How to use the encrypting file system

Assignment Help Computer Networking
Reference no: EM13254757

Write your answers to the steps for each activity below.

Activity 1

You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents.

In Step 3, when you click the Advanced button on the General tab, what are the two sets of two attributes you find?

In Step 6, need to verify that a folder is encrypted.  How?

Activity 2

In this activity, you will create a new folder and configure its permissions.

In Step 2, the default groups that have permissions are:

In Step 6, the Server Operators group has the following permissions checked for Allow by default:

Activity 3

This project enables you to practice configuring special permissions for a folder. Consider using this as an opportunity to have a short class discussion about situations in which you would set up special permissions and why they are necessary.

Activity 4

This project enables you to practice examining effective permissions on a folder to help resolve a security conflict. Consider using this as an opportunity to discuss other security conflict solving tactics that you use.

In Step 8, the effective permissions for the Everyone group are:

Activity 5

You will learn about the Print Spooler service in this project. We will come back to this service later in the chapter to learn how to restart it. For now, you need to view a description of the purpose of the service and you learn about its dependencies.

Activity 6

In this activity you will install the Internet Printing Client which enables clients connecting to printers through Windows Server 2008 to use the IPP for Internet printing.

Activity 7

For this activity, you install the Print Services role via Server Manager.

In Step 5, the role services that can be installed are:

Activity 8

You will view where to configure the print server properties and also get a first look at the Print Management Console in this project.

In Step 6, the spooler management options selected by default are:

In Step 6, the folder and path for spooler files is:

Activity 9

In this activity, you need to manually install a local printer. There are two advantages to having them do a manual installation: (1) A printer is not required and (2) you will learn the basic steps for installing a printer.

Activity 10

So that users can access printers shared from Windows Server 2008, it is necessary to turn on printer sharing.

Activity 11

In this activity, you will learn how to configure printer pooling.

Activity 12

This project enables you to practice configuring security permissions and auditing on a shared printer.

Reference no: EM13254757

Questions Cloud

What is the mole fraction of oxygen in the mixture : 10.0-L ask contains 1.031 g O2 and 0.572 g CO2 at 18C. What are the partial pressures of oxygen and carbon dioxide. What is the total pressure. What is the mole fraction of oxygen in the mixture.
How much time would you allow per appointment : You have just been promoted to the manager of your medical office. One responsibility you now have is to research and determine if you want to use the concept of speed treatment to treat your patients.
Explain what is the maximum mass of sucralose : What is the maximum mass of sucralose (C12H19Cl3O8) you can add to 2.50 kg of pure water and still have the solution freeze? Assume that sucralose is a molecular solid and does not ionize when it dissolves in water.
Determine the gross quantities needed of each item : Design a product structure noting the quantities for each item and show the low-level coding.
How to use the encrypting file system : You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents
Find the angle of force on the ladder : A 85 kg window cleaner uses a 14 kg ladder that is 5.9 m long. He places one end on the ground 3.4 m from a wall, find the angle (relative to the horizontal) of that force on the ladder
Compute the van''t hoff factor : consider a 0.0500m HClO2 is a moderately weak electrolyte acid such that 36% of the molecules dissociate when dissolved in water. calculate the van't hoff factor
Calculate the reorder point for the notebook binders : Annual demand for the notebook binders at Duncan's Stationery Shop is 10,000 units. Dana Duncan operates her business 300 days per year and finds that deliveries from her supplier generally take 5 working days.
At what temperature do hydrogen molecules have rms speed : At what temperature do hydrogen molecules, H2, have the same rms speed as nitrogen molecules, N2, at 455C. At what temperature do hydrogen molecules have the same average kinetic energy.

Reviews

Write a Review

Computer Networking Questions & Answers

  What rfc describes the gopher protocol

What RFC describes the Gopher protocol? Print and read the first two pages of the RFC and list and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

  Company a has about 100 employees

Company A has about 100 employees spread over three locations in the same city, all linked by fast network connections. The IT/IS administration is centralized and includes the helpdesk.

  Determine minimum number of bits for sequence number

Suppose that each frame carries 1Kbytes of data, determine minimum number of bits you require for the sequence number?

  Address type certification certification issue with company

Type-1 certification (TOP SECRET) focuses on Development Methodology. How would you address this certification issue with your hypothetical company (make up one for this problem) for your system

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Arrangement of subnet masks

An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

  Employment screening with organizations

Should the viewing or monitoring of social networking cites be considered an appropriate method for preliminary employment screening and continued employment with organizations?

  Design the network for new building

Design the network for new building and define the subnet and define the topology that will be used.

  Explain how you would go about using a viral campaign

Explain how you would go about using a viral campaign for your business and write a few sentencescomparing the results of the two search engines and explain the two results - why do you think they were similar/different?

  Provide network addresses which satisfy constraints

Subnet 1 is needed to support up to 125 Interfaces, and Subnet 2 and 3 are each needed to support up to 60 interfaces. Give three network addresses which satisfy these constraints.

  How network design support dial-up or vpn remote access

Explain whether or not network design will support dial-up or VPN remote access. Write down the disadvantages to solution. - Format your paper according to APA standards. - Write a minimum of two references.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd