1. What are some common risks threats and vulnerabilitys would commonly found in the
workstations domain must be mitigated through a layered security strategy?
a. The workstation domains common risk is sensitiv
1. Within a Microsoft Windows 2008 Server R2 environment, who has access rights to the EFS
features and functions in the server?
2. There are three modes of access control that Bitlocker can enable on drives. List these three
'Skeleton Key' malware installed as in-memory patch on Active Directory DCs
Researchers discovered two variants on the malware which targets Windows 64-bit systems.
Researchers have discovered malware, called Skeleton Key, which bypasses authentication on
Active Directory stores information about network components. It allows clients to find objects
within its namespace. The term namespace (also known as console tree) refers to the area in
which a network component can be located. For examp
Unit 1 Assignment1: Adding Active Directory
Currently, system administrators create Ken 7 users in each computer where users need access.
In the Active Directory, the system admins will create Organizational Groups (OU). These OUs
Unit 2 Assignment 1 Recommendations for Access Controls
IS3440 Windows Security
What access control is the selective restriction of an access to a place in the RFC 4949.
By doing this you can entering or use it to access giving information
Access Control is the defined as the selective restriction of access to a place or other resource,
in the RFC 4949. The act of accessing may mean consuming, entering, or using. Permission to
access a resource is called authorization. Simpl
Unit 4 Assignment 1 Identifying Types of Malware Infection
IS3340 Windows Security
1. You notice that your computer is getting slower each day. You have terminated
unneeded programs, disabled unneeded services, and have recently defragment
Unit 5 Assignment 1 Auditing Tools for Windows System
1. You want to schedule a weekly analysis for the Windows servers in your data center. The
command should run as a scheduled job and report any available patches for the
1. What is the difference between Roles and Features in Windows Server 2008?
A server role is a set of software programs that lets a computer perform a
specific function for multiple users or other computers within a network
1. What is the Principle of Least Privilege?
Providing only the necessary access required to carry out a task.
2. What does DACL stands for and what does it mean?
Discretionary Access Control List is the list of access contr
Separation of duties:
One example of separation of duties is when the military gives a two keys to a nuclear warhead
and both people have to turn their keys to activate the bomb.
1. What are the differences between a Flat and Hierarchical organizations?
Hierarchical organizations are also known as "tall systems." They are
characterized by a large number of layers between top management and the
Department of Defense (DoD) Audit
Naveed Zazai , Harold Hendricks- Dorranne Boothe , Merinda Burton
Research on DoD specific requirements
We are explaining the security controls for each particular
domain as well as requirements.
The two auditing framew
Unit 2 Assignment 1 Good Policy Implementation
A successful policy implementation for flat organization is one key to successful business
evolution and growth in today's rapidly changing economy driven by knowledge and innovation
Unit 5 Assignment 1 Create User Policy
A. To remain competitive, better serve our customers and provide our employees with the
best tools to do their jobs, Health Care USA makes available to our workforce access
Unit 5 Discussion 1 Best Practices for User Policies
Attachments- never open en e-mail attachments from a source that is not trusted or known
Encryption- always encrypts sensitive data that leaves the confines of a secure server; th
Unit 6 Assignment 1 IT Infrastructure Policies
In Unit 5 Assignment 1 I had to create a User Policy and talks about the step user have to
follow. The User Policy talks about prohibited communication which is basely saying you cannot
1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access
controls achieve C-I-A for departmental LANs, departmental folders, and data.
Active Directory and the configuration of access con
Unit 6 Assignment 1 Procedure Guide on Restoring a System
1. How much data has been modified between the last backup and the time of failure?
No data should have been lost since nothing was change since the last backup
and the back