What type of access permissions are probably configured

Assignment Help Computer Engineering
Reference no: EM131152983

Lab- Enabling Windows Active Directory and User Access Controls

Overview

In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server.

Lab Assessment Questions & Answers

1. What are the three fundamental elements of an effective security program for information systems?

2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?

3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?

4. What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access?

5. What is two-factor authentication, and why is it an effective access control technique?

6. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.

7. Is it a good practice to include the account or username in the password? Why or why not?

8. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain?

9. When granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented to maximize CIA of production systems and data?

Reference no: EM131152983

Questions Cloud

Commands will yield the correct answer : Energizer batteries are considered to be very reliable. Only 0.5% of batteries produced are defective. A purchaser would like to know the probability that more than 100 batteries are defective out of a shipment of 20,000 batteries. Which of the fo..
Explain the importance of situating a society cultural : Explain how key social, cultural, and artistic contributions contribute to historical changes. Explain the importance of situating a society's cultural and artistic expressions within a historical context.
Name six policies you could enable in a windows domain : Name six policies you could enable in a Windows Domain. What is the minimum password length enforced by the Password must meet complexity requirements policy?
Sales between the two seasons : The mean sales during the winter months was $995 with a standard deviation of $100. At 0.02 significance level can we conclude there is a difference in sales between the two seasons? Find the p value
What type of access permissions are probably configured : If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?
Find the probability that the mean : The overhead reach distances of adult females are normally distributed with a mean of 202.5 cm and a standard deviation of 8.6cm.a. Find the probability that an individual distance is greater than 212.50cm.
Could americans make such adjustments : How could the surveillance society liberate a culture from antiquated norms or push cultural consensus toward a new morality based on actual harm as opposed to group preferences, opinions or traditions?
Significance level for hypothesis testing : A clothing factory needs to determine whether a new machine was producing a breaking strength of 70 pounds and standard deviation of 3.5 pounds. A sample of 36 pieces revealed a sample mean of 69.7 pounds. Is there evidence that the machine is not..
Amount of cash spent without being aware : Consumers spend of $21 per week in cash without being aware of where it goes. Assume that the amount of cash spent without being aware of where it goes is normally distributed and that the Standard Deviation is $5 a.) What is the probability that ..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Performing calculations through class

Build a class known as Rational for carrying out the arithmetic with fractions. Write down a driver program in order to test your class. Addition of the two Rational numbers. Result of addition must be stored in reduced form.

  Calculate data bandwidth requirements from and to each site

The next three questions relate to voice communications. Note that this topic was not covered in the class, but it is included to encourage self-learning. research, and analysis.

  Requirements for telecommunications planning

Discuss what do you understand by the general estimate requirements for the enterprise telecommunications planning and also explain in detail the cable estimating procedures.

  Discussing the challenges of security

Recognize and discuss one of the challenges of the security and three vulnerabilities that are associated with use of the wireless network.

  Write down a program that has a function named presentvalue

Write down a program that has a function named presentValue

  How important is it to keep the site current

How important is it to keep the site current.According to "Putting Business Online Isn't Always Easy" (2005), "the biggest mistake people make is failing to know the commitment a Web site demands."

  What are the different kinds of storage

What are the different sorts of storage available for a computer system? Regardless of the type of storage used by your computer systems, why would you want to back it up.

  Developing a single neural network

The team member A proposes that you must develop a single neural network which may handle all these stocks. However the member B insists that you have to design the five networks (one for each stock).

  Define the divide-and-average algorithm

The divide-and-average algorithm for approximating the square root of any positive number a is as follows: Take any initial approximation x that is positive, and then find out a new approximation by calculating the average of x and a/x, that is, (..

  Illustrate the operation of count-sort on an array

Design an algorithm (pseudo code) that returns the SECOND largest key value of a Black-Red Tree. In addition, you can use diagrams to demonstrate that your algorithm make sense.

  What is the capacity of a particular airplane sort

You must first determine what entities want to track. Next determine what attributes are needed for each entity, and what relations exist between these entities. You should draw an E-R diagram to show these relations. Be sure to indicate all keys...

  Explain the following hypothetical scenario

The new CIO and his biker buddy COO decide to form a Steering Committee to clean up the mess. They involve the key decision makers from their respective organizations and get the commitment from Senior VP of Marketing. The CIO and COO make it clea..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd