Unit 2 Assignment 2

Satisfactory Essays
Unit 2 Assignment 2: Microsoft Environment Analysis

1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry.
2737111
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange.
2755801
Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones. Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security

You May Also Find These Documents Helpful

  • Better Essays

    Unit 2 Assignment 2

    • 711 Words
    • 3 Pages

    BUSINESS ADMINISTRATION LEVEL 2 - TECHNICAL CERTIFICATE Unit 2 – assignment 2 1. Understand how to make and receive calls 2.1 Describe the different features of telephone systems and how to use them.• Call holding- places a caller on hold so you can undergo another duty. This could be to find paperwork, find client/customer details, retrieve information from another member of staff or contact another colleague to divert the call along to. • Call waiting- lets you know when…

    • 711 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    UNIT 2 Assignment 2

    • 1272 Words
    • 6 Pages

    Unit 2 Assignment 2: Computer Basics Review 1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server 3. According to the chapter, which of the following concepts happens…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    Michael Sherman IS3120 Unit 2 Assignment 2 The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Unit 2 Assignment 2 Global Limited has the reputation as one of the world’s leading providers of infrastructure information systems, software, and services around the world. Global’s clients range from world-wide enterprises to startup companies across all industry sectors, including financial services, manufacturing, transportation, and public services. Information is an organization’s most valuable asset, yet traditional security practices have either not provided adequate protection of information…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    Unit 2 Assignment 2: Vulnerability of a Cryptosystem 1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 2 Assignment 2

    • 1761 Words
    • 6 Pages

    Unit 2 Assignment 2 1.1 Analyse the role and use of initial and diagnostic assessment in agreeing individual learner goals During my role as a trainer it is important that each new learner has a starting point from where to commence the training. This can be found by the use of initial assessment procedure. Initial assessment is a vital link to the learning process, it is a formal and informal process that identifies each learners starting point. It helps to identify learner’s current levels of…

    • 1761 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 340 Words
    • 2 Pages

    Internet Explorer could allow Information Disclosure. Windows XP 975497 CVE-2009-3103: Vulnerabilities in SMB could allow remote code execution. Windows Vista Service Pack 1 and 2 98343 CVE-2010-0817: Vulnerability in SharePoint could allow elevation of privilege. Microsoft SharePoint Version 2.0 2. Only two from the five listed in question one are privileged elevation. 2264072 CVE-210-1886 and 98343 CVE-210-0817. They are of importance but not considered a high priority issue.…

    • 340 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    An access control policy should be established, documented and periodically reviewed, based on business needs and external requirements. Access control policy and associated controls should take account of: - Security issues for particular data systems and information processing facilities, given business needs, anticipated threats and vulnerabilities; - Security issues for particular types of data, given business needs, anticipated threats and vulnerabilities; - Relevant legislative, regulatory…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    unit 2 assignment 2

    • 506 Words
    • 3 Pages

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server. Determining where to place DCs/DNS servers isn’t always straight-forward. However, as a rule of thumb, I take the view that any branch location that’s going to be utilize Active Directory services (authentication, file services, etc), benefits…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 2 assignment

    • 15807 Words
    • 77 Pages

    NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes…

    • 15807 Words
    • 77 Pages
    Satisfactory Essays