top-rated free essay

Nt2580 Lab 3

By Mark Henry-Salvador Oct 07, 2014 506 Words
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

Lab #3 – Assessment Worksheet
Enabling Windows Active Directory and User Access Controls
NT2580
Course Name and Number: _____________________________________________________ Mark Henry Salvador
Student Name: ________________________________________________________________ Brockman
Instructor Name: ______________________________________________________________ 10/07/2014
Lab Due Date: ________________________________________________________________

Overview
In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server.

Lab Assessment Questions & Answers
1. What are the three fundamental elements of an effective security program for information systems?
Identification, Authentication, Authorization

2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?
Authentication and Access Control

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

2
3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? List Folder Contents - Security Policy based control

4. What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access? Group Policy Editor

5. What is two-factor authentication, and why is it an effective access control technique? Two Factor uses two of the three authentication types; knowledge, ownership, characteristic.

6. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. Create security principals in the Active Director domain partition

7. Is it a good practice to include the account or user name in the password? Why or why not?
Not a good idea because it creates easy keywords to hack or decode your account.

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

3 | Lab 3: Enabling Windows Active Directory and User Access Controls 8. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain?

Non domain machines cannot access shared folders

9. When granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented to maximize CIA of production systems and data?

Establish a limited account for access to only what they need, make them sign user and non-disclosure agreements.

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

Cite This Document

Related Documents

  • Lab 3 nt2580

    .... What are the three fundamental elements of an effective access control solution for information systems? Identification, Authentication, and Authorization 2. What two access controls can be setup for a Windows Server 2003 folders and authentication? Authentication and Access control. 3. lf you can browse a file on a Windows network s...

    Read More
  • Lab #3

    ...50    Lab #3   |  Enable Windows Active Directory and User Access Controls Lab #3 – Assessment Worksheet Enable Windows Active Directory and User Access Controls Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab provides students with the hands-on skills needed to create a new Ac...

    Read More
  • LAB 3

    ... Lab 3: Enable Windows Active Directory and User Access Controls 1. What are the three fundamental elements of an effective access control solution for information systems? Identification, Authentication and Authorization 2. What two access controls can be set up for Windows Server 2003 folder and authentication? Authentication and A...

    Read More
  • NT2580 Lab 2

    ... 1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application. It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running. 2. What is the relationship between risks, threats and vulnerabilities as it perta...

    Read More
  • SCI203 Phase 3 Lab Report

    ... SCI203 Phase 3 Lab Report Sources of CO2 Emissions Sharon Patton June 8, 2015 Colorado Technical University Purpose The purpose of this report is to determine the increase or decrease in CO2 emission over the past 40 years. Showing that human activity is the reason for the altering of the CO2 emissions to the earth. Res...

    Read More
  • LAB 3

    ... Lab #3: Assessment Worksheet Lab Assessment Questions: What is the goal or objective of an IT risk management plan? A list of threats A List of vulnerabilities Costs associated with risks A list of recommendations to reduce the risks Costs associated with recommendations A cost-benefit analysis One or more reports What are the five...

    Read More
  • Lab 3

    ... 2251710-308610 PUSAT PENGAJIAN DIPLOMA LABORATORY REPORT YEAR / PROGRAM 1 DAT COURSE CODE/NAME DAT10303 BASIC OPERATING SYSTEM LAB No.– TITLE LABSHEET 3 – DIRECTORY STRUCTURE LAB DATE 27 OCT 2014 No. NAME MATRIC No. SECTION 1 ABDUL AZIZ BIN ABDUL HADI AA 140914 4 2 MU AHMAD UWAIS A...

    Read More
  • Lab 3

    ...Lab 3 Caloric Expenditure Anishka Bagla EXSC 205 Lab 12:00 - 13:50 Thursday Instructor: Tamara Espinet Purpose The purpose of this lab is to gain knowledge and understanding of the scientific principle of RER, using indirect calorimetry to measure caloric expenditure, including the caloric equivalent and to ...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.