ITM 315 Chapter Notes - Chapter 6: Encrypting File System, Voting Machine, Active Directory

113 views2 pages

Document Summary

Chapter 5 review questions: your company writes software for voting machines and needs to ensure that the software and documentation is carefully protected on its servers. Last week one of the servers was stolen from its machine room, but fortunately that server did not contain sensitive voting machine files. What steps can the programmer take to ensure that only he can view and access the folder? (choose all that apply. ) Use permissions to secure the shared folder. and c. place a dollar sign after the name of the shared folder to hide it: your company has salespeople who use laptop computers for travel. When they go out they need to access marketing files stored on the server. Answer: d. offline files: the water resources group in your organization asked you to create a shared folder to hold research data. Ten people are in the group; two of them cannot access the file but the other eight can.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents