1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
3 years ago
7

Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o

ver the network?•Share permission (Share tab)-Sales group: Full Control•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Writea. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.b. Members of the Sales group will be able to edit content and delete files.c. Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.
Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
3 0

Answer:

Members of the Sales group will be able to edit content and delete files.

Explanation:

NTFS (New Technology File System) is the standard file system for Microsoft Windows NT and later operating systems; NTFS permissions are used to manage access to data stored in NTFS file systems.

Share permissions manage access to folders shared over a network; they don’t apply to users who log on locally.

The share permission is applicable in this question.

On the security tab, where the sales group have read & execute, modify and write permission will allow the sales group users to

1. Modify: allows you to read, write, modify, and execute files in the folder, and change attributes of the folder or files within

2. Read and Execute: will allow you to display the folder's contents and display the data, attributes, owner, and permissions for files within the folder, and run files within the folder

You might be interested in
What allows multiple computers to join the same network
Lena [83]
A hub can be used to connect multiple computers and networks.
6 0
3 years ago
What is the basic purpose of Google calendar?
goldenfox [79]
The basic purpose of a google calendar is basically the same as a regular calendar. it is used to keep track life's important events all in one place.    
7 0
3 years ago
Read 2 more answers
Opinion on sandshrew​
Alex

Answer:Sandshrew is cute

Explanation:

3 0
3 years ago
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
3 years ago
Cui documents must be reviewed to which procedures before destruction?
Aliun [14]

Answer:

Documents containing CUI must be destroyed by shredding..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

8 0
3 years ago
Other questions:
  • Your bank contacts you asking you to phone a number supplied in the email.What do you?
    13·2 answers
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • Claudia has a bachelors degree in computer information systems and she has learned to use some popular software testing tolls wh
    13·2 answers
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • What is the disadvantages of using proprietary software
    10·2 answers
  • How do users log into Windows 8?
    7·1 answer
  • Write a method named removeDuplicates that accepts a string parameter and returns a new string with all consecutive occurrences
    7·1 answer
  • நெறி என்னும் சொல்லின் பொருள்___ *​
    14·1 answer
  • What is the expression for the resultant value of three capacitance where C1 connected in parallel​
    11·1 answer
  • Running away from home
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!