Preview

lab notes

Good Essays
Open Document
Open Document
251 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab notes
1. User-based and groups or role-based controls are two types of access controls for Windows Server 2003 for folders and authentication.
2. Disabling of modify permissions would prevent from copying or modifying a file.
3. Group Policy allows for special policies and permissions on a Windows network via role-based access.
Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data?
4. Windows Server 2008 provides improvements from Active Directory of Server 2003. Read-only domain controllers (RODC) is possible to replicate a domain controller. Confidentiality - Maintains access across multiple systems with control over access at a central point. Reducing the number of systems that need an independent user/password combo reduces the chance that any one of them might be discovered.

5. Never include username or any name relating to a user. That is a vulnerability itself. Making it easy for attackers to figure out the password. Nothing that can give any type of hints is good practice. Longer passwords with combination or numbers and symbols do make it more challenging.
6. No, machines not joined to the domain cannot access the shared folders.
7. Yes credentials are required before accessing shared drives. Even if you are on the same domain you are sometimes still required to verify login before passing through.
8. Only the rights to view files and folders the guests need. They cannot modify or delete files. Giving more access to Auditors alone could throw up red flags and get you in trouble for breaking security protocols.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    Role-based access control (RBAC) is an access policy determined by the system, not the owner. RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist. RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control. Although RBAC is non-discretionary, it can be distinguished from MAC primarily in the way permissions are handled. MAC controls read and write permissions based on a user's clearance level and additional labels. RBAC controls collections of permissions that may include complex operations such as an e-commerce transaction, or may be as simple as read or write. A role in RBAC can be viewed as a set of…

    • 508 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Wiley, J. (2012). Windows Server 2008 Active Directory Configuration. Hoboken: John Wiley and Sons, Inc.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    This simplicity comes to a price since by deploying a windows workgroup, other functionality and advantages of a Domain model is lost or not applicable and security can be compromised. For example, when deploying a patch or fix, each workstation has to be configured individually. Another example is that installing a new application in each computer requires the installation and configuration of each machine. Furthermore, in this model when user connect via VPN if they transmit copies of their files unencrypted, the security of the network and information is…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    I learned how to add a domain controller to an Active Directory domain, back up and restore Active Directory, and recognize and respond to Active Directory replication issues.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Active Directory Microsoft’s directory Microsoft’s directory service that automates network management, such as user data, resources, and security.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    The networking features in Windows Vista have been designed to support high levels of manageability to help reduce the cost of deploying wireless networks and network security policies, as well as to provide quality of service for applications and users. Windows Vista uses Group Policy or command-line scripting via the Network Shell (NETSH) extensively to manage network features, so user don't need to learn or deploy a new management tool, and user can take advantage of existing investment in Active Directory and the Organizational Unit (OU) structure that have already…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. A Windows Server 2008 computer that has been configured with the Active Directory DS role is…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays