Preview

lab 4

Good Essays
Open Document
Open Document
503 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab 4
Lab #3 - Assessment Worksheet
Enabling Windows Active Directory and User Access Controls
Course Name and Number: Networking Security Fundamentals
Student Name:
Instructor Name: Prof.
Lab Due Date: Overview
In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server.
Lab Assessment Questions & Answers
What are the three fundamental elements of an effective security program for information systems?
Administrative Controls, Technical or Logical Controls, Physical Controls
Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?
Technical and Physical
If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?
The type of access controls and permissions that are probably configured are Modify , Read or Full control.
What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access?
The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.
What is two-factor authentication, and why is it an effective access control technique?
Two-factor authentication is a security process in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    5. How will the procedure for defining access controls change after converting to the Active Directory? Access control is administered at the object level by setting different levels of access, or permissions, to objects, such as Full Control, Write, Read, or No Access.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user has been granted Full Control to a NTFS folder on your computer. The user has created all the documents that exist in the folder. Another administrator accidentally adds a permission setting denying the Write permission to that user. The next time that user logs in and opens the file, when they try to save their changes to the file they will notice?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Assignment 1

    • 113 Words
    • 1 Page

    Specifying exceptions to default inheritance of Group Policy. Delegating administration of Group Policy. Evaluating effective policy settings by using Group Policy Modeling. Evaluating the results by using Group Policy Results.…

    • 113 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    4. All permissions and policies will be uniform when Active Directory is employed into the infrastructure. Administrators can change permissions and privileges to meet requirements for that group or department.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is a Network Access Control (NAC) System? Explain its benefits in securing access control to a network.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for high-grade security with manageability in mind. Allowing each user a set of permissions dependent on their group, or role, allows the system admin to more easily monitor security by group; which is perfect for a military network.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    There are two main types of Access Control Lists; access ACLs and default ACLs. The access ACL are file or directory specific whereas the default ACL is associated only with directories. If an access ACL is not active on a file within a directory the file conforms to the rule assigned by the default ACL for that directory. Configuration of access control list can be can be…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    File System and Group

    • 788 Words
    • 4 Pages

    All these accounts are managed by the system administrator (it is a root account). UNIX supports Group Account concept in which a number of user accounts can be combined with certain permissions and policies. Group account controls the file and directory handling and mange permissions to use these files.…

    • 788 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Group Policy is used to set up configuration settings that can be applied to objects such as…

    • 2298 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    2. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.…

    • 403 Words
    • 1 Page
    Satisfactory Essays

Related Topics