You are the owner of the D:\Reports folder.   Judith needs t…

You are the owner of the D:\Reports folder.   Judith needs to be able to see the files and subfolders in the D:\Reports folder. Dalton needs to be able to do these same things and also delete folders.   You need to assign the necessary NTFS permissions to the D:\Reports folder. What should you do?

You are the domain administrator for a single domain forest….

You are the domain administrator for a single domain forest. You have 10 file servers that are member servers running Windows Server. Your company has designed its top-level OU structure based on the 15 divisions for your company. Each division has a global security group containing the user accounts for division managers.   You have folders on your file servers that all division managers should have permission to access. For some resources, all division managers will need full control. For others, they will only need read or change permissions. You need a group strategy that will facilitate the assignment of permissions but minimize administrative effort.   What should you do?

You are the administrator of a network with a single Active…

You are the administrator of a network with a single Active Directory domain. Your domain contains three domain controllers and five member servers.   Your security policy states that all accounts should be locked out after three unsuccessful logon attempts and that accounts must be reset only by an administrator. A GPO enforces these settings.   You receive a call Monday morning from the help desk. There are seven users who are unable to log in to the domain. Upon further investigation, you notice all seven accounts have been locked out.   You need to unlock the user accounts with the least amount of administrative effort while complying with your security policy.   What should you do next?

After configuring a password policy to require users to crea…

After configuring a password policy to require users to create strong passwords, you start to notice sticky notes stuck to monitors throughout the organization. The sticky notes often have strings of characters written on them that appear to be passwords.   What can you do to prevent the security risk that this practice presents?