In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts ...view middle of the document...
If you can browse a file on a Windows network share, but are not able to copy it or modify it, what types of access controls and permissions are probably configured?
4. What is the mechanism on a Windows server that lets you administer granular policies and permissions on a Windows network using role based access?
5. What is two-factor authentication, and why is it an effective access control technique?
6. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data.
7. Is it a good practice to include the account or username in the password? Why or why not?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
Student Lab Manual
3 | Lab #3: Enabling Windows Active Directory and User Access Controls
8. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain?
9. When granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented to maximize confidentiality, integrity, and availability of production systems and data?