Preview

Lab 1 Essay Example

Good Essays
Open Document
Open Document
504 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 1 Essay Example
LAB #1 - Assessment Worksheet
1) What does DACL stands for and what does it mean?
DACL is a list of Access control entries; it defines access control for users and groups.
2) Why would you add permissions to a group instead of the individual? What policy definition do you think is required to support this type of access control implementation?
When adding permissions to a group it makes it easier for a large organization and just set up the access for the departments, or job roles. Creating GPO is best use for this job.
3) List the 5 different access control permissions that can be enabled on user folders and data within a Microsoft Windows Server.
Full Control, Modify, Read & Execute, Read, Write, Special permissions.
4) What is the lowest level of permission you can enable for a user who must view the contents of a folder and its files? Why is this type of permission necessary?
Read permission, this permission is necessary to allow the user of a group to get information of another department in the business.
5) What are other available Password Policy options that could be enforced within a Microsoft Windows Server to improve security?
Under account options you can have the user either change and make their own password upon next logon, make it so they cannot change the password unless allowed to by admin, make the password expire or not, and enable reversible encryption.
6) Is using the option to Store passwords using reversible encryption a good security practice? Why or why not? When should you enable the option to Store passwords using reversible encryption?
It is known as not a normal practice, it is used for applications or programs to read the users password for permission to use. It stores the password as plain text, and used in last resort situations where there is no need to protect the password or other options are outweighed for risk.
7) What’s the difference between a Local Group Policy and a Domain Group Policy?
Local Group Policy;

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    4. You are managing a Windows Server 2008 Standard edition which has the File Server role added. You explicitly gave a user “Modify” access to a file. However, when this user tried to append data to that file, he got access denied message. What might be the problem?…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    6. Enabling Store Passwords Using Reversible Encryption determines whether Windows stores passwords using reversible encryption. Enabling this is essentially the same as storing passwords in plain text which is insecure and not recommended.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    7. In terms of file or directory permissions, what does U-G-O stand for? User Group Other What are the 3 permission that can be given to a file or directory? r=read w=write x=execute…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    Next, if the software installed did indeed discover the password over the wire and was able to crack it then two changes need to be made. The first is that the password should be sent over the wire in an encrypted format and should be encrypted via current accepted encryption algorithms, such as AES at the date of this document's creation. The second change would be to enforce complex passwords which would be at least one capital letter, one lower case letter, numbers, special characters, and more than 8 characters.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such…

    • 599 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    1. What is the term used to describe a read-only copy of a user profile stored on a network share? Mandatory Profile.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is a Network Access Control (NAC) System? Explain its benefits in securing access control to a network.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    16. User access refers to what objects and data in a database a user has permission to use.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Database Sql Server

    • 328 Words
    • 2 Pages

    User access refers to what objects and data in a database a user has permissions to use. True…

    • 328 Words
    • 2 Pages
    Satisfactory Essays