Why is this setup not secure, Computer Network Security

Assignment Help:

Question:

a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and telephone number properties of the user object representing yourself. However, the New User command is unavailable to you. What is the most likely explanation?

b) You enable the password complexity policy for your domain under Windows Server 2003. Describe the requirements for passwords, and when those requirements will take effect.

c) A user has forgotten his or her password and attempts to log on several times with an incorrect password. Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The message suggests that the user contact an administrator. What must you do?

d) If your environment consists of two domains, one Windows Server 2003 and one Windows NT 4, what group scopes can you use for assigning permissions on any resource on any domain-member computer?

e) (i) On the network you administer, you maintain a primary DNS server authoritative for the zone lucernepublishing.com under windows Server 2003. You have also deployed two caching-only servers that forward all requests to the primary server. If most of the name queries directed toward the caching-only servers is for names within the lucernepublishing.com domain, which parameter can you modify on the primary server to decrease DNS query traffic between the caching-only servers and the primary server?

(ii) Under what conditions is it not considered secure to host a DHCP server on a domain controller? Why is this setup not secure?


Related Discussions:- Why is this setup not secure

Explain characteristics of associative memory networks, (a) Describe the pr...

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

Explain about structure of management information, Question 1 a) What is a...

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Sending an arp message, Normal 0 false false false EN-U...

Normal 0 false false false EN-US X-NONE X-NONE

Network intrusion system, In this work a network intrusion system (package)...

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

Develop a completely secure wsn based on the triple key, Q. Develop a compl...

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

Calculate the total latency, Question (a) Inspect the following ifconfi...

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Types of idss and detection methods, Types of IDSs and Detection Methods ...

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

Half-duplex and full-duplex mode of transmission, Question: a. State br...

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Calculate the minimum sampling rate, QUESTION An analog sensor is used...

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

What are the main objectives of a risk analysis, QUESTION 1 Risk ana...

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd