Why is this setup not secure, Computer Network Security

Assignment Help:

Question:

a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and telephone number properties of the user object representing yourself. However, the New User command is unavailable to you. What is the most likely explanation?

b) You enable the password complexity policy for your domain under Windows Server 2003. Describe the requirements for passwords, and when those requirements will take effect.

c) A user has forgotten his or her password and attempts to log on several times with an incorrect password. Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The message suggests that the user contact an administrator. What must you do?

d) If your environment consists of two domains, one Windows Server 2003 and one Windows NT 4, what group scopes can you use for assigning permissions on any resource on any domain-member computer?

e) (i) On the network you administer, you maintain a primary DNS server authoritative for the zone lucernepublishing.com under windows Server 2003. You have also deployed two caching-only servers that forward all requests to the primary server. If most of the name queries directed toward the caching-only servers is for names within the lucernepublishing.com domain, which parameter can you modify on the primary server to decrease DNS query traffic between the caching-only servers and the primary server?

(ii) Under what conditions is it not considered secure to host a DHCP server on a domain controller? Why is this setup not secure?


Related Discussions:- Why is this setup not secure

Threat identification-risk management, Threat Identification After ident...

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Systems development life cycle security-information security, The Role of t...

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Collision, COLLISION: The receiver can get simultaneous requests, which gi...

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

Packet sniffers, PACKET SNIFFERS A packet network protocol analyzer is a...

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Udp- datagram transport service, UDP- DATAGRAM TRANSPORT SERVICE INT...

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

Explain the rsa algorithm, Question: (a) What is the minimum length of...

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Locality of reference , LOCALITY OF REFERENCE PRINCIPLE:  Principle of...

LOCALITY OF REFERENCE PRINCIPLE:  Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows: a) Spatial loca

Ip address, How to find an ip address?

How to find an ip address?

Security clearances-information security, Security Clearances For a secu...

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

Describe types of communication impairments, Question : (a) "Pulse Code...

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd