Preview

lab 4

Good Essays
Open Document
Open Document
503 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab 4
Lab #3 - Assessment Worksheet
Enabling Windows Active Directory and User Access Controls
Course Name and Number: Networking Security Fundamentals
Student Name:
Instructor Name: Prof.
Lab Due Date: Overview
In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server.
Lab Assessment Questions & Answers
What are the three fundamental elements of an effective security program for information systems?
Administrative Controls, Technical or Logical Controls, Physical Controls
Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?
Technical and Physical
If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?
The type of access controls and permissions that are probably configured are Modify , Read or Full control.
What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access?
The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.
What is two-factor authentication, and why is it an effective access control technique?
Two-factor authentication is a security process in

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Assignment 1

    • 113 Words
    • 1 Page

    Specifying exceptions to default inheritance of Group Policy. Delegating administration of Group Policy. Evaluating effective policy settings by using Group Policy Modeling. Evaluating the results by using Group Policy Results.…

    • 113 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    Network Access Protection is a new feature in Windows Server 2008 that allows network administrators to specify one or more policies that define the conditions under which network access will or will not be permitted.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When we take a look at the access control list some users have a R by their name which means that they are able to only read the file that they are associated with. Some users with have a W which means that they will be able to actually write and make changes to the file. Some users will have a X which means that they can execute the file. In order to add users to a group a manager, or the company 's system administrator would have to go in and assign individual users to each group.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    2. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 2971 Words
    • 12 Pages

    Share permissions are typically found on a Share Permissions tab, and NTFS permissions are located on a Security tab. All Windows permission systems use the same interface, although the permissions themselves differ.…

    • 2971 Words
    • 12 Pages
    Satisfactory Essays
  • Better Essays

    Group Policy is used to set up configuration settings that can be applied to objects such as…

    • 2298 Words
    • 7 Pages
    Better Essays
  • Good Essays

    File System and Group

    • 788 Words
    • 4 Pages

    In UNIX every file and directory has read, write and execution access modes. These read, write and execution permission is defined by the Owner or the system administrator. These…

    • 788 Words
    • 4 Pages
    Good Essays

Related Topics