How to use the encrypting file system

Assignment Help Computer Networking
Reference no: EM13254757

Write your answers to the steps for each activity below.

Activity 1

You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents.

In Step 3, when you click the Advanced button on the General tab, what are the two sets of two attributes you find?

In Step 6, need to verify that a folder is encrypted.  How?

Activity 2

In this activity, you will create a new folder and configure its permissions.

In Step 2, the default groups that have permissions are:

In Step 6, the Server Operators group has the following permissions checked for Allow by default:

Activity 3

This project enables you to practice configuring special permissions for a folder. Consider using this as an opportunity to have a short class discussion about situations in which you would set up special permissions and why they are necessary.

Activity 4

This project enables you to practice examining effective permissions on a folder to help resolve a security conflict. Consider using this as an opportunity to discuss other security conflict solving tactics that you use.

In Step 8, the effective permissions for the Everyone group are:

Activity 5

You will learn about the Print Spooler service in this project. We will come back to this service later in the chapter to learn how to restart it. For now, you need to view a description of the purpose of the service and you learn about its dependencies.

Activity 6

In this activity you will install the Internet Printing Client which enables clients connecting to printers through Windows Server 2008 to use the IPP for Internet printing.

Activity 7

For this activity, you install the Print Services role via Server Manager.

In Step 5, the role services that can be installed are:

Activity 8

You will view where to configure the print server properties and also get a first look at the Print Management Console in this project.

In Step 6, the spooler management options selected by default are:

In Step 6, the folder and path for spooler files is:

Activity 9

In this activity, you need to manually install a local printer. There are two advantages to having them do a manual installation: (1) A printer is not required and (2) you will learn the basic steps for installing a printer.

Activity 10

So that users can access printers shared from Windows Server 2008, it is necessary to turn on printer sharing.

Activity 11

In this activity, you will learn how to configure printer pooling.

Activity 12

This project enables you to practice configuring security permissions and auditing on a shared printer.

Reference no: EM13254757

Questions Cloud

What is the mole fraction of oxygen in the mixture : 10.0-L ask contains 1.031 g O2 and 0.572 g CO2 at 18C. What are the partial pressures of oxygen and carbon dioxide. What is the total pressure. What is the mole fraction of oxygen in the mixture.
How much time would you allow per appointment : You have just been promoted to the manager of your medical office. One responsibility you now have is to research and determine if you want to use the concept of speed treatment to treat your patients.
Explain what is the maximum mass of sucralose : What is the maximum mass of sucralose (C12H19Cl3O8) you can add to 2.50 kg of pure water and still have the solution freeze? Assume that sucralose is a molecular solid and does not ionize when it dissolves in water.
Determine the gross quantities needed of each item : Design a product structure noting the quantities for each item and show the low-level coding.
How to use the encrypting file system : You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents
Find the angle of force on the ladder : A 85 kg window cleaner uses a 14 kg ladder that is 5.9 m long. He places one end on the ground 3.4 m from a wall, find the angle (relative to the horizontal) of that force on the ladder
Compute the van''t hoff factor : consider a 0.0500m HClO2 is a moderately weak electrolyte acid such that 36% of the molecules dissociate when dissolved in water. calculate the van't hoff factor
Calculate the reorder point for the notebook binders : Annual demand for the notebook binders at Duncan's Stationery Shop is 10,000 units. Dana Duncan operates her business 300 days per year and finds that deliveries from her supplier generally take 5 working days.
At what temperature do hydrogen molecules have rms speed : At what temperature do hydrogen molecules, H2, have the same rms speed as nitrogen molecules, N2, at 455C. At what temperature do hydrogen molecules have the same average kinetic energy.

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine percentage of ip datagram will be overhead

Determine percentage of each IP datagram will be overhead and percentage will be application data? Illustrate all computations required.

  Security in bluetooth and other mobile devices

Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

  Build a small network using three switches

Build a small network using three switches and one router and one switch will run as a distribution layer switch, the other two will run as access layer switches

  Create the network for use in training environment

You are asked to create the network for use in training environment. It must be mobile, ... Mobile Training is small training firm which offers mobile classrooms.

  Explaining factors of various ups systems

What factors of the various UPS systems must concern you? What would you suggest as the lowest cost solution for this situation?

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Explain packet-by-packet fair queueing system-logical buffer

Consider a packet-by-packet fair queueing system with three logical buffers and with service rate of one unit/second. Show the sequence of transmissions for this system.

  Does node refrain from transmitting its scheduled time

Assume nodes A and B are on same 10 Mbps Ethernet bus, and propagation delay between two nodes is 245 bit times. Does B refrain from transmitting at its scheduled time?

  Why do we pursue technologies

Why do we pursue technologies, such as those associated with virtual reality? Going back to one of our definitions of technology, what problem are we trying to solve? What are the risks associated with these technologies?

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  What are the requirements regarding plaintext and ciphertext

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd