This procedure guide is for restoring a system if you were to arrive at work to a
desktop computer that will not boot. If you get into this situation and your computer will
not boot then you gather information about the workstation. You should gather the
Unit 7 Assignment 1
Security Administration Requirements Policy
Securing Windows networks and systems requires recognizing potential vulnerabilities and
selecting the best control to address that
1. How should you apply the settings the first time you try working with SCW?
First you must ensure that all applications are r
1. What is the difference between roles and features in Windows Server 2008?
Roles are predefined set of services, programs, and configuration settings
that enables a computer to fulfill specific requirements.
Features are smaller add-on packages that are
Unit 5 Lab 5
Configure Access to Folders & Files Using
Microsoft GPO Manager & Use MBSA to
Identify the Current Security Baseline Definition
What services were attacked on the IIS server?
All of them
2. How many failed logins
1. What are the steps you took to harden IIS on the Windows Sever? Explain why
these steps are necessary?
By setting up an NTFS drive for the
Unit 3 Assignment 1
Enable Encryption on a Microsoft Workstation
to Ensure Confidentiality
1. One of the shop floor computers that is connected to your network is commonly used by the floor
manager. You want the floor managers f