You work as a Network Administrator for TechMart Inc. The company has a Windows-based network.
After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are notsecured.
Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder?
A.
Inheritance
B.
Kerberos
C.
TCP/IP protocol
D.
User Account Control (UAC)