Reference no: EM131188418
Lab: Implementing an Information Systems Security Policy
Overview
In this lab, you acted as a member of the network security team. You were given an assignment to implement two security standards that have been accepted by the organization. First, you enforced a newly adopted corporate password policy using the Group Policy Management console. Additionally, you joined a standalone Linux machine to the Active Directory domain using an open source tool, PowerBroker Identity Services Open.
Lab Assessment Questions & Answers
1. What is the correct command syntax to force GPO settings?
a. /force GPO
b. gpupdate /now
c. gpupdate /force
d. policyupdate /force
2. Why is it important to set a strict password policy as part of your security template?
3. Why is it important to bring standalone systems into the Domain?
4. What was the command line syntax to connect as the root user to 172.30.0.11 using PuTTY?
5. Name five different Windows password policies.
Question regarding the leadership style
: In this unit, you will explore opposing leadership styles found in managers. Likewise, you will explore your leadership style and how you can use your unique skills to effectively manage a healthcare environment.
|
What is the resultant force from the three forces
: What is the resultant force from the three forces. Please show step by step and all work.
|
Compare relative age dating with radiometric dating
: Compare and contrast relative age dating with radiometric dating.- What are the strengths and limitations (if any) of each?
|
Indicate which of these groups it primarily represents
: Three groups that participate in the process of establishing GAAP are users, preparers, and auditors. These groups are represented by various organizations. For each organization listed below, indicate which of these groups it primarily represents..
|
Why is it important to bring standalone systems into domain
: Why is it important to bring standalone systems into the Domain? What was the command line syntax to connect as the root user to 172.30.0.11 using PuTTY?
|
Numerical risk analysis for full points
: Provide an analysis of a company's risk tolerance and risk exposure. Include the impact this tolerance and exposure may have on potential outcomes. Be sure to include a numerical risk analysis for full points. The numerical portion can be as simpl..
|
How did you select the companies for your portfolios
: How did you select the companies for your portfolios? You don't have to give a list of every company and why, it should be in general. The detail should be in the appendix. You need to make reference to the technical theories you have used and jus..
|
What is the frequency of the allele for cystic fibrosis
: Cystic fibrosis is an autosomal recessive condition. The frequency of cystic fibrosis is 0.000484, or about 1 in 2000 people.?What is the frequency of the allele for cystic fibrosis? What percent of people are carriers (heterozygous) for cystic fi..
|
What were the fun activities
: With a group of four or five students, discuss your most recent work experiences in light of whether the employer tried to consciously introduce some fun workplace activities. What were the fun activities? Did they work?
|