In this lab, you used group policy objects to create a minimum password length password policy and link it to the newly created domain from the previous lab. You also ran the Microsoft® Baseline Security Analyzer
(MBSA) and reviewed the results of the MBSA scan.
Lab Assessment Questions & Answers 1.
Describe two options you would enable in a Windows Domain password policy.
minimum password length set and password that has to have numbers, upper and lowercase, and symbols 2. there a setting in your GPO to specify how many logon attempts will lock out an account? Name two
Is
parameters that you can set to enhance the access control to the system. yes there is, you can set where the user has to change their password every 30 days and have security questions
4 system access? make sure they have at least one number, one uppercase, and lowercase, maybe add a character. don't use a common password that anyone could guess, don't use personal information either. dont use any old passwords you may have used in the past as well
37609_LB04_Pass5.indd 65
Configure Group Policy
Objects and Microsoft® Baseline
Security Analyzer (MBSA)
3.
What are some password policy parameter options you can define for GPOs that can enhance the CIA for
23/04/13 11:01 AM
66
Lab #4 | Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) 4. If the virtual lab had direct Internet access, from what sources could you use as a source to perform the MBSA security state?
can always go to the Microsoft update website through the internet
5.
What does WSUS stand for, and what does it do?
Windows Server Update Service and downloads updates for microsoft
6.
What is the difference between MBSA and Microsoft® Update?
Microsoft update checks for updates for the any Microsoft updates are available while MBSA scans for security vulnerabilities in Microsoft
7.
What are some of the options that you can exercise when using the MBSA tool?
you can check for security updates and administrative vulnerabilities
8.
Describe why change control management might be relevant to security operations in an organization.
change control can prevent possibility of services being interrupted, this allows you to plan so no service is interrupted. it documents where changes are made
You May Also Find These Documents Helpful
-
5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system.…
- 282 Words
- 2 Pages
Satisfactory Essays -
What tools can you use to investigate the application of GPOs for a particular computer or user account?…
- 1334 Words
- 6 Pages
Powerful Essays -
According to my site coordinator she feels as if data security is doing well. She stated that feels this way because the data security makes it hard to get into the system but does not make it difficult to get out. One area she would like to see improvement in is shorter log off times. For example, if an employee walks away from the computer and patient information is still displayed she would like to see a warning appear after 3 minutes of idle time warning that the information will be closed unless clicking the warning box.…
- 606 Words
- 3 Pages
Good Essays -
Solution: Create a recurring change of passwords, say once every few months, for your company. Have the passwords require a combination of numbers and letters, as well as a special character.…
- 331 Words
- 2 Pages
Satisfactory Essays -
This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…
- 952 Words
- 4 Pages
Satisfactory Essays -
The password for a user can be set with the PASSWORD clause of the CREATE USER command.…
- 4381 Words
- 33 Pages
Satisfactory Essays -
The type of access controls and permissions that are probably configured are Modify , Read or Full control.…
- 503 Words
- 2 Pages
Good Essays -
4. What is the mechanism on a Windows Server where you can administer granular policies and…
- 321 Words
- 2 Pages
Good Essays -
• Enable password protection on workstations for access. Enable auto screen lockout for inactive time.…
- 447 Words
- 2 Pages
Satisfactory Essays -
| Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…
- 793 Words
- 4 Pages
Good Essays -
The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called contoso.com. The computers required for this lab are listed in Table 2-1.…
- 2319 Words
- 10 Pages
Satisfactory Essays -
Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II.…
- 1458 Words
- 5 Pages
Good Essays -
7. What is the PASS_MIN_DAYS setting? Min days until you have to change the password…
- 304 Words
- 2 Pages
Satisfactory Essays -
Save all these passwords in your browser because it will be a HUGE pain to type them in every time you need them.…
- 464 Words
- 2 Pages
Satisfactory Essays -
Data breaches and cyber-attacks are a major issue and yet things such as password security are still too weak. Making a password for websites and accounts is unavoidable. People mix up their passwords and often times make them easy so they can remember them. Unfortunately, this is a huge mistake. Passwords need to be complex, they need to have lower case and capital…
- 657 Words
- 2 Pages
Good Essays