Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based network.
After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are notsecured.
Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based network.
After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are notsecured.
Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder?

A.
Inheritance

B.
Kerberos

C.
TCP/IP protocol

D.
User Account Control (UAC)



Leave a Reply 0

Your email address will not be published. Required fields are marked *