ICT379_LAB3-5_page-3.pdf - Question 5 Switch to the Joe account See if you can access both of the files the one top-level folder and in the Project

ICT379_LAB3-5_page-3.pdf - Question 5 Switch to the Joe...

This preview shows page 1 - 11 out of 59 pages.

131 Question 5. Switch to the Joe account. See if you can access both of the files, the one top-level folder and in the Project folder that is shared. Can the system administrator access the encrypted file? Provide screenshots and any relevant commentary. Figure 2.9
132 When trying to access to Encrypt file from \\SVR2012R2\Project , the access is denied while trying to access. (Figure 2.10) Figure 2.10
133 When trying to access to Encrypt file from Windows server 2012 itself, the access is permitted, the content is shown. (Figure 2.11) Figure 2.11
134 Question 6. Verify and provide screenshots/commentary whether or not files created under an encrypted folder are automatically encrypted and whether they retained their encrypted status after being removed from the folder. First, create a new text file under the C:\Encrypted Folder that we created in lab before (This folder itself is not encrypted, only one file is encrypted, named encrypted file, which was done previously). This newly created file does not automatically become encrypted. (Figure 2.12) Figure 2.12
135 Next, create a new folder “C:\New encrypted folder”, with the following setting below (Enable secure contents). (Figure 2.13) Figure 2.13
136 Go inside to this folder, create a new text file. This new created text file is now encrypted automatically. (Figure 2.14) Figure 2.14
137 When move out the newly created text file in “C:\New encrypted folder” to “C:\Users\staffb\” Root, the text file’s encryption state is remained encrypted. (Figure 2.15) Figure 2.15
138 When move out the newly created folder named “New encrypted folder” in “C:\” to “C:\Users\staffb\” Root, the folder’s encryption state is remained encrypted. (Figure 2.16) Figure 2.16
139 When move out the “C:\Encrypted Folder\Encrypted File.txt” to “C:\Users\staffb\” Root, the Encrypted File.txt’s encryption state is remained encrypted. (Figure 2.17) Figure 2.17
140 Lab Review Questions Question 1 The differences between sharing settings and security permission settings are using in the sharing of local resources via SMB protocol to others computers which requested. Those setting will be applied on those domains joined accounts, and system will identify them independently by using group settings (such as Project Group in lab) or using only an account. Sharing settings – This setting is applied when the folder is shared. There are setting like share this file to only some accounts, and gives those account allowed or denied access to this shared folder, but there are only three types of permission, full control, read and write/change (Figure A). Next, the share settings can give the name of the network path, which will show on \\PCNAME\THE_SHARE_NAME . There are also other related settings such as control the number of users who are allowed to access the shared folder.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture