Match each item with a statement below.

A. the folders that are shared by default on a network domain that administrator accounts can access
B. permissions assigned by Windows that are attained from a parent object
C. a group that can back up and restore any files on a Windows system regardless of access permissions to these files
D. a method to control access to a folder or file and can apply to local users and network users
E. a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
F. a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
G. a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
H. gives a user access to a Windows desktop from anywhere on the Internet
I. configuring a computer so that it will respond to network activity when the computer is in a sleep state
J. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage


A. administrative shares
B. inherited permissions
C. Backup Operators
D. NTFS permissions
E. Power Users
F. share permissions
G. gpedit.msc
H. Remote Desktop Connection
I. Wake on LAN
J. ActiveX control

Computer Science & Information Technology

You might also like to view...

____________________ is the distribution of copies of a work to the public by sale or other transfer of ownership, or by rental, lease, or lending.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?

A. RIP B. SNMP C. NTP D. STP

Computer Science & Information Technology

What virtual NIC hardware acceleration option enhances the virtual network adapter's performance by allowing a virtual adapter to bypass the virtual switch software on the parent partition?

A. Virtual machine queue B. Single-root I/O virtualization C. IPsec task offloading D. Single-root buffering

Computer Science & Information Technology

Security ____________________ are accountable for the day-to-day operation of the information security program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology