Essentials virtual machine

Assignment Help Basic Computer Science
Reference no: EM133214277

Using the Windows Server 2016 Essentials virtual machine available through the course, log in as user "collegeadm" and password "Herzing2021". Then, respond to the following questions:

  1. In addition to "collegeadm", what other users have read and write access to the file "next_movie_script" located in your Documents folder? Hint: Right click and go to Properties → Security.
  2. Considering these users belong to the same security group, remove the individual permissions and grant the same permissions to the group they belong to. What group was it? What permissions did you grant?
  3. Explain an advantage of using security groups over granting permissions to individual users.
  4. What other user is member of this group? How would you avoid this specific member to read the file?
  5. Right click on any file in your Documents folder. Then, Properties → Security → Advanced. What the Auditing tab is used for?
  6. Look for the "Microsoft Print to PDF" printer and check the permissions by clicking on Printer properties → Security. What users and/or groups can manage this printer? What permissions does the group Everyone have?
  7. Open a command-line interface (cmd) and execute powershell (the prompt will start with PS). Then, get the SID for the domain administrator with the following cmdlet and write it down:

Get-ADUser -Identity 'administrator' | select Name,SID

  1. What the PowerShell cmdlet to get the SID for the group "guests" would be? What is the SID?
  2. Open a cmd and execute "echo this is a test > c:file.txt". What message do you get? Why?
  3. How would you run cmd with enough privileges for the previous command to work? What is the path you are in (please note it is not the user's home)?

Reference no: EM133214277

Questions Cloud

Discuss challenges of these legal-ethical issues : Discuss challenges of these legal & ethical issues and opportunities to prevent or overcome these situations.
Build a vulnerability management program : Use NIST Special Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to scan and build a vulnerability management program
Develop a data protection plan : Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys
Review the wireless and byod policies : Explain the media company's current stance on wireless devices and BYOD.
Essentials virtual machine : Using the Windows Server 2016 Essentials virtual machine available through the course, log in as user "collegeadm" and password "Herzing2021". Then, respond to
What are database attacks : What are database attacks? What are the types of Database attacks?
Find evidence of a firm that made a sourcing decision : 1. Find evidence of a firm that made a sourcing decision. You might identify a news story, journal article, an advertisement, or Website.
Major competitor in the market : BeeKeep Supplies is a national company supplying beekeeping equipment to commercial and hobbyist apiarists (beekeepers). BeeKeep Supplies began as a family-run
What distinguishes aloha sdlc from other sdlcs : What are advantages of ALOHA SDLC from other SDLCs? As if you were system anlysts of f the Development Team, will you follow the ALOHA SDLC? why.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd