Preview

Active Directory and Access Controls

Satisfactory Essays
Open Document
Open Document
263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Active Directory and Access Controls
1. What two access controls can be setup for a Windows Server 2003 folders and authentication?
Authentication and Access control.
2. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?
Folder Contents. Read access only
3. 4. What is the mechanism on a Windows Server where you can administer granular policies and permissions on a Windows network using role-based access?
Group Policy Editor
4. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. creates security principals in the Active Directory domain partition
5. Would it be a good practice to include the account or user name in the password? why or why not.
No it wouldn’t be good practice to include account or username in the password, it would make it easier to break the password using brute-force dictionary attack
6. Can a user who is defined in the Active Directory access a shared drive if that user is not part of the domain?
Non domain machines cannot access domain shared folders
7. Can a user who is defined in the Active Directory access a shared drive if that user is not part of the domain?
Non domain machines cannot access shared folders
8. Using what you know about access controls, what security controls would you recommend when granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.) that will maintain CIA of production systems and data?
Read only permissions with limited access

You May Also Find These Documents Helpful

  • Good Essays

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users. This…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    Login as Mikexxx with his assigned password (you need to know how to login as a new user).…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    Network Access Protection is a new feature in Windows Server 2008 that allows network administrators to specify one or more policies that define the conditions under which network access will or will not be permitted.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    COMP 230 WK 1 7 QUIZ

    • 2401 Words
    • 33 Pages

    (TCO 1) Which one of the following Windows NET commands will allow other computers to access the C:\Data directory under the share nameUserData?…

    • 2401 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. P102…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control?…

    • 718 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. Active Directory uses __________ relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks.…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Chapter 17 WOS review

    • 627 Words
    • 3 Pages

    If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.…

    • 627 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    2. Given a scenereo where there are 5 database admins that may periodically need access to a given system. Discuss a better concept to better manage the admins access permissions.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    While managing applications in distributed environments, you need to secure the network applications from unauthorized access by applying the security policies and restriction levels. Applying security policies and restriction for the applications will enable you to control access to the applications and prevent data from being modified by unauthorized users. In this topic, you will set up security policies and restrictions.…

    • 10897 Words
    • 44 Pages
    Powerful Essays