CompTIA A_ Certification All-In-One Exam Guide, Seventh Edition - Michael Meyers [260]
A. Wildcards
B. Optionals
C. Designators
D. Switches
8. What is the command to make MYFILE.TXT read-only?
A. ATTRIB +R MYFILE.TXT
B. ATTRIB –R MYFILE.TXT
C. READONLY MYFILE.TXT
D. MYFILE.TXT /READONLY
9. To learn the syntax of the DIR command, what can you type?
A. HELP DIR
B. DIR /?
C. DIR /HELP
D. Both A and B.
10. What is the command to quit the command-line interface?
A. EXIT
B. BYE
C. QUIT
D. STOP
Answers
1. B. The ASCII standard has 256 characters because that’s all 8 bits can handle!
2. C. You’ll find the YODA.TXT file in the C:\REBELS\JEDI\folder.
3. A. You can use the *.* wildcard combination to affect every file in a particular folder.
4. C. MD enables you to make a directory or folder. You can also use the older form, MKDIR.
5. A. Use the CMD command in the Run dialog box to access a command line in Windows 2000/XP.
6. B. The REN command with the proper syntax—REN START.BAT HAMMER.BAT—will rename the file.
7. A. The asterisk and question mark characters are wildcards when used with command-line commands.
8. A. The command ATTRIB +R MYFILE.TXT will make MYFILE.TXT read-only.
9. D. To learn the ins and outs of any command-line program, type the command followed by the /? switch or else type HELP and then the command.
10. A. Type EXIT and press the ENTER key to bail out of a command-line interface in Windows.
CHAPTER 16
Securing Windows Resources
In this chapter, you will learn how to
Create and administer Windows users and groups
Define and utilize NTFS permissions for authorization
Describe how to share a Windows computer securely
You might ask me, “What’s the single greatest aspect that keeps Microsoft Windows the number one operating system in the world?” My answer is “Windows is the easiest operating system for securing resources, individual computers, and entire networks.” Windows really gets it right when it comes to protection. Windows uses a combination of user accounts and groups that tie into the NTFS file system to provide incredibly powerful file and folder protection. This user/group/NTFS combo scales down to just a single computer and scales up to a network of computers that can span the world. Windows doesn’t just stop at files and folders, either.
The only serious challenge to all this great security is that Windows blurs the line between protecting just a single computer versus protecting a single computer over a network. In this chapter you will see Windows security from the aspect of a single, or standalone, machine. In Chapter 26, “Securing Computers,” we will revisit most of these security issues and see how the same tools scale up to help you protect a computer in a networked environment.
Essentials/Practical Application
Authentication with Users and Groups
The key to protecting your data is based on two related processes: authentication and authorization. Authentication is the process by which you determine a person at your computer is who he says he is. The most common way to authenticate is by using a user name and password. Once a user is authenticated, he needs authorization, the process that states what a user can and cannot do on that system. Authorization, at least for files and folders, is controlled by the NTFS file system, so we’ll tackle that in the second section of this chapter.
* * *
EXAM TIP The competencies on Essentials and Practical Application overlap a lot on the subjects in this chapter. You should know the information here for either exam.
* * *
NOTE A good security practice to determine what type of user account to give to a specific person is the principle of least privilege. In essence, you want to give users just enough—but no more—permissions to accomplish their tasks. Giving more than needed begs for problems or accidents and should be avoided.
Microsoft’s answer to the authentication/authorization process is amazing. Inside every Windows computer is a list of names of users who are allowed