Top-Rated Free Essay
Preview

Lab Assessment: Password Policy and MBSA Scan

Satisfactory Essays
365 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab Assessment: Password Policy and MBSA Scan
Overview
In this lab, you used group policy objects to create a minimum password length password policy and link it to the newly created domain from the previous lab. You also ran the Microsoft® Baseline Security Analyzer
(MBSA) and reviewed the results of the MBSA scan.

Lab Assessment Questions & Answers 1.
Describe two options you would enable in a Windows Domain password policy.

minimum password length set and password that has to have numbers, upper and lowercase, and symbols 2. there a setting in your GPO to specify how many logon attempts will lock out an account? Name two
Is

parameters that you can set to enhance the access control to the system. yes there is, you can set where the user has to change their password every 30 days and have security questions

4 system access? make sure they have at least one number, one uppercase, and lowercase, maybe add a character. don't use a common password that anyone could guess, don't use personal information either. dont use any old passwords you may have used in the past as well

37609_LB04_Pass5.indd 65

Configure Group Policy
Objects and Microsoft® Baseline
Security Analyzer (MBSA)

3.
What are some password policy parameter options you can define for GPOs that can enhance the CIA for

23/04/13 11:01 AM

66

Lab #4 | Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) 4. If the virtual lab had direct Internet access, from what sources could you use as a source to perform the MBSA security state?

can always go to the Microsoft update website through the internet

5.
What does WSUS stand for, and what does it do?

Windows Server Update Service and downloads updates for microsoft

6.
What is the difference between MBSA and Microsoft® Update?

Microsoft update checks for updates for the any Microsoft updates are available while MBSA scans for security vulnerabilities in Microsoft

7.
What are some of the options that you can exercise when using the MBSA tool?

you can check for security updates and administrative vulnerabilities

8.
Describe why change control management might be relevant to security operations in an organization.

change control can prevent possibility of services being interrupted, this allows you to plan so no service is interrupted. it documents where changes are made

You May Also Find These Documents Helpful

  • Satisfactory Essays

    5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system.…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3

    • 606 Words
    • 3 Pages

    According to my site coordinator she feels as if data security is doing well. She stated that feels this way because the data security makes it hard to get into the system but does not make it difficult to get out. One area she would like to see improvement in is shorter log off times. For example, if an employee walks away from the computer and patient information is still displayed she would like to see a warning appear after 3 minutes of idle time warning that the information will be closed unless clicking the warning box.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Solution: Create a recurring change of passwords, say once every few months, for your company. Have the passwords require a combination of numbers and letters, as well as a special character.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The password for a user can be set with the PASSWORD clause of the CREATE USER command.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The type of access controls and permissions that are probably configured are Modify , Read or Full control.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    4. What is the mechanism on a Windows Server where you can administer granular policies and…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    • Establish user ID and password policies requiring periodic changes (i.e., every 30 or 60 days). Passwords must be…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 John Pham

    • 2319 Words
    • 10 Pages

    The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called contoso.com. The computers required for this lab are listed in Table 2-1.…

    • 2319 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Security Interview

    • 1458 Words
    • 5 Pages

    Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II.…

    • 1458 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    7. What is the PASS_MIN_DAYS setting? Min days until you have to change the password…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Max and Min

    • 464 Words
    • 2 Pages

    Save all these passwords in your browser because it will be a HUGE pain to type them in every time you need them.…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Literature Review

    • 657 Words
    • 2 Pages

    Data breaches and cyber-attacks are a major issue and yet things such as password security are still too weak. Making a password for websites and accounts is unavoidable. People mix up their passwords and often times make them easy so they can remember them. Unfortunately, this is a huge mistake. Passwords need to be complex, they need to have lower case and capital…

    • 657 Words
    • 2 Pages
    Good Essays