This website uses cookies to ensure you have the best experience. Learn more

Unit 2 Assignment 1

559 words - 3 pages

Lab Assessment Questions & Answers

1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data.
Windows Server 2012 Active Directory achieves C-I-A for departmental LANs, departmental folders and data through the two-way authentication and Global Policy Management for secure networking within domains.

2. Is it a good practice to include the account or user name in the password? Why or why not?
It is never a good idea to include the account or user name in the password because it jeopardizes the security of the user and network.
3. What are some of the best practices to enhance the strength of user passwords in order to maximize confidentiality?
Some of the best practices to enhance the strength of user passwords includes using upper ...view middle of the document...


6. When granting access to network systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend implementing to maximize CIA of production systems and data?
The security controls recommended for third party auditing is restricting access to read only so that data is not altered.

7. In the Access Controls Criteria table, what sharing changes were made to the MGRfiles folder on TargetWindows01-DC server?
The MGRfiles were given read and write privileges in the shared folder.

8. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01-DC server to allow Shopfloor users to read/write files in the C:\LabDocuments\SFfiles folder?
The Shopfloor users were given access to read/write files in the C:\LabDocuments\SFfiles folder.

9. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01-DC server to allow Human Resources users to read/write files in the C:\LabDocuments\HRfiles folder?
The Human Resources users were given access to read/write files in the C:\LabDocuments\HRfiles folder.

10. Explain how C-I-A can be achieved down to the folder and data file access level for departments and users using Active Directory and Windows Server 2012 R2 access control configurations. Configuring unique access controls for different user types is an example of which kind of access controls?
Confidentiality, Integrity and Availability (CIA) can be achieved down to the folder and data file access level for departments and users using Active Directory and Windows Server 2012 R2 access control configurations by restricting access within the network to authorized personnel. Thus, restricted access to the network secures the network, making it available to authorized personnel on daily basis. Configuring unique access controls for different user types is an example of Confidentiality Access Control.

Other Papers Like Unit 2 Assignment 1

Level 3 Business Unit 2 Assignment 1

3831 words - 16 pages Task 1 A business keeps various types of financial record to monitor its performance and ensure that taxes are paid. These include cash flow statements, profit and loss accounts and a balance sheet. Profit and Loss Account A trading, profit and loss account shows the business's financial performance over a given time period, e.g. one year. The sales on the profit and loss account are the revenue that the business is receiving from selling

Unit 2 Assignment 2

4236 words - 17 pages Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced

Unit 2 Assignment 1 Cellular Structures and Pathogenicity

999 words - 4 pages Cellular Structures and Pathogenicity Jennifer L. Wethington ITT Technical Institute Unit 2 Assignment 1   “Bacterial illness is a result of complex interactions between bacteria and the host. During evolution, humans developed many ways to protect themselves against bacterial pathogens. On the other hand, bacteria have developed strategies to evade, subvert or circumvent these defenses” (Sousa, 2003) “One of the most important

Unit 2 Ass 1

1670 words - 7 pages Unit 2: Business resources P1: Within this assignment I will be looking into the recruitment documentation needed in a selected organisation. The organisation I will be assessing is Asda. Human Resource Management (HRM) is the function within Asda that focuses on recruitment, management, and providing direction for the people who work in the organization. Human Resource Management can also be performed by line managers. Human Resource

Unit 4 Assignment 1

271 words - 2 pages IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been

Alternative Assignment Unit 1

549 words - 3 pages emails to clarify any questions. Unit 1: It is very important to think why writing matters. What do we try to accomplish by writing? In our day and age, we find that writing includes research, emails, blogs, text…etc we communicate through writing everyday. There are many elements to consider while writing: • Audience: knowing your audience changes the language. • Purpose: reason for writing complaints, catching up with friends, formal writing at work • Context: Considering where this paper or document will be presented, different ways of the writing styles • Writer’s goal: what is the outcome from this writing?

Unit 4 Assignment 1

1067 words - 5 pages 1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of

Unit 1 Assignment

598 words - 3 pages Exercise 2-7 1. Economic entity assumption (45) - (f) indicates that personal and business record keeping should be separately maintained. 2. Going-concern assumption (46) - (d) Rationale why plant assets are not reported at liquidation value. (Do not use historical cost principle.) 3. Monetary unit assumption (46) - (j) assumes that the dollar is the “measuring stick” used to report on financial performance. 4. Periodicity

It520 Unit 1 Assignment

560 words - 3 pages student (identified by a PK) to enroll in 5 courses (identified by a PK for classes) and will not allow any more enrollments. Question 2 Business Rules Database - Unit ONE Database may Track MANY Units [M] ONE Unit can be tracked by ONE Database [1] Database 1:M Units. Question 3 Entity Relationship Diagram Question 4 Primary Key / Foreign Key Placement Entity Set | Primary Key Attribute(s) | Foreign Key Attributes(s) | Publisher

It530 Assignment Unit 1

1422 words - 6 pages create many new features and functionality to make the use of networks and network managements easier. References Amoss, J., & Minoli, D. (2007). Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks (1 ed.). Boca Raton, FL: Auerbach Publication Das, K (n.a.). IPv6.com. What is Mobile IPv6 ? . Retrieved May 6, 2013, from http://www.ipv6.com/articles/mobile/Mobile-IPv6.htm Donaldson, R. (2011, 2). CircleID. DHCP

Unit 1 Assignment 2

372 words - 2 pages The integration of Active Directory & impact with the current Ken 7 Windows Limited environment is that all new users will be created within Active Directory at the Local Group Policy Object (GPO) level. They are assigned to Site GPO’s, Domain GPO’s, & an overall Organizational Unit GPO. The Organizational GPO would be “Ken 7 Windows Limited”, the Domain would be manager (level of authority), Site GPO would be location (state if

Related Essays

Nt2580 Unit 1 Assignment 2

554 words - 3 pages Unit 1 Assignment 2 Impact of a Data Classification Standard Internal use only is information that may or may not be confidential. But is shared within a organization and kept away from the public. With that being said it is imperative that we seek the following to be incorporated within the standards in each domain. User Domain refers to the people who have access to the organizations equipment User domains is the worst domain for security

It500 Unit 2 Assignment 1

1789 words - 8 pages Unit 2: Assignment 1: Global Challenges Associated with E-Commerce December 18, 2012 IT500-01N: Critical Concepts and Competencies for the IT Professional Instructor: Dr. Sheila Fournier-Bonilla Kaplan University Unit 2: Assignment 1: Global Challenges Associated with E-Commerce E-Commerce has changed the ways that companies do business, they are no longer confined to certain areas, regions, or even countries. "E-Commerce and m

Bu1410 Unit 2 Assignment 1

2804 words - 12 pages BU1410 Management Information Systems Unit 2 Assignment 1 Instructor: Willie Cooper Jr. Chapter 2 1. What are the major functions of a business that are important for understanding the role of information systems? * Define a business and describe the business functions. * According to the book “A business is a formal organization whose aim is to produce products or provide services for a

Unit 2 Assignment 1: Service Provider Types

667 words - 3 pages Brenda Deni NT1310: Physical Networking Unit 2 Assignment 1 3/30/2014 Service Provider Types * RBOCS: Regional Bell Operating Company Service * Regional Bell operating company (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell System or "Ma Bell") by a U.S. Federal