Reference no: EM132333008
1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.
2. Is it a good practice to include the account or user name in the password? Why or why not?
3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality?
4. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain?
5. When granting access to network systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend implementing to maximize CIA of production systems and data?
6. In the Access Controls Criteria table, what sharing changes were made to the MGRfiles folder on the TargetWindows01 server?
7. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01 server to allow ShopFloor users to read/write files in the C:\LabDocuments\SFfiles folder?
8. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01 server to allow HumanResources users to access files in the C:\LabDocuments\HRfiles folder?
9. Explain how CIA can be achieved down to the folder and data file access level for departments and users using Active Directory and Windows Server 2012 R2 access control configurations. Configuring unique access controls for different user types is an example of which kind of access controls?
Linux implementation proposal
: Linx, LLC has a new research and development group called LSDG. All systems in LSDG will run the Linux operating system and will access resources,
|
Traditional risk management and enterprise risk management
: What do you think is the difference between traditional risk management and enterprise risk management?
|
Is non-repudiation an important property for SCADA
: Is non-repudiation an important property for SCADA?
|
Does this represent an effective risk management program
: What represents the key success factors of the program? Does this represent an effective risk management program? If not, what is missing?
|
User password definitions to maximize confidentiality
: To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality?
|
Separate engineering management systems
: Assume that An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems
|
Gear presentation
: Frederick Jackson, one of the owners of Sports Gear, believes it is important to stress sports safety. Construct a solution in which some components are unclear
|
Which access control permissions allow you to change files
: Why would you add permissions to a group instead of the individual? Which access control permissions allow you to change files and/or folders?
|
Separate means of delivering essential services
: In today's world, both government and private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services
|