Podcast
Questions and Answers
A user has full control share permissions and read-only NTFS permissions on a shared folder. What is the effective permission level for the user?
A user has full control share permissions and read-only NTFS permissions on a shared folder. What is the effective permission level for the user?
- Full control
- Read-only (correct)
- Change
- Modify
What is the primary purpose of User Account Control (UAC) in Windows?
What is the primary purpose of User Account Control (UAC) in Windows?
- To limit application capabilities requiring explicit approval. (correct)
- To manage network share permissions.
- To provide single sign-on functionality.
- To encrypt the entire Windows volume.
Which of the following is NOT a typical sign-in option for Windows?
Which of the following is NOT a typical sign-in option for Windows?
- Personal Identification Number (PIN)
- Picture Password
- Security Key
- Voice Recognition (correct)
What happens to NTFS permissions when a file is moved to a different folder on the same volume?
What happens to NTFS permissions when a file is moved to a different folder on the same volume?
Why might a user choose to use Encrypting File System (EFS) instead of BitLocker?
Why might a user choose to use Encrypting File System (EFS) instead of BitLocker?
When connecting to a shared folder over the network, which set of permissions is checked first?
When connecting to a shared folder over the network, which set of permissions is checked first?
Which action requires a user to have elevated privileges or administrator rights in Windows?
Which action requires a user to have elevated privileges or administrator rights in Windows?
What is the main advantage of using a Microsoft Account to log into a Windows device compared to a local account?
What is the main advantage of using a Microsoft Account to log into a Windows device compared to a local account?
If a user is a member of both the 'Remote Management Users' and 'Administrators' groups, which of the following is true?
If a user is a member of both the 'Remote Management Users' and 'Administrators' groups, which of the following is true?
What is the purpose of BitLocker To Go?
What is the purpose of BitLocker To Go?
When does Windows prompt the User Account Control (UAC) window?
When does Windows prompt the User Account Control (UAC) window?
What is the difference between explicit and inherited permissions in NTFS?
What is the difference between explicit and inherited permissions in NTFS?
Why might a user not be able to access EFS encrypted files after an administrator resets their password?
Why might a user not be able to access EFS encrypted files after an administrator resets their password?
Which of the following is NOT a permission available for share permissions?
Which of the following is NOT a permission available for share permissions?
Under which circumstance would an administrator most likely use the 'Run as administrator' option?
Under which circumstance would an administrator most likely use the 'Run as administrator' option?
Which type of Windows account is associated with a specific device, and logs in only to that device?
Which type of Windows account is associated with a specific device, and logs in only to that device?
How can a user grant temporary elevated rights to an application?
How can a user grant temporary elevated rights to an application?
Which is the primary reason to encrypt a Windows volume with BitLocker?
Which is the primary reason to encrypt a Windows volume with BitLocker?
What does the Secure Desktop accomplish when the User Account Control (UAC) window appears?
What does the Secure Desktop accomplish when the User Account Control (UAC) window appears?
What should be considered before elevating permissions using User Account Control (UAC)?
What should be considered before elevating permissions using User Account Control (UAC)?
What happens when a user logs into a Windows Domain?
What happens when a user logs into a Windows Domain?
Which permission level grants users the ability to read, write, modify, and delete files and subfolders?
Which permission level grants users the ability to read, write, modify, and delete files and subfolders?
If a folder has inherited permissions from a parent folder, how can you prevent a subfolder from inheriting those same permissions?
If a folder has inherited permissions from a parent folder, how can you prevent a subfolder from inheriting those same permissions?
Which of the following is a characteristic of NTFS permissions?
Which of the following is a characteristic of NTFS permissions?
Why are NTFS permissions important for securing data on a local Windows device?
Why are NTFS permissions important for securing data on a local Windows device?
Flashcards
Local Accounts
Local Accounts
Accounts stored on a local device, used to log in to that specific Windows device.
Microsoft Account Login
Microsoft Account Login
Logging in using your Microsoft account integrates services like Skype, Office, and OneDrive.
Local Users and Groups
Local Users and Groups
Details on users who can log in and their rights/permissions on the device.
