Preview

Active Directory and Access Controls

Satisfactory Essays
Open Document
Open Document
263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Active Directory and Access Controls
1. What two access controls can be setup for a Windows Server 2003 folders and authentication?
Authentication and Access control.
2. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?
Folder Contents. Read access only
3. 4. What is the mechanism on a Windows Server where you can administer granular policies and permissions on a Windows network using role-based access?
Group Policy Editor
4. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. creates security principals in the Active Directory domain partition
5. Would it be a good practice to include the account or user name in the password? why or why not.
No it wouldn’t be good practice to include account or username in the password, it would make it easier to break the password using brute-force dictionary attack
6. Can a user who is defined in the Active Directory access a shared drive if that user is not part of the domain?
Non domain machines cannot access domain shared folders
7. Can a user who is defined in the Active Directory access a shared drive if that user is not part of the domain?
Non domain machines cannot access shared folders
8. Using what you know about access controls, what security controls would you recommend when granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.) that will maintain CIA of production systems and data?
Read only permissions with limited access

You May Also Find These Documents Helpful

  • Good Essays

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users. This…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    Login as Mikexxx with his assigned password (you need to know how to login as a new user).…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    Network Access Protection is a new feature in Windows Server 2008 that allows network administrators to specify one or more policies that define the conditions under which network access will or will not be permitted.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    COMP 230 WK 1 7 QUIZ

    • 2401 Words
    • 33 Pages

    (TCO 1) Which one of the following Windows NET commands will allow other computers to access the C:\Data directory under the share nameUserData?…

    • 2401 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. P102…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control?…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lesson 11

    • 534 Words
    • 2 Pages

    3. Which of the following commands can be used to configure Active Directory permissions from the…

    • 534 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. Active Directory uses __________ relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks.…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Chapter 17 WOS review

    • 627 Words
    • 3 Pages

    Which type of permission should you set to control access to files and folders by local and network users?…

    • 627 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    While managing applications in distributed environments, you need to secure the network applications from unauthorized access by applying the security policies and restriction levels. Applying security policies and restriction for the applications will enable you to control access to the applications and prevent data from being modified by unauthorized users. In this topic, you will set up security policies and restrictions.…

    • 10897 Words
    • 44 Pages
    Powerful Essays