ITM 315 Chapter Notes - Chapter 6: Encrypting File System, Voting Machine, Active Directory
Document Summary
Chapter 5 review questions: your company writes software for voting machines and needs to ensure that the software and documentation is carefully protected on its servers. Last week one of the servers was stolen from its machine room, but fortunately that server did not contain sensitive voting machine files. What steps can the programmer take to ensure that only he can view and access the folder? (choose all that apply. ) Use permissions to secure the shared folder. and c. place a dollar sign after the name of the shared folder to hide it: your company has salespeople who use laptop computers for travel. When they go out they need to access marketing files stored on the server. Answer: d. offline files: the water resources group in your organization asked you to create a shared folder to hold research data. Ten people are in the group; two of them cannot access the file but the other eight can.