Looks like no one added any tags here yet for you.
Auditing
allows tracking of access to files and what was done
What makes file sharing possible?
Server Service component (and printing resources)
An immutable object is an object whose state cannot be modified after it is created.
An immutable object is an object whose state cannot be modified after it is created.
In Windows, security tracking is only available on ___________________ formatted volumes.
ntfs
The Windows command line command for accessing a network share is ___________ _____________________.
net use
A UNC is written in the format ___________________________________.
\\servername\sharename
\\server name\share name
\\server\share
A ___________ _______________ that is stored on a central server can be used to automatically set up shared drives and provide updates every time a user logs into the domain.
login script
Auditing actions are written to the _________________ log of the Event Viewer.
security
To create a hidden share, add this to the end of the share name: ____________.
$
In Windows, the ________________________ permissions are the permissions that will be enforced on a user or group.
effective
If a share named ENG_DATA is published on a Windows server named DATA_SRV, the UNC to access the resource should be ____________________________________________
\\data_srv\eng_data
The windows command line command for displaying existing shares and permissions is ___________ __________________.
net share
All files and folders under a parent folder will have the same permissions as the parent by default. This is known as ______________________.
inheritance
To find the IP address of an Ubuntu Linux server, use the ___________ command.
ip
ip a
___________________________ is a package management tool used to install, update and remove software packages in Ubuntu.
apt-get
apt
The Linux command to create a directory is
mkdir
The Linux command for changing permissions to files/directories is _______________.
chmod
The Linux command to create an empty text file is ________________________.
touch
When the users of a system do not know the details of the network because it seamlessly integrates with the computer they are using, this is known as the concept of ____________________.
transparency
An NFS mount point is defined in the _____________________________ file on a Linux computer. Use the absolute (full) path.
/etc/exports
The Linux command to change the ownership of a file is ___________________.
chown
To find the IP address of a Windows computer from the command line, use the _____________ command.
ipconfig
A(n) ________________ _______________________ defines a directory on a Linux system to which an additional file system is logically attached.
mount point