Preview

Unit 2 Assesment

Satisfactory Essays
Open Document
Open Document
271 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assesment
Assessment Worksheet

33

LAB – ASSESSMENT WORKSHEET

Manage Windows Accounts and Organizational Units
Course Name and Number:
IS3230 Access Security

Student Name:
Steve Guzman

Instructor Name:
Ms. Matykowski

Lab Due Date:

In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage
Windows accounts. You first created several user accounts and organizational units. You also used the utility to manage those user accounts. You assigned user accounts to an organizational unit and deleted any unneeded accounts.

Manage Windows Accounts and Organizational Units

Overview

Lab Assessment Questions & Answers
1. What tool do Windows Server administrators use to create and manage user accounts?

Active Directory Users and Computers

2. Name the two default accounts that appear on a Windows Server system.

Guest and Administrator

38399_LMxx_Lab02.indd 33

9/10/12 1:07 PM

34

LAB | Manage Windows Accounts and Organizational Units
3. What password options can you select when creating a user account?

- User must change password at next login
- User cannot change password
- Password never expires
- Account is disabled

4. Of those options, which should you always select for a standard user account?

User must change password at next login

5. Why must you be careful when changing the organizational unit membership of an account?

It can affect the way that group policies are applied to the accounts within the OU.

6. In this lab, you created OUs appropriate for a school environment. Describe the OUs that you might

use when creating accounts for the members of a family.
There would be a Parents OU and Kids OU

38399_LMxx_Lab02.indd 34

9/10/12 1:07 PM

You May Also Find These Documents Helpful

  • Good Essays

    There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Another user in the company wants to transfer user profiles from a Windows Vista workstation to a Windows 7 workstation, but these two computers are both connected to the network at the same time. To complete this challenge, you and your partner must create two new local user accounts on the Windows Vista workstation and transfer them directly to the Windows 7 workstation, using the network. Then complete the following tasks:…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The best way for the developer user information is for the company’s sales to sign in to the server; through your Windows 2000 desktop. After you have signed in, going directly to the Start Menu, go to the applications, and bring up the list alternatives which will incorporate what the other requires. Click on the active directory for users and computers to open the dialog box. After you have gotten the dialog box opened, it will be required that you find out under which domain the new user’s accounts will be open. There will be four different domains that will be open to enable, different users to have access for different programs on its own domain. Doing this will make it avoidable for users to access other programs that are on other domains. With the understanding that one requires the input to four different domain names: Sales, Education, Manufacturing, and Research each distinctly have a domain of their own in these categories.…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. P102…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit Two

    • 307 Words
    • 1 Page

    1. What is a pinhole camera? How do we know that these devices existed before the nineteenth century?…

    • 307 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assesment 1

    • 477 Words
    • 3 Pages

    The only time you would want to change this setting is when your organization uses…

    • 477 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One of the reasons why we have User account maintenance is for security by making sure the user account have a force password change when first logging in to the account to make sure the user have a one of a kind…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Currently, system administrators create Ken 7 users in each computer where users need access. In the Active Directory, where will system administrators create Ken 7 users? Open Active Directory Users and Computers. In the console tree, right-click the folder in which you want to add a user account. Point to New, and then click User. In First name, type the user's first name. In Initials, type the user's initials. In Last name, type the user's last name. Modify Full name to add initials or reverse order of first and last names.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    UNIT 2

    • 470 Words
    • 3 Pages

    5.) Write the pseudocode for a program that will determine the average miles per gallon a car gets. (Inputs should be miles driven and gallons of gas used)…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    With Windows Server 2008 Applications, you can make OU’s, Groups and User’s, and you can set GPO’s for the OU’s, Groups and / or Users requirements or restrictions.…

    • 1230 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    unit 2 assignment

    • 15807 Words
    • 77 Pages

    In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook):…

    • 15807 Words
    • 77 Pages
    Satisfactory Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. Active Directory uses __________ relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks.…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    appendix b

    • 569 Words
    • 2 Pages

    The type of relationship you would want to have is a SERVER/CLIENT relationship. The server would have to be able to handle logon/authentication (domain controller). Most likely a Windows Server that has an Active Directory. I also will need a file server which is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. Based on the departments I would need to create security groups in order to keep the network secure. I will also create a shared drive directory structure that represents each department. For example if more than 5 employees needed to be added it would be very easy to add them to the necessary security group which will automatically add them to the share…

    • 569 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 2

    • 1411 Words
    • 6 Pages

     Write the information required on the front of your answer book. The Examining Body for this…

    • 1411 Words
    • 6 Pages
    Powerful Essays