Username and Password
Username and Password
Signup and view all the flashcards
Personal Identification Number (PIN)
Personal Identification Number (PIN)
Signup and view all the flashcards
Biometric Login
Biometric Login
Signup and view all the flashcards
Windows Domain Single Sign-On
Windows Domain Single Sign-On
Signup and view all the flashcards
NTFS Permissions
NTFS Permissions
Signup and view all the flashcards
Share Permissions
Share Permissions
Signup and view all the flashcards
Restrictive Permissions
Restrictive Permissions
Signup and view all the flashcards
Inherited NTFS Permissions
Inherited NTFS Permissions
Signup and view all the flashcards
Explicit Permissions
Explicit Permissions
Signup and view all the flashcards
Elevated Account
Elevated Account
Signup and view all the flashcards
Run as Administrator
Run as Administrator
Signup and view all the flashcards
User Account Control (UAC)
User Account Control (UAC)
Signup and view all the flashcards
Secure Desktop
Secure Desktop
Signup and view all the flashcards
BitLocker
BitLocker
Signup and view all the flashcards
BitLocker To Go
BitLocker To Go
Signup and view all the flashcards
Encrypting File System (EFS)
Encrypting File System (EFS)
Signup and view all the flashcards
EFS Encryption Key
EFS Encryption Key
Signup and view all the flashcards
Study Notes
- To use most operating systems, you must log in and Windows is no exception.
- There are different options for logging in.
Login Options
- One option is with accounts stored on the local device, referred to as local accounts, providing access to that specific Windows device.
- Alternatively, a Microsoft account, configured on the Microsoft Cloud, can be used to log in to the local device.
- Microsoft account logins integrate with Microsoft technologies like Skype, Office, and OneDrive.
- In offices or enterprises, users log in with their Windows domain credentials.
Account Storage
- Local account details are stored under local users and groups.
- This includes a list of users who can log in to the device, along with their rights and permissions.
- Users can be added to groups to grant them specific rights and permissions.
- Adding a user to the administrators group grants them administrative access on the device.
- Other groups include event log readers and remote management users.
- The most common login credentials are a username and password.
Authentication Options
- After logging into Windows, other authentication options are available, like a personal identification number (PIN).
- Windows includes biometrics for logging in, such as facial recognition if the device has a camera.
- On a Windows domain, single sign-on eliminates the need to re-enter credentials when connecting to other resources.
Managing Login Methods
- To add or change login methods, access the settings under accounts and sign-in options.
- Options include facial recognition, fingerprint recognition, PIN, security key with USB, password, or picture password.
NTFS Permissions
- On a local device, file rights and permissions are based on the permissions associated with NTFS.
- Every file or folder in NTFS has a Security tab to specify the groups/users with access and their associated rights/permissions.
Share Permissions
- When connecting across a network, access is subject to share permissions and NTFS permissions.
- Share permissions are associated with access to a share across the network.
- The most restrictive access between share permissions and NTFS permissions takes priority.
- If a share has full access, but NTFS permissions are set to read-only, access will be read-only.
Inheritance
- NTFS permissions are inherited from the parent folder.
- Assigning permissions to a folder applies those permissions to its subfolders and files, unless otherwise specified.
- Moving an NTFS file/folder to a different folder on the same volume retains its original permissions.
Permission Types
- NTFS permissions offer configuration options like full control, modify, read and execute, and list folder contents.
- Share permissions allow assigning users and groups with options for full control, change, and read.
- Explicit permissions are assigned to objects in the file system.
- Inherited permissions are automatically associated with an object based on its parent.
Elevated Accounts
- By default, not every user has access to every part of the operating system.
- Elevated or administrator rights are needed to edit system files, install services, and perform enhanced functions.
- Even with assigned administrator rights, they take effect only when explicitly requested.
- To run an application with elevated rights, right-click and choose "Run As Administrator."
User Account Control
- Windows includes User Account Control (UAC), which limits user capabilities until approval is granted.
- Standard users may see a UAC window to use the network or change a password.
- Administrators may see a UAC window when installing applications or updating device drivers.
- The secure desktop UAC window provides information about changes and potential risks.
- An unexpected UAC window for a normal application requires careful consideration.
BitLocker
- A powerful security feature in Windows is the ability to encrypt an entire volume using BitLocker.
- BitLocker encrypts everything, including personal files and the operating system.
- Encrypting safeguards data if a laptop is lost or stolen, even if the storage drive is moved to another system.
- BitLocker To Go encrypts data written to a USB flash drive.
Encrypting File System
- Encrypting File System (EFS) can encrypt specific files or folders.
- EFS only exists in NTFS meaning most versions of Windows have the feature
- EFS works in all Windows editions except the home editions.
- The encryption key used for EFS is based on the user's username and password.
- Resetting a user's password administratively may cause loss of access to EFS encrypted data.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.