Preview

Hollis IS3230 Lab1

Satisfactory Essays
Open Document
Open Document
278 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hollis IS3230 Lab1
ITT

Unit 1 Lab

:

Jorge L. Lopez

15106596

IS3230
1. DACL (Discretionary access control list) allows or denies trustees access to computer and network resources. It identifies group permissions and determines whether to allow access a securable object or process.
2. Because it’s easier to manage a group than individuals. Once you have the group setup with permissions, you add or remove employees.
3. Read, Write, Full Control, or No Access
4. Read
5. Strong and complex passwords: * Letters (capital and lower case) * Numbers * Symbols * Force employees to change passwords every 90 days * Do not let them use old passwords * Force employees to use minimum 8 characters
6. Enabling Store Passwords Using Reversible Encryption determines whether Windows stores passwords using reversible encryption. Enabling this is essentially the same as storing passwords in plain text which is insecure and not recommended.
7. Domain policy is a default policy for domain computers. Local policies are for your local computer. Domain policies will overwrite local policies.
8. GPOs are processed in the following order: The local GPO is applied, GPOs linked to sites are applied, GPOs linked to domains are applied, and GPOs linked to organizational units are applied. For nested organizational units, GPOs linked to parent organizational units are applied before GPOs linked to child organizational units are applied.
9. Administrative Templates are a large repository of registry-based changes, by using the Administrative Template sections of the GPO you can deploy modifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user (called HKEY_CURRENT_USER in the registry) portions of the Registry of computers that are influenced by the GPO.
10. The Group Policy Management Console (GPMC) unifies Group Policy management.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The e-commerce server could be placed in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will pass it in an encrypted form to and from wherever it needs to go.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1330lab8worksheet

    • 1017 Words
    • 6 Pages

    In this exercise you will test to see whether or not domain policies override configured computer settings. In the previous exercise you configured a local GPO and this exercise will test which GPO will take precedence if a conflict occurs between a local and domain based GPO.…

    • 1017 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAb1Ecet230

    • 221 Words
    • 3 Pages

    1. Using the results of the compilation for the Design Project, what percent of the FPGA is used to implement the design.…

    • 221 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    which makes it possible for employees to work and interact as if under one roof. This…

    • 2578 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    For this kind of scenario, I would have to create a server from scratch so I can be able to identify any types of vulnerabilities on any of these server requirements stated below. Any of these can be at risk at any time, so creating a new server from scratch would be most recommended. Because it is kind of safer than Windows because most viruses and worms are written for Windows but it doesn’t mean Linux can be attacked.…

    • 364 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Which of the following is a GPO on a Vista computer (Choose all that apply)…

    • 1935 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    An ACL is a Control list which will allow or deny traffic or devices based on specifications defined in the ACL. This ACL generally is applied and configured on Firewalls. It is useful in a layered security approach because from an External standpoint it become the first line of defense when hosts attempt to connect to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lab01

    • 1379 Words
    • 4 Pages

    1. You are working in the laboratory and break a glass test tube. Explain the procedure that should be followed. (5 pts.) If I were to break a glass test tube while in the laboratory I would discard the broken glass in the designated broken glass container. I would make sure to put the glass in the properly labeled plastic or metal can with a sealing lid on it.…

    • 1379 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Pernia

    • 1115 Words
    • 5 Pages

    In my opinion the idea of pairing up the individuals is beneficial to the employees as well as to he organization.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    o Organizations with teams will attract and retain the best people. This in turn will…

    • 758 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    The main purpose of these approaches is to make the organization prosper through building good terms between employees, because, employees are actually the main asset of the organization which…

    • 2200 Words
    • 9 Pages
    Best Essays
  • Good Essays

    8. Employees are multi skilled. They can perform more than one task en therefore safe cost on labour which in turn keeps overheads low.…

    • 609 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Employee Orientation

    • 534 Words
    • 2 Pages

    It makes life easier for other employees in the organization, by eliminating the need for new staff members to ask them constantly for information and advice.…

    • 534 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    And this also facilitate teamwork. Employer and employees are all in a team. All team members clearly know what they should do. This avoids employees doing the same things and then saves the operating cost.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays