Preview

Lab 4

Good Essays
Open Document
Open Document
327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 4
Assessment Worksheet

65

Lab #4 – Assessment Worksheet

Configure Group Policy Objects and Microsoft® Baseline
Security Analyzer (MBSA)
Course Name and Number:
Student Name:
Dennis Dobbins

Instructor Name:
P Butu

Lab Due Date:
10/8/13

Overview
In this lab, you used group policy objects to create a minimum password length password policy and link it to the newly created domain from the previous lab. You also ran the Microsoft® Baseline Security Analyzer
(MBSA) and reviewed the results of the MBSA scan.

Lab Assessment Questions & Answers 1.
Describe two options you would enable in a Windows Domain password policy. password requirements lock out after x number of failed attempts

2. there a setting in your GPO to specify how many logon attempts will lock out an account? Name two
Is

parameters that you can set to enhance the access control to the system. password must meet requirements setting a password minimum

4 system access? enforce password history password minimum and maximum age requirements

password complexity requirements

38351_LB04_Pass2.indd 65

Configure Group Policy
Objects and Microsoft® Baseline
Security Analyzer (MBSA)

3.
What are some password policy parameter options you can define for GPOs that can enhance the CIA for

26/02/13 11:57 PM

66

Lab #4 | Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) 4. If the virtual lab had direct Internet access, from what sources could you use as a source to perform the MBSA security state?

server 2008 , 2003 and window 7

5.
What does WSUS stand for, and what does it do?

window server update service--provides updates and fixes for Microsoft products

6.
What is the difference between MBSA and Microsoft® Update?

MBSA scans for missing updates and vulnerability where Microsoft updates only scans for missing updates

7.
What are some of the options that you can exercise when

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Lab 6

    • 690 Words
    • 3 Pages

    1. Run your model. Compare the queue statistics of the 3 processes with those obtained for Part C in the previous Lab. How have they changed and what conclusions can you draw? (Note the sums of all capacities for both cases are equivalent – 12 in each).…

    • 690 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    There are many tools and suites designed to aid the security practitioner and the organization in…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 5

    • 2594 Words
    • 10 Pages

    In gymnosperms, pollination is the transfer of pollen (Fig. 2) from male cones (where pollen is produced) to female cones, which house eggs. In these plants, pollen is carried from male cones to female cones by wind - gymnosperms were the first plants to evolve that did not need free water to transfer sperm to egg, and were therefore able to thrive in terrestrial habitats. Pollen grains are also protected by tough coats. After fertilization, seeds are produced with developing embryos…

    • 2594 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The password for a user can be set with the PASSWORD clause of the CREATE USER command.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+Prt Scr, and then paste the resulting image into the Lab 12 worksheet file in the page provided by pressing Ctrl+V.…

    • 970 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    7. What is the PASS_MIN_DAYS setting? Min days until you have to change the password…

    • 304 Words
    • 2 Pages
    Satisfactory Essays