1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRa [10]
3 years ago
8

Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounti

ng. The Accounting folder is shared on a network server, on a partition formatted as NTFS. Which of the following statements best describes how to stop Bill from having read access to the folder without impacting any other users on the network?
A. Remove Bill from all domain groups that have access to the Accounting folder.
B. Deny read access to the Accounting folder for Bill through local access security.
C. Deny read access to the Accounting folder for any group that Bill is a member of.
D. Deny read access to the Accounting folder for Bill through shared access security.
Computers and Technology
1 answer:
Alborosie3 years ago
5 0

Answer: D. Deny read access to the Accounting folder for Bill through shared access security.

Explanation:

The statement that describes how to stop Bill from having read access to the folder without impacting any other users on the network is to deny read access to the Accounting folder for Bill through shared access security.

It should be noted that the local access security cannot be used in this case because the folder is shared from a network server that is within the active directory domain.

You might be interested in
The blank contains the computer's brain the central processing unit CPU
Mila [183]

The Motherboard contains the computer's brain which is the Central Processing Unit (CPU).  It is the main circuit board for the computer, containing both soldered, non removable components along with sockets or slots for components that can be removed. The motherboard holds the CPU, RAM and ROM chips, etc.

7 0
3 years ago
The IT person most involved with system development is the _________
laila [671]

Answer:

douch

Explanation:

3 0
3 years ago
An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
Pani-rosa [81]

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

6 0
3 years ago
How frequently should computers containing ehr information be backed up?
geniusboy [140]
Explain what is meant by a limited data set and how this HIPAA rule may affect medical assistants
7 0
3 years ago
Is the hacker group project zorgo real or fake
Charra [1.4K]

It is real I hoped this help you

4 0
3 years ago
Read 2 more answers
Other questions:
  • Functions that are built-in into PHP to perform some standard operations.
    15·1 answer
  • Where should you click to edit an existing formula?
    12·2 answers
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks yo
    7·1 answer
  • You would like to put the data in order by product number. What should you do?
    15·1 answer
  • Free wifi is typically offered on an <br> a) unencrypted<br> b) encrypted<br> c) open<br> d) private
    14·2 answers
  • Where can a client identify the instant deposit options for their QuickBooks Payments account?
    5·1 answer
  • Universal containers set the organization-wide defaults for cases to private. When a case is escalated, case ownership changes t
    13·1 answer
  • The term information technology was first used what year?
    15·2 answers
  • When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!