NT2580 Lab 4: Using Group Policy Objects and MBSA for Change Control

Satisfactory Essays
Lab 4 It255

1. Define why change control management is relevant to security operations in an organization?

Change control is a systematic way to approaching change. Within an organization, it can prevent the possibility of services becoming interrupted and if so, provide a plan to bring them back up as soon as possible.

2. What type of access control system uses security labels?

Label-base access control (LBAC)

3. Describe two options you would enable in a Window’s Domain password policy?

Minimum password length and password complexity requirements

4. Where would patch management and software updates fall under in security operations and management?

Monitoring, Tracking, Testing

5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system.

Account lockout duration and threshold

6. What are some Password Policy parameter options you can define for GPOs that can enhance the C-I-A for system access?

Minimum password length, maximum password age, password must meet complexity requirements, and store passwords using reversible encryption

7. What sources you use as a source to perform the MBSA security state?

Computer by Name or IP and multiple Computers by Domain or IP Range

8. What does WSUS stand for, and what does it do?

Windows Server Update Service and it downloads Microsoft updates to a single server and deploys them

9. What is the difference between MBSA and Microsoft Update?

MBSA scans for security vulnerabilities while Microsoft update checks the Microsoft database for available updates. They are two totally different tools.

10. What are some of the options that you can exercise when using the MBSA tool?

You can check for Windows administrative vulnerabilities and for security updates

You May Also Find These Documents Helpful

  • Good Essays

    NT 2580

    • 520 Words
    • 3 Pages

    targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? a. Yes it did b. Four 4. If you ping the “WindowsTarget02” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-replies vary? a. There is no variations 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a…

    • 520 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    100 NT 2580 U2A1

    • 465 Words
    • 2 Pages

    Calculate the Window of Vulnerability First, what is the definition of Window of Vulnerability (WoV)? According to www.techopedia.com, an IT dictionary and more for the IT word, the definition states that “vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. Vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.”¹ To calculate…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1210 Lab 4

    • 667 Words
    • 3 Pages

    NT1210 Chapter 4 Lab 4.1.1 Why are standards so important for NICs, connectors, and media? Use your textbook and Internet research to justify your answer. Standards are put in place to make everything work together error free. Because Stability, Consistency, Minimization of packet errors. 4.1.2 The voltage for registering a bit of 1 on Ethernet can be as low as 2.5 volts or even 1 volt. Why is this so low when the capacity for transmitting electricity on the copper wire is so high? Use your…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue one. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    NT1230 introduction to networking | Case Study 3 | Unit 3 | | Brent Keith | 10/5/2011 | Rocki | Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    nt 1230 lab

    • 493 Words
    • 3 Pages

    Lab 1 Worksheet Preparing a Virtual Workstation Image This lab contains the following exercises: Exercise 1.4 Creating an ISO Image from Windows 7 Installation Media Exercise 1.1 Creating a Windows 7 Virtual Appliance Exercise 1.2 Working with Disks Exercise 1.3 Exploring Windows 7 Estimated lab time: 120 minutes Exercise 1.4 Creating an .iso Image From Windows 7 Installation Media Overview Carrying around installation media for repairs and installations can become cumbersome…

    • 493 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Eric Buzzard NT2520 5-19-2013 Unit 7 Assignment 2: Design an Encryption Strategy Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 2640 Unit 4

    • 277 Words
    • 2 Pages

    100 OSPF 110 IS-IS 115 RIP 120 EGP 140 ODR 160 External EIGRP 170 Internal BGP 200 Unknown* 255 Juniper How Route is Learned Default Preference Statement to Modify Default Preference Directly connected network 0 --------- System routes 4 --------- Static 5 Static MPLS 7 MPLS preference in the JUNOS MPLS Applications Configuration Guide LPF 8 LDF preference in the JUNOS MPLS Applications Configuration Guide LDP 9 LDP preference in the JUNOS MPLS Applications Configuration Guide…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 4 for NT 1310Cabling -Definitions 1. Horizontal cable: The wiring/cabling between the telecommunications outlet/connector and the horizontal cross-connect. 2. Backbone Cable: Backbone Cabling is the inter-building and intra-building cable connections in structured cabling between entrances. 3. Patch Cords: Insulated cord with a plug at each end, for use with a patch panel. 4. Connectors: Cable connectors are devices for keeping two parts of an electric circuit in contact. 5…

    • 836 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Lab 4 Part 1: 10 points Assignment: Create an Internet and E-mail Acceptable Use Policy Learning Objectives and Outcomes Research and compare Internet and e-mail use policies enforced by other organizations. Create an Internet OR e-mail use policy for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a…

    • 451 Words
    • 2 Pages
    Satisfactory Essays