What is the principle of least privilege

Assignment Help Management Information Sys
Reference no: EM131521540

Using Access Control Lists to Modify File System Permissions on Windows Systems

Overview

In this lab, you used the Windows command-line utility, icacls.exe, to establish file-level permissions following a set of access control requirements. You tested those permissions by remotely accessing the Windows server and attempting to modify files in the secured folders. You used screen captures to document that the access control changes you made in this lab were properly applied.

Lab Assessment Questions & Answers

1. What is the principle of least privilege?

2. What does ACL stand for and how it is used?

3. Why would you add permissions to a group instead of the individual?

4. List at least three different types of access control permissions you can enable for a file using icacls.exe.

5. Which access control permissions allow you to change files and/or folders?

6. If you don't remember the syntax when using icacls.exe, what command do you type to see the options?

7. Without using the icacls.exe tool, how could you view and modify the privileges of the files or folders of a shared drive?

8. Where do permissions modified using the icacls.exe tool appear in the folder Properties?

Reference no: EM131521540

Questions Cloud

Record any amounts as a result of each contingencies : The ink-jet printing division of Environmental Printing has grown tremendously in recent years. Assume the following transactions related to the ink-jet.
Evaluate the success of the tactics described : Evaluate the success of the tactics described. Discuss what might have been done to make the tactic even more successful.
What compounded annual rate of return : If these annual savings continue for nine more years, what compounded annual rate of return will that represent? (Ignoring income taxes.)
Present at least two points of criticism : Present at least two points of praise (i.e. Agile principles you believe are positive/productive). Present at least two points of criticism.
What is the principle of least privilege : What is the principle of least privilege?What does ACL stand for and how it is used? Why would you add permissions to a group instead of the individual?
Discuss duration and portfolio immunization : Why are bonds considered as less risky investments than as stocks? Discuss duration and portfolio immunization.
Determine the appropriate means of reporting each situation : Dinoco Petroleum faces three potential contingency situations, described below. Dinoco's fiscal year ends December 31, 2012, and it issues its 2012 financial.
How would it affect the acid-test ratio : Selected financial data regarding current assets and current liabilities for The Home Depot and Lowe's,two close competitors in the building supply industry.
Discounted back to today value : Describe how money has a value that can be described mathematically at some future point or how future cash flow streams can be discounted back to today's value

Reviews

Write a Review

Management Information Sys Questions & Answers

  How to apply these to organization to improve effectiveness

This Research Paper allows you to showcase what you have learned from the course and the application within an organization of your choice. Also, it a chance to use theories gained from the course work and how to apply these to an organization to ..

  Define a discussion of the information used in the system

A full description of the new system, a description of its components, and the benefit it will provide to the system assigned on week 1s. A discussion of the business requirements driving the need for the system. A discussion of the information use..

  Way to stop all outside hackers form gaining access

What is only one way to stop all outside hackers form gaining access to a company's information, do you know what that is

  Write a paper about big data

A 2 pages paper about " Big Data" you have to write it in your own words so it not that hard i just don't have time for it.

  Discuss techniques of effective presentation delivery

Describe the characteristics of effective business presentations - Show techniques of effective presentation delivery.

  Prospective customer on data security

Conduct a little research and determine if they publish any information to a prospective customer on data security.

  Areas of the organization and highlight the level of risk

A security vulnerability report identifies the areas of the organization which are at risk of lost data, outages, etc.

  Organizational structure chain of authority for

organizational structure chain of authority for compliancemore and more companies are separating the organizational

  Describe the process of performing a risk assessment

Describe the components and basic requirements for creating an audit plan to support business and system considerations. Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance. Use technology a..

  Discuss about the solid waste management

In order for engineering in solid waste management to maintain professional autonomy, the public has to trust engineers.However, should the public completely trust and rely on engineers to make the best decisions for the community, or should the pub..

  Provide an example of an organization

Businesses that use technology to change its level of learning and provide an example of an organization

  Develop your own abstract for article

Develop your own abstract for article - A systematic review of social networks research in information systems: building a foundation for exciting future research. All the articles will most likely already have an abstract developed by the original ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd