Question :
a) There are up to 14 different built-in groups that might be located by default in the Builtin container including "Account Operators", "Incoming Forest Trust Builders" and "Pre-Windows 2000 Compatible Access". Give a small description of these three built-ins.
b) What are the two primary methods of implementing security? Briefly explain each one.
c) Give the three elements which determine a user's access and which define the permissions they have to an object.
d) Name and describe the two different types of Access Control Lists (ACLs) in the security descriptor.