Lesson 11 Manage Permissions and Sharing

Beschreibung

Der Nutzer hat seine Fachbereichs-Information gelöscht. Karteikarten am Lesson 11 Manage Permissions and Sharing, erstellt von Gelöschter Nutzer am 24/04/2017.
Gelöschter Nutzer
Karteikarten von Gelöschter Nutzer, aktualisiert more than 1 year ago Mehr Weniger
Jake Mauney
Erstellt von Jake Mauney vor mehr als 7 Jahre
Jake Mauney
Kopiert von Jake Mauney vor mehr als 7 Jahre
8
0

Zusammenfassung der Ressource

Frage Antworten
How do you identify the ownership and permissions of a file or folder in the Finder? An item’s ownership and permissions can be identified using the Info or Inspector window in the Finder
How do ACLs differ from standard UNIX file system permissions? Standard UNIX file system permissions allow permissions to be set for only one owner, one group, or all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.
What is the locked file flag? The locked file flag prevents anyone, including the item’s owner, from editing an item. Only the item’s owner can unlock the item to then allow modification.
Why is the root, or beginning, level of a user’s home folder visible to other users? The root level of a user’s home folder is visible to other users so they can navigate to the Public shared folder.
How does the default organization of the file system allow users to safely share local files and folders? Every home folder contains a Public folder that other users can read and a Drop Box folder that other users can write to. All other subfolders in a user’s home folder (except the optional Sites folder) have default permissions that do not allow access to other users. The Shared folder is also set for all users to share items.
What is unique about the permissions of the /Users/Shared folder? The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.
What does it mean when you choose the option to “ignore volume ownership” in the Finder? What are the security ramifications of ignoring volume ownership? You can choose to ignore ownership on any nonsystem volume. This will ignore any ownership rules and grant any logged-on user unlimited access to the contents of the volume. It is a potential security risk because it will allow any local user account to have full access to the volume even if that user did not originally mount the volume.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Politik von Bismarck
fio xxx
Zweiter Weltkrieg und Nazi-Deutschland
Markus Grass
Analytische Geometrie
sonnenblume1997
Netzwerktechnik
DFairy
Pädagogik Abitur 2016: Piaget
Lena S.
Vetie - Radiologie - Wer wird Veterinär
Fioras Hu
Vetie Allgemeine Pathologie Altfragen 2016
Nele Unger
Vetie Immunologie
Kristin E
Vetie Viro 2018
Anna Nie
GESKO A JOUR WS 2019/20
Caroline Hannah
Vetie Quiz Milch 2020
Katharina Enning