Which is a permission used to control access to files and folders in Linux quizlet?

Recommended textbook solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Starting Out with C++ from Control Structures to Objects

8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis

1,294 solutions

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (53)

Which NTFS feature should you configure if you want users to be able to revert to an older version of the file?

Shadow Copies

T/F: Locally attached storage devices include other hard disks that are installed on the system internally as well as external devices that are attached through either USB connections or external SATA connectors.

True

T/F: In Linux, every user that is created automatically belongs to a default group named Users.

False

A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user's profile is called a ____________ profile.

Roaming

Which of the following are standard NTFS permissions?
1. Execute
2. List Folder Contents
3. Change
4. Read
5. Write

2
4
5

T/F: Group accounts make it easier for an administrator to manage user rights and permissions.

True

Which of the following is a special identity group?
1. Creator Owner
2. Power Users
3. Everyone
4. Kernel
5. Authenticated users

1
3
5

Which of the following is a group scope in active directory?
1. Security
2. Domain Local
3. Global
4. Realm
5. Distribution

2
3

T/F: A user account in a client OS is meant to log on to the local machine only. A user account created in Active Directory has the ability to log on to any computer that is a member of the domain.

True

T/F: An image backup is a file that is a complete copy of the disk volume. If the volume contains the OS, when you restore from the image backup, you do not have to reinstall the OS.

True

______ consists of a collection of tools for pinpointing which resources are being overloaded and how they're being overloaded.

Performance Monitor

T/F: Restore Points store previous versions of files so if users accidentally delete a file or write over a file, they have a way to restore the file without dealing with a backup.

False

_____ is the dominant file-sharing protocol used by Windows and supported by Linux and MAC OS.

SMB

In Windows, the term for a computer that accepts job requests for a shared printer and sends them to the physical device is called a print ____________.

Server

T/F: NTFS permissions can only be configured on files.

False

T/F: A standby UPS continually powers devices from its battery so that if a power failure occurs, there is no delay in switching to battery power.

False

In regards to a user account, what does a white circle with a black arrow indicate?

The account is disabled.

T/F: In Windows terminology, a printer is the actual physical printer that will print the jobs that are sent to it.

False

Which is true about Windows Backup in Windows Server? (Choose all that apply.)
1. Backups can be stored on network drives.

2. Backups can be stored on tape.

3. It is designed to support a large number of servers and servers distributed across multiple sites

4. You can back up another computer remotely

5. The volume Shadow Copy Service backs up open files

1
4
5

Which is true about Linux user accounts? (Choose all that apply.)
1. They are limited to eight characters
2. The full name is a required part of the user account
3. They must belong to at least one group
4. Account names must contain a combination of uppercase, lowercase, and numbers
5. The account names are case sensitive

3
5

____ accounts are used to organize users so that the assignment of resource permissions and rights can be managed more easily than working with many user accounts.

Group

Provide the complete directory path to where the user accounts are stored in a basic Linux installation.

/etc/passwd

Which of the following is a default group in Active Directory?
1. Server Operators
2. Root
3. Backup Operators
4. Network Administrators
5. User Managers

1
3

Which of the following groups are special identity groups?
1. Authenticated Users
2. System
3. Print Operators
4. Self
5. Guests

1
2
4

What tool would you use to view error messages that are generated by system services or applications?

Event Viewer

What command in Linux gives extensive help on how to use a command?

man

Which of the following is a function of a user account?
1. Restrict when and where users can log on
2. Establishes a link between the user and the workstation
3. Provides information about a user
4. Authorizes a user to log on to network servers
5. Provides a method for user authentication

1
3
5

T/F: Basic disks support advanced features like spanned volumes and software RAID.

False

What is a collection of a user's personal data folders and application settings that's available at any computer where the user logs on?

Roaming Profile

T/F: In a file system that uses FAT or FAT32, the only file security option that is available is sharing permissions.

True

In linux, what is the command for viewing a files contents on screen?

cat

When dealing with permissions in Linux, what are the user types that can be assigned permissions?
1. Other
2. Superuser
3. Group
4. Owner
5. Creator

1
3
4

T/F: A server cluster is a group of servers that appear to the user as a single server. The two most common types are a fail-over cluster and a load-balancing cluster.

True

Which of the following are case sensitive?
1. Windows Logon Name
2. Linux Logon Name
3. Windows group name
4. Windows Password
5. Linux Password

2
4
5

If you need to limit the amount of data users can store on a volume, you would implement which of the following?
File Compression
Disk Quotas
Volume Mount Points
Shadow Copies
All of these

Disk Quotas

Which of the following is NOT a linux file system?
Ext4
SFS
Ext3
ReiserFS
None of these choices

SFS

Which is best describes as a record of performance data gathered when a system is performing well under normal conditions?

baseline

T/F: An event log entry that is is an error is marked with a ed circle with a white exclamation point in the center.

