Managing Printers and File System Security
The Managing File System Security module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises: Understand Shared Folders and NTFS Permissions, Understand Effective Permissions.
The Managing File System Security module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
- Understand Shared Folders and NTFS Permissions
- Understand Effective Permissions
The following exam objectives are covered in this lab:
- 220-902: 1.2 Given a scenario, install Windows PC operating systems using appropriate methods
- 220-902: 3.2 Compare and contrast common prevention methods (Digital security, Directory permissions)
- 220-902: 3.3 Compare and contrast differences of basic Windows OS security settings (NTFS vs. Share permissions)
Lab time: It will take approximately 1 hour to complete this lab.
Exercise 1 - Understand Shared Folders and NTFS Permissions
A file server is a computer designated for the purpose of providing a location to store, retrieve and process data files. These files can include text documents, pictures, sound, videos, or other multi-media. File servers are set up for shared disk configuration where the storage media are pooled for optimized access to network users.
File servers do not perform any computational tasks, like messaging servers that manage emails or database servers that process database queries.
File server administrators ensure security to proprietary data by setting permissions to folders and files to ensure that only authorized users can access them.
In this exercise, you will manage the file server’s security using Shared permissions that are assigned to a folder and then verify the permissions.
Exercise 2 - Understand Effective Permissions
In corporate environments, a user will be accessing files and folders found in network servers. Network administrators apply security on the server’s file system to prevent unauthorized access to proprietary data. What the user can do with the folders and files is determined by the set of rules or permissions assigned to them.
IT & Cybersecurity certification hands on practice labs and practice exams for certifications and skill development.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.