Difference between synchronous and asynchronous processing

Assignment Help Computer Network Security
Reference no: EM133166843

Assignment 1: Managing Group Policies

Question 1. In your own words explain:
a. What the SYSVOL share is on a Domain Controller.
b. What is Loopback Processing and when is it used?
c. The difference between an Active Directory folder and an Organizational Unit.
d. What is slow link processing and when is it used?
e. Will your organization be implementing slow-link processing in their design? Why or why not?
f. The difference between synchronous and asynchronous processing.

Question 2. Run the Group Policy Results wizard on your user PC in your lab environment.
a. Include a copy of the results in your report
b. What GPO's were applied to the computer and/or user account? What settings did they apply?

Assignment 2: Assignment: Configure your Active Directory environment

Using the primary DC for your company, you will configure your Active Directory environment using some advanced features:

Part 1:
1. Pre-create and RODC account that can be used for deployment of a DC at a branch office
a. This can be done using either ADAC or PowerShell
b. Choose a configuration for the Password Replication policy on your RODC. Take a screenshot of your configuration and explain in detail the benefits and disadvantages of your choice.
2. Create a new site for a branch office at your company.
a. If your company doesn't have a branch office, use this site as a backup site
b. Assign the site to a subnet. Take a screenshot of the subnet properties to show the assigned site.

Part 2:
1. In your own words explain what Universal Group Membership Caching means.
a. Would you recommend enabling this option anywhere in your organization? Why or why not?
2. In your own words describe each of the 5 FSMO roles. Include the following information for each:
a. What is the main function of this role?
b. Is it a domain or forest-wide role?
c. What are the best practices that should be considered when assigning this role to a server?
3. In your own words describe the difference between an authoritative and non-authoritative restore.
a. When should each restore mode be used?
b. What are the benefits and considerations that should be made when using each restore mode?

Assignment 3: Certificate Services

In your own words, write a report explaining the concept of certificates that could be understood by a non-technical person. Avoid using technical jargon completely.
1. What is the difference between plaintext and ciphertext?
2. Define what a "Key" is.
a. What is the difference between a secret, private, and public key?
3. What is cryptography?
a. What is the difference between symmetric and asymmetric cryptography?
4. What is a digital certificate and a digital signature?
5. Why does an organization need a certificate authority?
6. What is the difference between an Enterprise Certificate Authority and a Stand-Alone Certificate Authority?
a. What are the benefits of each type?
b. What are the disadvantages of each type?
7. What is the difference between a one-level, two-level, and three-level CA Hierarchy?

Reference no: EM133166843

Questions Cloud

What did the athenians mean by a bad citizen : (Race and Citizen Identity in the Classical Athenian Democracy)
Explain in detail the term self-concept : Explain in detail the term self-concept and describe the three related characteristics, providing example
Prepare the journal entry for the stock issuance : Aragon Consulting issued 1,300 shares of previously unissued common stock with a par value of $1. Prepare the journal entry for the stock issuance
Show the dividend allocation for each class or type of stock : Show the dividend allocation for each class or type of stock, assuming the preferred stock dividend is 6% and is non-cumulative
Difference between synchronous and asynchronous processing : What is Loopback Processing and when is it used and Will your organization be implementing slow-link processing in their design
Current organizational and operational structure : How does the current organizational and operational structure, including the system of corporate governance, benefit the firm?
Record any journal entries required to recognize impairment : Eastwood Co. is evaluating the following two intangible assets for impairment at year-end. Record any journal entries required to recognize impairment
Alliah values and social responsibility : Explain two potential ways the Alliah's leadership will improve their cultural intelligence by working with a more diverse group of stakeholders.
What impact would this change have on prior periods : Mills Inc. purchased patent in January of 2015 for $72,000 and chose to amortize the patent over its useful life of 20 years. What impact would this change have

Reviews

len3166843

6/16/2022 11:14:12 PM

Please kind go through the files and solve the questions correctly. The assignments due tomorrow evening. Please let me know if i can get it. Thanks

Write a Review

Computer Network Security Questions & Answers

  Determining the variable zipcode

Write some code that assigns True to a variable duplicates if there are two adjacent elements in the list that have the same value, but that otherwise assigns False to duplicates otherwise. In order to accomplish this, you may, if you wish, use o..

  Describe situation that can cause breach of network security

Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings. Determine one situation that can cause a breach of network security.

  What is ip address and tcp port number used by your client

CPS 470/570- What is the IP address and TCP port number used by your client computer (source) to transfer the file to gaia.cs.umass.edu? What is the IP address and port number used by gaia.cs.umass.edu to receive the file.

  Watch the video - global conference on cyber space

How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

  Analyzing and preventing network attacks

Create an After-Action Report for management that describes how this type of attack could have occurred - etermine and explain security measures

  Design the appropriate security to prevent unwanted traffic

Your company just recently installed new routers onto the network and has asked you to design the appropriate security to prevent unwanted traffic.

  Describe three basic types of network topologies

Describe three basic types of network topologies and provide a sample diagram of each type

  Identify type of ddos attack

BN203-identify type of DDoS attack and justify in detail how this attack will affects the Victims workstation-Discuss atleast two solutions.

  Do you have any experience with pci

Do you have any experience with PCI? Have you worked for an organization that dealt with PCI? HIPAA? SOX? What's your perspective on "compliance" versus "security" or risk reduction?

  What assets are important for you to protect

SIT 182 - Real World Practices for Cyber Security Assignment. You are the in-charge of Myki central sever at Melbourne. What assets important for you to protect

  How can mls be implemented in an rbac system

In general terms, how can MLS be implemented in an RBAC system? Describe each of the possible degrees of granularity possible with an MLS database system.

  How does a password or authentication relate to cia triad

In these weeks readings, we learned about the CIA Triad and how each exhibits dependance on the other. Give examples of how failure of one security property

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd