Question

In: Computer Science

The Lab For this assignment, you need access to a computer running Windows 7, Windows 10...

The Lab

For this assignment, you need access to a computer running Windows 7, Windows 10 or a current operating system. Create a folder that contains two subfolders and five files of different types. Each subfolder should have at least three files. Apply each of the NTFS standard permissions to the first folder you created, and allow the permissions to be inherited. Record and report the effects of each change.

Solutions

Expert Solution

ANSWER
The directory structure that I am using is:

CHANGING THE PERMISSION OF PARENT FOLDER

This step has applied all the NTFS permissions to parent folder

ALLOWING INHERITENCE OF PERMISSIONS

child one has inherited permissions from parent by default

child two has also inherited all permissions from parent

Similarly all files in parent, child one and child two have inherited all permissions from parent by default.


Related Solutions

For this assignment, you will need any computer running PowerShell v5 or later. Your answer should...
For this assignment, you will need any computer running PowerShell v5 or later. Your answer should only include the function or the script files that generate the results. The Get-ChildItem cmdlet is very useful in obtaining files and directory information. Your challenge is to create a PowerShell function that displays all ‘.exe’ and ‘.dll’ files stored under C:\Windows\System32, whose size is more than 5 MB. Group the files based on their extension and store the list into a text file.
For this assignment, you will need any computer running PowerShell v5 or later. Your answer should...
For this assignment, you will need any computer running PowerShell v5 or later. Your answer should only include the function or the script files that generate the results. For this question, your challenge is to create a PowerShell function that accesses all the log files stored under C:\Windows\System32\winevt\Logs. The function should display only those event logs whose size is more than 1MB. Sort the result by LastWriteTime in descending order.
For this assignment, you will need any computer running PowerShell v5 or later. Your answer should...
For this assignment, you will need any computer running PowerShell v5 or later. Your answer should only include the function or the script files that generate the results. For this question, your challenge is to create a PowerShell function that accesses all the log files stored under C:\Windows\System32\winevt\Logs. The function should display only those event logs whose size is more than 1MB. Sort the result by LastWriteTime in descending order.
For this assignment, you will need any computer running PowerShell v5 or later. Your answer should...
For this assignment, you will need any computer running PowerShell v5 or later. Your answer should only include the function or the script files that generate the results. The Get-ChildItem cmdlet is very useful in obtaining files and directory information. Your challenge is to create a PowerShell function that displays all ‘.exe’ and ‘.dll’ files stored under C:\Windows\System32, whose size is more than 5 MB. Group the files based on their extension and store the list into a text file.
a) You have installed the DNS server role on a computer running Windows Server 2016 and...
a) You have installed the DNS server role on a computer running Windows Server 2016 and in the process of configuring forward/reverse lookups. Explain the difference between “ping www.google.com” and “ping the IP address of Google server at 172.217.167.68”. You may want to try both and observe any differences. Your answer should include your explanation, as well as screenshots. [5 Marks] b) Network administrators warn against configuring a file server to use DHCP. Explain what would happen if a file...
a) You have installed the DNS server role on a computer running Windows Server 2016 and...
a) You have installed the DNS server role on a computer running Windows Server 2016 and in the process of configuring forward/reverse lookups. Explain the difference between “ping www.google.com” and “ping the IP address of Google server at 172.217.167.68”. You may want to try both and observe any differences. Your answer should include your explanation, as well as screenshots. b) Network administrators warn against configuring a file server to use DHCP. Explain what would happen if a file server was...
a) You have installed the DNS server role on a computer running Windows Server 2016 and...
a) You have installed the DNS server role on a computer running Windows Server 2016 and in the process of configuring forward/reverse lookups. Explain the difference between “ping www.google.com” and “ping the IP address of Google server at 172.217.167.68”. You may want to try both and observe any differences. Your answer should include your explanation, as well as screenshots.
4. What Windows utility would you use to troubleshoot a Windows service that isn’t running but...
4. What Windows utility would you use to troubleshoot a Windows service that isn’t running but should be? 5. John wants to access the Task Manager so he can end some processes. What are the three ways he could open it?...
Maintenance In this activity, you will investigate several ways to keep Windows running well. You will...
Maintenance In this activity, you will investigate several ways to keep Windows running well. You will show how to get to and use each maintenance program, show what they do and how they help improve the operation of the PC. 1. List five ways to keep Microsoft Windows functioning properly. 2. List the websites for each of the five types of free maintenance programs or applets. 3. Define what each of these maintenance programs or maintenance actions do. 4. Describe...
I need some assistance with the following assignment: Cron is a system daemon running in the...
I need some assistance with the following assignment: Cron is a system daemon running in the background helping you schedule and execute tasks such as system backups. In this lab you will learn how to schedule backups with user and system cron tables. Submit a report that lists the commands that you would use to accomplish the following tasks: Check the status of a cron daemon Stop and terminate a cron daemon Start and run a cron daemon Restart a...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT