We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Networking Security Fundamentals

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers

What are the three fundamental elements of an effective security program for information systems? Administrative Controls, Technical or Logical Controls, Physical Controls Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources? Technical and Physical

If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? The type of access controls and permissions that are probably configured are Modify , Read or Full control. What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access? The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor. What is two-factor authentication, and why is it an effective access control technique? Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token,

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59