Preview

week 3 lab

Satisfactory Essays
Open Document
Open Document
350 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
week 3 lab
Chris Simmons
August 21, 2014
IS3340
Egon
Week 3 Lab
1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.
2. No. This stores plaintext password. This can be a risk. It’s default “disabled”.
3. Store passwords using reversible encryption is required for certain remote access protocols. It is also required to VPN in most cases.
4. To be more secure, of course.
5. If the computer is on the same domain, you can use remote desktop to remote into the main computer.
6. Microsoft Update Data Source
7. Windows Server Update Services lets admins push down the latest Microsoft updates to workstations with the windows OS.
8. MBSA scans multiple computers at once, while Microsoft Update scans a single computer.
9. You can run numerous command line scripts for various results.
10. If a company is going through a windows migration from XP to WIN 7, they can use all of these to ensure this goes smoothly.
Lab part 2
1. Roles are major functions and features are add-on’s that assist roles.
2. Windows PowerShell
3. Servers should be backed up hourly.
4. There are backups that backup all content (full systems), there are backups that backup files and folders, and there are backups that backup that only backup the files and folders that have been modified since the last backup.
5. Backing up a server allows you to have a restore point if and when something attacks or damages the server. Backups allow from the system to recover and not face major losses in files and folders.
6. You can also restore data from a backup from a removable storage.
7. Yes
8. My documents and settings, Everyone’s documents and settings, All information on this computer, and Let me choose what to back up.
9. If you’re backing up 500GB worth of data, it’d be wise to have more than 550GB of disk space.
10. It shouldn’t take long to reimage?

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1.) Change control manager enforces change of things passwords. Password change policies makes things difficult for hackers. It’s Brute force attack.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    First of all, from one to four media sets are designated for incremental daily backups. As daily incremental backup backs up the least of the data, compared with other backup sessions in this backup rotation schedule, any of these media sets can be referred to as 'son'. These media sets are reused each week on the designated day.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Windows Deployment Services (WDS) is a role included with Windows Server 2008, which lets you perform unattended installations of Windows Server 2008 and other operating systems on remote computers, using network based boot and installation…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    2. Because the updates will be downloading and there is no requirement for the employees to not be on the workstations but there will be times when the updates install the employee might need to restart the workstation to implement the update that installed.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    An organization can use an MBSA to scan the network weekly, while WSUS and Windows Update can be used to search automatically for updates on a continuous basis.…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A user who just uses their pc for browsing the internet and checking emails wont need a backup or any applications reinstalled. Someone who needs their documents for work will need all of them backed up but will probably not need their applications installed for them because they can just do it them selves.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    9. intusion detection software: look ppl who should not be there. back up:copy the info. security auditing software: checks out the weakness of your computer.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To ensure security you would have you computer network encrypted, and multiple passwords for computers you should never use the same password they should always be different, when using filing cupboards you would should have locks on them and different locks with different keys for each cupboard..…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Full Backup - This backup type is what most people commonly understand as a back up it is a complete copy of the data that is to be backed up, with all the files and the folders in the appropriate places, because of this the full back tends to take the longest time but also means that the restore operation is the quickest.…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Normally people never think of taking precautionary measures until they experience individual loss or feel the bitterness of unexpected disasters. This may also happen in most of the cases regarding back up processes against possible risks involved in information loss. There is no use of running after the data, which has already been a lost or taking bleak effort to regain it. But one has to be vigilant regarding the backup process by learning from the drastic experiences of others. If one realize about the importance of information stored in the system and feel the perspiration to create and process the data associated with it, he will never let it go by silly causes. Firstly he would concern about the protection of information by all possible ways. This short report reveals about the possible risks involved in data loss and the ways to eliminating those risks.…

    • 754 Words
    • 4 Pages
    Good Essays
  • Good Essays

    My backup plan in case my computer goes down is twofold. First, I have my laptop on which I can access the internet. On the laptop, I have MS Word, so I can do my assignments. If both my main computer and my laptop go down, I have access to my brother’s laptop, which has MS Word on it as well. I also have access to the internet via my local public library.…

    • 442 Words
    • 1 Page
    Good Essays
  • Good Essays

    BackUp

    • 2960 Words
    • 12 Pages

    Restores are fast and easy to manage as the entire list of files and folders are in one backup set.…

    • 2960 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Ms Access 2007

    • 753 Words
    • 4 Pages

    The following requirements are the minimum hardware requirements required to install and run Microsoft Office 2007.…

    • 753 Words
    • 4 Pages
    Satisfactory Essays