1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
15

We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to

read or write to files. The account SmithS has Read permissions on the Share and SmithS is a member of the Domain Users group that has FC on the Share. What NTFS permission applied to the Domain Users group will allow these tasks to be performed without allowing more access than necessary?
Computers and Technology
1 answer:
igomit [66]3 years ago
8 0

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

You might be interested in
You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm s
erma4kov [3.2K]

Answer:

<em>The program written in Python is as follows (See Explanation Section for detailed explanation)</em>

password = "chEEzburg3rz"

userpassword = input("Enter Password: ")

if userpassword == password:

     print("Access granted....")

else:

     print("Access Denied")

Explanation:

The programming language was not stated; However, I answered your question using Python

The line initializes the password to chEEzburg3rz"

password = "chEEzburg3rz"

This line prompts user for input

userpassword = input("Enter Password: ")

This if condition checks if user input corresponds with the initialized password

if userpassword == password:

<em>      print("Access granted....")  </em>If yes, this line is executed

else:

<em>      print("Access Denied")  </em>If otherwise, this line is executed

6 0
3 years ago
A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
serious [3.7K]

A Network Intrusion Detection System watches for potentially malicious traffic and triggers Alert when it detects an attack.

<h3>What is Network Intrusion Detection System?</h3>

Network Intrusion Detection System can be regarded as the security system that helps in detection of potentially malicious traffic and gives notification.

Therefore, Network Intrusion Detection System helps to triggers Alert when it detects an attack.

Learn more about Network Intrusion Detection System at:

brainly.com/question/8118353

6 0
3 years ago
Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
kotegsom [21]
Hello, I am charlespierce576! I believe I might have the answer! Simple policies such as turning of off devices not in use. Also unplugging devices during a storm.
4 0
4 years ago
An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
Ulleksa [173]

<u>Explanation</u>:

Remember, the aim of SWOT Analysis is to perform analysis of a phenomenon or case.

Just as in any analysis it is followed by results and recommendations based on the set rules of the analysis.

<u>The Strengths, Weaknesses, Opportunity identified and Threats can translate to the mission statement </u>of a company. It is important to know that this statement is usually factual and accurate.

3 0
3 years ago
In a natural-language processing (NLP) system, the__________activity involves using the computer to read large amounts of text a
OleMash [197]

Answer:

Analysis is the right suitable word to complete the sentence

Explanation:

It is because, Analysis is a concept, which means to judge any subjects and brings some original concept which is needed to take from the subjects.

Here in the above question the paragraph states about the summarize points taken from a large amount of data and analysis also mean the same and analysis is also the activity used in NLP for the same as above discussed.

7 0
3 years ago
Other questions:
  • What is a 'balanced' dfd?
    5·1 answer
  • Relation between training and occupation with examples in points . Plz tell fast<br> ​
    5·1 answer
  • How can a student manage time and stress for better results in school? Check all that apply. by taking breaks while studying by
    8·2 answers
  • Drag the correct type of update to its definition.
    13·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
    10·1 answer
  • Hello guys please help me <br>list and identify the components of computer ​
    15·1 answer
  • Kinda strange, and im good
    11·2 answers
  • QUESTION 10
    11·1 answer
  • In windows 10, where would you save the template so it is available in the available templates list in backstage view?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!