A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?

  • All remote access is blocked.
  • The share and NTFS permissions will be added.
  • The most restrictive share or NTFS permission will be applied.
  • Only the original owner can modify the file either locally or from a remote location.
    Explanation:

    If a shared folder has been given the full control NTFS permission and the read share permission, the effective permission will be the most restrictive one which is read in this case.