ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 02 Jun 2017 My Price 8.00

Lab #4 – Assessment WorksheetUsing Group Policy

need help with these 5 questions for my lab assessment  

 

Lab #4 – Assessment WorksheetUsing Group Policy Objects and Microsoft Baseline Security Analyzer(MBSA) for Change ControlCourse Name and Number: _____________________________________________________Student Name: ________________________________________________________________Instructor Name: ______________________________________________________________Lab Due Date: ________________________________________________________________OverviewThere are many tools and suites designed to aid the security practitioner and the organization inimplementing and managing change management. In this lab, you explored two such tools forthe Windows platform: Group Policy Objects (built into the Windows operating systems) and theMicrosoft Security Baseline Analyzer (provided free of charge). You used Group Policy Objectsto strengthen the organization’s password policy by adding complexity and minimum passwordlength requirements. You scanned the Windows server with the Microsoft Baseline SecurityAnalyzer (MBSA) to assess its security state, and you examined the results of the MicrosoftBaseline Security Analyzer in detail.Lab Assessment Questions & Answers1.Define why change control management is relevant to security operations in anorganization.2.Name six (6) policies you could enable in a Windows Domain.3.What is the minimum password length enforced by the Password must meet complexityrequirements policy?4.What sources could you use as a source to perform the MBSA security state?5.What are some of the options that you can exercise when initiating the MBSA scan?© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

Attachments:

Answers

(11)
Status NEW Posted 02 Jun 2017 03:06 AM My Price 8.00

-----------

Not Rated(0)