1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRa [10]
3 years ago
8

Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounti

ng. The Accounting folder is shared on a network server, on a partition formatted as NTFS. Which of the following statements best describes how to stop Bill from having read access to the folder without impacting any other users on the network?
A. Remove Bill from all domain groups that have access to the Accounting folder.
B. Deny read access to the Accounting folder for Bill through local access security.
C. Deny read access to the Accounting folder for any group that Bill is a member of.
D. Deny read access to the Accounting folder for Bill through shared access security.
Computers and Technology
1 answer:
Alborosie3 years ago
5 0

Answer: D. Deny read access to the Accounting folder for Bill through shared access security.

Explanation:

The statement that describes how to stop Bill from having read access to the folder without impacting any other users on the network is to deny read access to the Accounting folder for Bill through shared access security.

It should be noted that the local access security cannot be used in this case because the folder is shared from a network server that is within the active directory domain.

You might be interested in
Write a JavaScript program to generate the following pattern but the number of rows should be user input.
Nookie1986 [14]

Answer:

Testicles

Explanation:

u sukkk

3 0
3 years ago
Which of the following are computer safety techniques? Check all of the boxes that apply.Identify Computer Safety Techniques:
zvonat [6]

Answer: Protect the system with a password  

               Use spam protection.

               Avoid using questionable software.

               

Explanation:

4 0
3 years ago
¿Como viaja la información? en la tecnologia
Simora [160]

Answer:

Todavía estoy aprendiendo español, por lo que las palabras podrían estar mal de alguna manera.

Explanation:

El seguimiento de vuelos, las agencias de viajes en línea y el uso de las redes sociales en línea son todas formas de tecnología de viajes que pueden ayudar a las personas a planificar viajes. La tecnología de viajes incluye sistemas de reserva por computadora, así como aplicaciones mucho más amplias que son cada vez más importantes.

6 0
3 years ago
Read 2 more answers
What is the lower House​
statuscvo [17]
What lower house need context
6 0
3 years ago
Which statement compares the copy and cut commands?
xxMikexx [17]

Answer:

<u>only to cut command removes the text from the original document</u>

<u>Explanation:</u>

To say that only the cut command removes the text from the original document implies that you can use the cut command on a text, let's say "a boy and girl" to remove the text on the original document where it was located to a new document or text box, in other words, the text "a boy and girl" would no longer be found in the original document.

However, the copy command would not r<u>emove the text from the original document.</u>

6 0
3 years ago
Read 2 more answers
Other questions:
  • What are the names of first generation computers?
    12·1 answer
  • ____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user,
    10·1 answer
  • How can you best protect yourself when using social media
    5·2 answers
  • i will be doing an interview to someone so plz comment down below something random and you will automatically enter
    11·1 answer
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • The variable used in a loop to control the number of times it is executed is called a _______.
    10·1 answer
  • Ancestor(X,father(X)) and ancestor(david,george) is they unify or not
    11·1 answer
  • What is a disadvantage of shopping online?A.Harder to compare prices than in storesB.A higher risk of financial data theftC.More
    6·2 answers
  • A human subject’s photographs show two catchlights in each eye that are unwanted by the photographer. What is the most likely ca
    12·1 answer
  • Which operating system is used by most the supercomputer system in the world
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!