Preview

Unit 5 Assesment 1

Satisfactory Essays
Open Document
Open Document
477 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Assesment 1
Assessment Worksheet
Managing Group Policy Within the Microsoft Windows
Environment

IS 3330
Course Name and Number: _____________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________

Overview
In this lab, you created and linked Active Directory Group Policy Objects (GPO) to domain computers and used the Group Policy Manager Console (GPMC) to deploy security policies across the domain. You also generated policy audit reports from the
GPMC and the Windows Command Prompt to analyze the existence of and effectiveness of the GPO.

Lab Assessment Questions & Answers
1. Is using the option to Store passwords using reversible encryption a good security practice? Why or why not?
This information he need to be saved on text document and one of this risk is it for any situation you lost that you can't have access to all the password have this policy enable.
The only time you would want to change this setting is when your organization uses applications that need to read the password.

2. Compare the GPO Report and the RSOP Report.
GPO enables you to run a comparison or difference report for two RSoP analysis reports. This is similar to running a comparison or difference report for two. RSoP analysis reports is very useful in determining the source of differences in settings for different users on different computers

3. How often are GPO changes applied? Must the user be logged off the system?
That is depend of you configuration you can setup using the company needs. Is no necessary you can enforce the policy or wait the 90 minutes for refresh.

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

4. Which GPO policy takes precedence in the case of a policy

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab10 worksheet

    • 1151 Words
    • 5 Pages

    Will the Group Policy settings you configure in your new GPO have an immediate effect on your network? Why?…

    • 1151 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    9. Administrative Templates are a large repository of registry-based changes, by using the Administrative Template sections of the GPO you can deploy modifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user (called HKEY_CURRENT_USER in the registry) portions of the Registry of computers that are influenced by the GPO.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 327 Words
    • 2 Pages

    What are some password policy parameter options you can define for GPOs that can enhance the CIA for…

    • 327 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 5 P1

    • 497 Words
    • 2 Pages

    Nucleus- the nucleus in an animal cell controls every activity that happens within the cell…

    • 497 Words
    • 2 Pages
    Good Essays
  • Good Essays

    unit 202 2.4

    • 948 Words
    • 4 Pages

    Zone three shows locked safety doors at the foot of the stairs in the main hallway. This is where the infant pupils are brought to school. These doors are staffed at the beginning of the school day when pupils arrive. No parents are allowed beyond this point. When all…

    • 948 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 P1

    • 443 Words
    • 2 Pages

    c. The ability to control the businesses accounts is linked to the other two purposes I’ve already mentioned. If transactions are recorded accurately, then actions can be taken to control the balance between money flowing in and money flowing out of the business/firm. As an example, if it appeared that expenses were increasing but sales were staying the same, then the owner could look for ways to control or cut costs.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When planning password policy’s stress extra protection, in some cases, a good password is enough protection to keep out intruders. In others, it’s just a start. Encryption and one-time passwords add extra protection to systems. Encryption means garbling the password to protect from sniffers or other onlookers, through a particular scheme that can be deciphered from the other end of the connection. Users should exercise extreme caution when writing down or storing passwords. Stories of hackers obtaining passwords through shoulder-surfing and dumpster diving are not urban myths, they are real. Here a good practice for a company to…

    • 428 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 201 4.3

    • 431 Words
    • 2 Pages

    2. Using two specific examples, explain how to choose the most appropriate method of communication to meet your needs and the needs of others.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 201 1.2

    • 570 Words
    • 3 Pages

    George is a 14 year old boy who attends secondary school. He is extremely overweight and obesity among children can disrupt their physical development and have an impact on their social and emotional wellbeing. The fact that George is overweight may mean that he struggles when doing sports activities at school, which could result in him being teased by his classmates, leaving him embarrassed and self-conscious. Also getting changed on front of his peers may embarrass him which could result in him not wanting to take part in PE, affecting his health even more. George may then prefer to stay at home instead of going to school and being ridiculed, resulting in absences and then falling behind at school. Obesity can also affect the onset of puberty especially in boys as hormones get affected and slow down the male development. This again could lead to teasing and bullying, result in low self-esteem and even depression.…

    • 570 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Take a screen shot of the Group Policy Management console, showing the GPO you created, by pressing Alt+Prt Scr, and then paste the resulting image into the lab10_worksheet file in the page provided by pressing Ctrl+V.…

    • 1048 Words
    • 5 Pages
    Good Essays