Top-Rated Free Essay

Nt2580 Lab 3: Enabling Windows Active Directory and User Access Controls

Satisfactory Essays
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

Lab #3 – Assessment Worksheet
Enabling Windows Active Directory and User Access Controls
NT2580
Course Name and Number: _____________________________________________________
Mark Henry Salvador
Student Name: ________________________________________________________________
Brockman
Instructor Name: ______________________________________________________________
10/07/2014
Lab Due Date: ________________________________________________________________

Overview
In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the
Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server.
Lab Assessment Questions & Answers
1. What are the three fundamental elements of an effective security program for information systems?
Identification, Authentication, Authorization

2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?
Authentication and Access Control

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

2
3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?
List Folder Contents - Security Policy based control

4. What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access?
Group Policy Editor

5. What is two-factor authentication, and why is it an effective access control technique?
Two Factor uses two of the three authentication types; knowledge, ownership, characteristic.

6. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.
Create security principals in the Active Director domain partition

7. Is it a good practice to include the account or user name in the password? Why or why not? Not a good idea because it creates easy keywords to hack or decode your account.

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

3 | Lab 3: Enabling Windows Active Directory and User Access Controls
8. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain?
Non domain machines cannot access shared folders

9. When granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented to maximize CIA of production systems and data?
Establish a limited account for access to only what they need, make them sign user and non-disclosure agreements. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

You May Also Find These Documents Helpful

  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    an effective access control solution for information systems? Identification, Authentication, and Authorization 2. What two access controls can be setup for a Windows Server 2003 folders and authentication? Authentication and Access control. 3. lf you can browse a file on a Windows network share but are not able to copy it or modify it what type of access controls and permissions are probably configured? What type of Access Control would best describe this access control situation? List…

    • 321 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    nt2580 lab 6

    • 1092 Words
    • 5 Pages

    Lab #6 – Assessment Worksheet Perform Business Continuity Plan Implementation Planning Course Name & Number: ______________________________________________________________ Student Name: _______________________________________________________________________ Instructor Name: _____________________________________________________________________ Lab Due Date: _______________________________________________________________________ Overview The instructor will lead the class in discussions pertaining…

    • 1092 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? Threats and vulnerabilities lead risks, if you don’t have then then you don’t have any risk of anyone getting into your network 3. Which application is used for Step #2 in the hacking process to perform a vulnerability assessment scan? That would be Nessus is the application used. 4. Before you conduct an ethical hacking process or penetration test on a live production network…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure  Common security countermeasures…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    Christopher Hammond UNIT 2 ASSIGN 1 NT2580 A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    NT2580: Unit 5 Security Audits and Assessments Nishaka Wickrama Arachchi ITT Technical Institute Torrance NT2580 Fundamentals of Network Security 04/19/2015 Security Audits and Assessments Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. * Authentication failures are one type of security event. A baseline anomalies that may indicate suspicious activity are unauthorized access attempts that can be found within log files. The…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    NT2580 Introduction to Information Security Unit 1 Information Systems Security Fundamentals © ITT Educational Services, Inc. All rights reserved. Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Nt2580 Unit 2 Lab 1

    • 581 Words
    • 3 Pages

    Unit 2: Lab 1: Cost of different cloud services: Amazon: Has a price range of $0.060 per hour on a Linux based system and goes up to $0.155 per hour for a Windows with SQL and Web system. You can purchase a per year upfront cost or stay at a monthly cost. Google: Offers you two pricing options, $5 per user per month or $10 per user per month. The $5 option does not give you any archiving, data retrieval or data discovery and export options. Where the $10 a month per user has those options.…

    • 581 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    Acceptable Use Policy The use of the company network, internet, and email services by Richmond Investments employees is permitted and encouraged where the use supports the goals and objectives of the business. However, Richmond Investments has a policy for the acceptable use of the network, internet, and email services where the employee must ensure that they: * Will follow current laws and regulations * Use of the company network, email and internet in an acceptable manner * Do not create unnecessary…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 610 Words
    • 4 Pages

    50 Lab #3 | Enable Windows Active Directory and User Access Controls Lab #3 – Assessment Worksheet Enable Windows Active Directory and User Access Controls Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab provides students with the hands-on skills needed to create a new Active Directory domain in Windows Server 2003 and demonstrates how to configure a centralized authentication and policy definition for access controls. The Active…

    • 610 Words
    • 4 Pages
    Good Essays