179k views
5 votes
In the lab, what is the task to be performed for the Marketing and Research groups accessing the Office1 computer?

1) Disable permissions inheritance for E: Marketing Data and E: Research Data
2) Convert the existing permissions to explicit permissions
3) Remove the Users group from the access control list (ACL)
4) Add the Marketing group to the Marketing Data folder ACL
5) Add the Research group to the Research Data folder ACL
6) Assign Full Control to the Marketing and Research groups for their respective folders
7) Change permissions assigned to other users or groups

1 Answer

3 votes

Final answer:

In the lab, the task is to set up secure folder access permissions for the Marketing and Research groups on the Office1 computer, which involves disabling inheritance, converting permissions, removing the Users group, adding specific groups to ACLs, assigning Full Control, and changing other user permissions.

Step-by-step explanation:

In the lab, the task to be performed for the Marketing and Research groups accessing the Office1 computer involves several steps related to access control and permissions management for resources on the E: drive. The specific tasks include:

  1. Disabling permissions inheritance for both the E: Marketing Data and E: Research Data folders to ensure that these folders do not automatically inherit permissions from the parent directory.
  2. Converting the existing inherited permissions on these folders to explicit permissions so that they are directly assigned to these folders and not affected by changes to the parent directory's permissions.
  3. Removing the Users group from the access control list (ACL) of both folders to limit access to only specific groups.
  4. Adding the Marketing group to the ACL for the Marketing Data folder and the Research group to the ACL for the Research Data folder to grant access to the appropriate groups.
  5. Assigning Full Control to the Marketing and Research groups for their respective folders, which allows them to have all possible permissions, including reading, writing, modifying, and deleting files.
  6. Changing permissions assigned to other users or groups as necessary to ensure that only authorized individuals have the required level of access to each folder.

These steps are critical for data security and proper access control within an organization.

User Yenshirak
by
8.1k points