153k views
5 votes
You are the it administrator for a small corporate network. there are two groups of users who access the computer in office 1, named daygroup and nightgroup. each group has a corresponding folder on the computer named d:\day data and d:\\ight data, respectively. you have been asked to help configure appropriate access to each folder for each group. in this lab, your task is to: turn off permission inheritance for d:\day data and d:\\ight data. convert the existing permissions to explicit permissions. remove the users group from each folder's acl. add the appropriate group (daygroup or nightgroup) to the folder's acl. assign full control over each folder to the appropriate group. do not change any other permissions assigned to other users or groups.

A) Configuration Settings Challenge
B) Windows Update Management
C) IT Administrator Task
D) Workstation Update Customization

User Amit Bakle
by
7.5k points

1 Answer

2 votes

Final answer:

C) IT Administrator Task As an IT Administrator, the task involves configuring folder permissions for 'DayGroup' and 'NightGroup' by turning off inheritance, converting permissions to explicit,

Step-by-step explanation:

The task described falls under the category of an IT Administrator Task, involving configuring folder access for two different user groups, DayGroup and NightGroup, on a small corporate network. To accomplish this, you must first turn off permission inheritance for the D:\Day Data and D:\Night Data folders.

Next, you will convert the existing inherited permissions to explicit permissions by choosing the correct option in the folder's properties security tab. After this, you need to remove the 'Users' group from each folder's Access Control List (ACL) to ensure they do not have access.



Following the removal, add the DayGroup to the ACL of D:\Day Data and NightGroup to that of D:\Night Data, granting them Full Control over their respective folders. It is crucial to make sure no other permissions assigned to other users or groups are altered during this process. These sets of actions secure each group's data and ensure that the folders are accessible only by their designated user groups during specific times of the day or night.