This website uses cookies to ensure you have the best experience. Learn more

Lab 5 Assessment Worksheet Essay

692 words - 3 pages

1. What are other available Password Policy options that could be enforced to improve security?
Enforce password history, Maximum password age, Minimum password age, Minimum password length, Password must meet complexity requirements, & Store passwords using reversible encryption.

2. Is using the option to ‘Store passwords using reversible encryption’ a good security practice? Why or why not?
As it stores passwords without encrypting them, it is not good practice because they will be stored in plain text.

3. When should you enable the option to ‘Store passwords using reversible encryption’?
Only when using a program that requires it.

4. Why should you use the ...view middle of the document...

Local security policies only include the Account Policy and Local Policy security areas described above. Security policies defined for domains or OUs can include all security areas. In this scenario the other computers would have to be part of the domain or OU.

6. What sources could you use as a source to perform the MBSA security state?
MBSA will automatically assess missing security updates on target computers based on their access to the live Microsoft Update Web site. If the target computer is also assigned to a WSUS server, the Microsoft Update results are limited to the updates approved by the WSUS server administrator. If the target computer cannot determine its security state based on Microsoft Update and an assigned WSUS server, the offline catalog (Wsusscn2.cab) on the scanning computer is pushed to the target computer to make the security assessment

7. What does WSUS stand for and what does it do?
Windows Server Update Services, enables administrators to manage the distribution of updates and hotfixes released for Microsoft products to computers in a corporate environment. WSUS downloads these updates from the Microsoft Update website and then...

Other Papers Like Lab 5 Assessment Worksheet

Blank Essay

258 words - 2 pages © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date

Monkeys Essay

307 words - 2 pages Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap

Chapter 5

272 words - 2 pages Lab #5 – Assessment Worksheet Performing Packet Capture and Traffic Analysis Course Name and Number: Fundament Information Security ITSY 1300 Student Name: Lace Speiser Instructor Name: John Kidd Lab Due Date: October 13, 2014 Overview In this lab, you used common applications to generate traffic and transfer files between the machines in this lab. You captured data using Wireshark and reviewed the captured traffic at the packet

Information Systems Security

4584 words - 19 pages Microsoft® Baseline Security Analyzer (MBSA) Introduction Deliverables Hands-On Steps 53 53 55 63 64 54 Learning Objectives 53 Evaluation Criteria and Rubrics LAB #4 ASSESSMENT WORKSHEET iii 38351_FMxx.indd iii 8/1/12 12:48 PM iv Contents LAB #5 Perform Protocol Capture and Analysis Using Wireshark and NetWitness Investigator 67 Introduction Deliverables Hands-On Steps 67 67 69 80 81 68 Learning Objectives

: Ab #1 Fundamentals of Information Systems Security

661 words - 3 pages Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Fundamentals of Information Security Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the

Construct A Linux Host Firewall And Monitor For Ip Traffic

665 words - 3 pages text file to your local computer and submit it as part of your deliverables. Assessment Worksheet 131 9 Construct a Linux Host Firewall and Monitor for IP Traffic LAB #9 – ASSESSMENT WORKSHEET Construct a Linux Host Firewall and Monitor for IP Traffic Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you configured the Gufw Ubuntu host IP stateful firewall as an internal service

Lab 1 Performing Reconnaissance and Probing

518 words - 3 pages Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Principals of Information Assurance CIS2350 Course Name and Number: _____________________________________________________ Shane Grogan Student Name: ________________________________________________________________ Timothy Pintello Instructor Name: ______________________________________________________________ Unknown Lab Due Date

Applying Owasp to a Web Security Assessment

589 words - 3 pages Assessment Worksheet Applying OWASP to a Web Security Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the Open Web Application

Lab1

786 words - 4 pages Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) LAB #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and

Assessment 4

600 words - 3 pages Assessment Worksheet Applying OWASP to a Web Security Assessment Web Security Management COM-545 Course Name and Number: _____________________________________________________ Plinio Alves Student Name: ________________________________________________________________ Manh Nguyen Instructor Name: ______________________________________________________________ 10/30/15 Lab Due Date

Is404 Week 1 Lab

1109 words - 5 pages Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group

Related Essays

Is3110 T Lab 2 Assessment Worksheet Essay

954 words - 4 pages Lab #2 Assessment Worksheet Align Risks, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls 1. a. Unauthorized access from public internet - HIGH b. User destroys data in application and deletes all files - LOW c. Workstation OS has a known software vulnerability – HIGH d. Communication circuit outages - MEDIUM e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization

Is3230 Lab 6 Assessment Worksheet Essay

733 words - 3 pages Lab 6 Assessment Worksheet 1. What are the available password policy options that could be enforced to improve security in a group policy object? * Enforce password history, Maximum password age, Minimum password age, Minimum password length, and Passwords must meet complexity requirements 2. How would you set security permission and user access rights on a home computer using windows XP professional or similar that is not a member

Nt2580 Lab 1 Nt2580 Lab 1 Lab #1 Assessment Worksheet

599 words - 3 pages A network is a group of computers (often called nodes or hosts) that can share information through their interconnections. A network is made up of the following components: Computer systems (nodes or hosts). Network devices that enable connectivity (such as hubs, switches, and routers). The transmission medium provides a path for electrical signals between devices. Network interfaces are devices that send and receive electrical signals

Lab 5 Assessment Questions & Answers

737 words - 3 pages . 4. Why is it important to prevent users from engaging in downloading or installing applications and software found on the Internet? There are hundreds of malicious programs that can cause damage to computers and information on the computers. They can also slow down machine, and they might even use the computer to spread themselves to entire organization. 5. When trying to combat software vulnerabilities in the Workstation Domain, what is