True

Which of the following correctly describes how sharing NTFS permissions work?
1. Sharing permissions can be assigned to separate files
2. When a files is accessed over the network, sharing permissions are checked last
3. When both sharing and NTFS permissions are applied, the least restrictive permissions apply
4. When a file is accessed interactively, only sharing permissions are checked.
5. None of these choices

5

Which of the following is a permission in the Linux OS?
1. Read
2. Owner
3. Delete
4. Execute
5. Modify

1
4

T/F: Windows may be booted from an extended partition that has been formatted with the NTFS file system.

False

Which of the following is true of Windows printing terminology?
1. A print queue stores jobs waiting to be printed
2. A printer is a physical device
3. A print device loads files to memory for later printing
4. A print server is a computer sharing a printer
5. A printer pool is two or more printers representing a single print service

1
4

______ groups contain users from the domain in which they're created but can be assigned permissions to resources in other domains.

global

What level of RAID does not provide fault tolerance?

0

Which is true about partitions?
1. An extended partition is assigned a drive letter by default
2. Only a primary partition can be active
3. The Windows boot loader is housed on the boot partition
4. You can have up to four primary partitions
5. A partition is equivalent to a volume

2
4

T/F: The three permissions used to control access to files and folders in Linux are: read, write, and delete.

False

T/F: The three primary forms of fault tolerance for networks and servers are: redundant power supply (UPS), redundant disk systems, and server clustering.

True

T/F: A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.

False

Employees in the Sales department need to be able to access the sales share on the file server. They will need to have the ability to create files, read them, and make corrections or additions. Which of the following share permissions should the group be given?

change

Which of the following is true of group accounts in Windows?
1. Groups may not be members of other groups
2. They organize users for easier assignment of resource permissions
3. They are used only to assign permissions, not rights.
4. Provides information about a user.
5. You can select a group scope in Active Directory but not in Windows 10

2
5

Which is true about file compression?
1. A compressed file can't be encrypted with EFS.
2. You may enable compression on an entire NTFS volume, a folder and its contents, or an individual file.
3. It is a standard feature in Windows beginning with FAT32
4. Compressed files can't have permissions assigned to them.
5. Decompression occurs automatically when a file is accessed.

1
2
5

The partition that contains the Windows OS files is knows as the what type of partition?

boot

Which UPS type is for computer power backup?

Online

Other sets by this creator

CCNA Final

86 terms

tom_smith665

Cellular & Mobile Final (Post Midterm)

24 terms

tom_smith665

Cellular and Mobile Midterm

64 terms

tom_smith665

CCNA Midterm

84 terms

tom_smith665

Verified questions

COMPUTER SCIENCE

If a list is already sorted in ascending order, a modified sequential search algorithm can be used that compares against each element in turn, stopping if a list element exceeds the target value. Write a pseudocode version of this short sequential search algorithm.

Verified answer

COMPUTER SCIENCE

Let $\Sigma=\{\mathrm{a}, \mathrm{b}\}$. For each $k \geq 1$, let $C_{k}$ be the language consisting of all strings that contain an a exactly k places from the right-hand end. Thus $C_{k}=\Sigma^{*} \mathrm{a} \Sigma^{k-1}$. Describe an NFA with k+1 states that recognizes $C_{k}$ in terms of both a state diagram and a formal description.

Verified answer

COMPUTER SCIENCE

In statistics, when a set of values is sorted in ascending or descending order, its median is the middle value. If the set contains an even number of values, the median is the mean, or average, of the two middle values. Write a function that accepts as arguments the following: A) An array of integers B) An integer that indicates the number of elements in the array The function should determine the median of the array. This value should be returned as a double. (Assume the values in the array are already sorted.) Demonstrate your pointer prowess by using pointer notation instead of array notation in this function.

Verified answer

COMPUTER SCIENCE

Let A be the language of properly nested parentheses. For example, (()) and (()(()))() are in A, but )( is not. Show that A is in L.

Verified answer

Recommended textbook solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

Which is a permission used to control access to files and folders in Linux quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

Microbiology Lecture Exam 4

124 terms

bigbrainaaronPLUS

meeting at night

13 terms

Lilybliss04

S6 - Lektion 13 - LS BC

18 terms

HappyLittleSchool

Related questions

QUESTION

What YUM command would you enter at the command prompt to download an RPM package without installing it to the system?

15 answers

QUESTION

SSD startup drives will reduce the amount of time to boot up.

11 answers

QUESTION

A command-line interface (CLI) that you can launch from within Windows, from Safe Mode, or as a Recovery option

2 answers

QUESTION

If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location. (T/F)

2 answers

Which is a permission used to control access to the files and folders in Linux?

The three permissions used to control access to files and folders in Linux are: read, write, and delete. In regards to a user account, what does a white circle with a black arrow indicate? groups contain users from the domain in which they're created but can be assigned permissions to resources in other domains.

What type of permissions are assigned directly to a file or folder?

Permissions assigned directly to a particular file or folder (explicit permissions) take precedence over permissions inherited from a parent folder (inherited permissions).

What are the basic Linux file permissions check all that apply?

The three basic file permissions in Linux are read, write, and execute.

Which feature will allow you to create permissions on a file for specific users?

Inheritance allows administrators to easily assign and manage permissions. This feature automatically causes objects within a container to inherit all the inheritable permissions of that container. For example, the files within a folder inherit the permissions of the folder.