When Windows XP compares an access token to a DACL (discretionary access control list), it scans the ACEs (access control entries) one by one and stops when it finds the first ACE whose SID (security identifier) matches an SID in the access token. Consider an administrator that wants to permit all authenticated users except interns to use a printer. The first ACE in the printer’s DACL would
deny the security group Interns and the second ACE would permit the security group Everyone.Assume that an intern’s access token lists the security group Everyone first and the security group Interns second. What would happen if instead the system scanned the access token and stopped when it found an SID in the DACL?
What will be an ideal response?
Since Everyone would match an ACE in the DACL, the intern would be permitted to
use the printer.This is why the system scans the DACL’s ACEs and not the principal’s access
token.
You might also like to view...
Today's 1080i and 1080p display devices typically have 2540 x 1920 resolution, which makes them compatible with widescreen HDTV standards.
Answer the following statement true (T) or false (F)
Cased-Based Critical Thinking QuestionsCase 4-1Ken has built a Web site for his homework assignment. He has his links for each chapter appear on the page with a blue background image behind each link. Ken has each link appear as green with no underline marks. Ken would like the background of his links to change to lightblue.jpg when the mouse pointer is over the link. Which style will he need to modify?
A. a:link B. a:visited C. a:hover D. a:active
The unique identifier burned into a ROM chip in the NIC is known as the ___________________.
Fill in the blank(s) with the appropriate word(s).
Identify the syntax to remove a rule from a style sheet.
A. sheet.deleteRule(rule,index) B. sheet.deleteRule(index) C. sheet.deleteRule(rule) D. sheet.deleteRule(index, rule)