Call us 24/7: + 1(925)399 0085

Get your paper done by an expert

No matter what kind of academic paper you need, it is simple and secure to hire an essay writer for a price you can afford at StudyAcer. Save more time for yourself.

Order A Custom Paper

Approximate price: $

19 k happy customers
8.5 out of 10 satisfaction rate
527 writers active

Enabling Windows Active Directory Essay

In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server.

Lab Assessment Questions & Answers

1. What are the three fundamental elements of an effective security program for information systems?
Identification, Authentication, and Authorization.

2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?
Authentication and Authorization

2 | Lab #3: Enabling Windows Active Directory and User Access Controls

3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what types of access controls and permissions are probably configured? Read only file type, not Read/Rewritable permissions set by an Adminstrative level atleast

4. What is the mechanism on a Windows server that lets you administer granular policies and permissions on a Windows network using role based access?
Group Policies

5. What is two-factor authentication, and why is it an effective access control technique? “It is a two different type of identification process. Like an ID card and a pin code.”

6. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data. “security details are created in the directory domain”

7. Is it a good practice to include the account or username in the password? Why or why not? ” this is a common starting place for hackers to start when attempting to log in to someonefis account or when trying to use another personfis access.”

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

3 | Lab #3: Enabling Windows Active Directory and User Access Controls

8. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain?
If the user is not granted specific access to the dir by an Admin they will not be able to access it.

9. When granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented to maximize confidentiality, integrity, and availability of production systems and data? “Establish a limited account for access to only what they need, make them sign user and non-disclosure agreements.”

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

Our guarantees

Study Acers provides students with tutoring and help them save time, and excel in their courses. Students LOVE us!No matter what kind of essay paper you need, it is simple and secure to hire an essay writer for a price you can afford at StudyAcers. Save more time for yourself. Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Our Homework Writing Disciplines

With a highly diverse team in almost all academic fields including: