Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?
A) Assign the hidden attribute to the folder
B) Use a pair of public and private keys that are uniquely generated for a system
C) Modify the folder permissions for each user through Advanced Security Settings
D) Edit the Default Domain Policy object to enable auditing functionality
Correct Answer:
Verified
Q2: Denji has access to a shared folder
Q3: Jonathan has access to the files and
Q4: Alaska, a system administrator, copies important and
Q5: Within a workgroup environment, if EFS keys
Q6: A system administrator wants to give NTFS
Q8: What happens when a folder with NTFS
Q9: A user is attempting to access a
Q10: Natalie is a graphic designer who frequently
Q11: Pavel is an IT project lead at
Q12: The DFS Replication role needs to be
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents