If a user is accessing a shared folder over the network and it has both shared folder and NTFS permissions applied to it, the ________restrictivepermissionis the effective permission

Fill in the blank(s) with correct word


most.For example, if a user has Full Control NTFSpermission on a folder but accesses it across the network where he has Read shared folder permission, his effective permission is Read.

Computer Science & Information Technology

You might also like to view...

Programs that make a computer useful for everyday tasks are known as ____________.

a. operating systems b. utility programs c. application software d. system software

Computer Science & Information Technology

How do you work with Microsoft software that is available as an ISO image file?

What will be an ideal response?

Computer Science & Information Technology

A programming statement similar to first_name = “Fred”; should never be read as first_name equals Fred in programming. Explain two correct ways to state the above statement.

What will be an ideal response?

Computer Science & Information Technology

Use the ________ command to capture an image of any open window and automatically paste the image in the active Word document

A) Clip Art B) Picture C) ScreenGrab D) Screenshot

Computer Science & Information Technology