accessing a shared folder over the network, Windows will determine user access by selecting the most restrictive EFFECTIVE permission between NTFS and Share for a user. In this case, UserA’s effective permissions for the folder are NTFS/Modify and Share/Read, so the most restrictive, Read, will be applied.

Ahli IT

Ahli IT

CTO / Chief Technology Officer adalah salah satu level dari posisi Eksekutif pada suatu perusahaan yang difokuskan pada hal ke ilmuwan dan isu teknologi dalam suatu organisasi.