Preview

Lab 3 nt2580

Good Essays
Open Document
Open Document
321 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 3 nt2580
. What are the three fundamental elements of an effective access control solution for information systems? Identification, Authentication, and Authorization
2. What two access controls can be setup for a Windows Server 2003 folders and authentication?

Authentication and Access control.
3. lf you can browse a file on a Windows network share but are not able to copy it or modify it what type of access controls and permissions are probably configured? What type of Access Control would best describe this access control situation?
List Folder Contents – Security Policy based control.

4. What is the mechanism on a Windows Server where you can administer granular policies and permissions on a Windows network using role-based access?
Group Policy Editor

5. What is two-factor authentication and why is it an effective access control technique?
Two Factor uses two of the three characteristics in Authentication types (Knowledge, Ownership, Characteristics)
6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve C-1-A for departmental LANs, departmental folders, and data. creates security principals in the Active Directory domain partition

7. Is it a good practice to include the account or user name in the password? Why or why not?
It is not a good idea to have a user name in the password, because it easy for people can try to hack or decode the password.

8. Can a user who is defined in the Active Directory access a shared drive if that user is not part of the domain? Non domain machines cannot access shared folders.

9. Does Windows Server 2003 require a user's login/password credentials prior to accessing shared drives? Yes – Credentials are required.

I 0. When granting access to LAN systems for GUESTS (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented in order to maximize CI-
A of production systems and data?

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    5. How will the procedure for defining access controls change after converting to the Active Directory? Access control is administered at the object level by setting different levels of access, or permissions, to objects, such as Full Control, Write, Read, or No Access.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    4. Which among the following is the best reason to define security groups while configuring access…

    • 1651 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user is given Read permission to a file stored on a NTFS formatted volume. The file is then copied to a folder on the same NTFS formatted volume where the user has been given Full Control permission to that folder. When the user logs on to the computer holding the file and accesses its new location via a drive letter what is the user’s effective permission to the file?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 266 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Better Essays

    Cisa

    • 12601 Words
    • 51 Pages

    2. An IS auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following controls would BEST mitigate the risk of undetected and unauthorized program changes to the production environment?…

    • 12601 Words
    • 51 Pages
    Better Essays
  • Satisfactory Essays

    Each computer has a set of user accounts. To log on to any computer in the workgroup, you must have an account on that computer.…

    • 518 Words
    • 2 Pages
    Satisfactory Essays