List three rules for creating a file structure.
What will be an ideal response?
Keep a manageable number of folders in the root folder.
Keep operating system files in the default folders recommended by the vendor.
Keep different versions of software in their own folders.
Keep data files in folders on the basis of their functions.
Design home folders to match the functions of users in an organization.
Group files with similar security needs within the same folders.
You might also like to view...
A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?
A. WPA B. WPA2 C. WEP D. VPN
This is an example of a tool that the network administrator can use to develop baseline measurements?
What will be an ideal response?