Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following is a feature that you will use to reassign permissions without assigning
permissions to every parent and child folder?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following is a feature that you will use to reassign permissions without assigning
permissions to every parent and child folder?

A.
Inheritance

B.
Kerberos

C.
TCP/IP protocol

D.
User Account Control (UAC)

Explanation:
Inheritance is defined as the concept of permissions that are propagated to an object from a parent
object. It is found in both file system permissions and Active Directory permissions and does not
work with share permissions. It is used to reassign permissions without assigning permissions to
every parent and child folder
a service in a computer network.
computers on the domain.
for communicating with each other over the internet.



Leave a Reply 1

Your email address will not be published. Required fields are marked *