SlideShare a Scribd company logo
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Creating a Scheduled Backup and Replicating System Folders
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you installed the Windows Distributed File System
and Windows Server
Backup features from the PowerShell command line. You
scheduled a daily backup of
the C:ERPdocuments folder on the TargetWindows01 server
and replicated this backup
to the TargetWindows02 server using the DFS Replication
feature.
Lab Assessment Questions & Answers
1. What is the difference between roles and features in Windows
Server 2008?
2. What is installed when you choose the RSAT-DFS-MGMT-
Con feature?
3. How often should servers be backed up?
4. What are the different types of data backup that are
performed?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. What is the command to create a share?
6. What is a differential backup?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text112: Text113: Text114: Text115: Text116:
Text117:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Managing Group Policy Within the Microsoft Windows
Environment
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you created and linked Active Directory Group
Policy Objects (GPO) to
domain computers and used the Group Policy Manager Console
(GPMC) to deploy
security policies across the domain. You also generated policy
audit reports from the
GPMC and the Windows Command Prompt to analyze the
existence of and effectiveness
of the GPO.
Lab Assessment Questions & Answers
1. Is using the option to Store passwords using reversible
encryption a good security
practice? Why or why not?
2. Compare the GPO Report and the RSOP Report.
3. How often are GPO changes applied? Must the user be logged
off the system?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
4. Which GPO policy takes precedence in the case of a policy
conflict? Why?
5. What is the value of the Group Policy in an enterprise
environment?
6. What are some of the reasons that an organization would need
to document their
existing GPO settings?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text106: Text107: Text108: Text109: Text110:
Text111:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Identifying and Removing Malware from Windows Systems
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used AVG Business Edition, an antivirus and
anti-malware software tool,
to identify malware and malicious software from an infected
Windows 2012 workstation.
You researched remediations for the malware identified by the
scan, and took actions to
remove those programs. You also used Windows Defender to
perform the same actions
on a Windows 2008 workstation.
Lab Assessment Questions & Answers
1. What is the one thing that a virus, a worm, spyware, and
malicious code have in
common? What are the differences among these three threats: a
virus, a worm,
and spyware?
2. How often should you update your antivirus protection?
3. Why is it a best practice to have and to carry an antivirus
boot-up disk or CD?
4. In a corporate environment, should new antivirus definitions
be installed as soon
as they are available?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. Is the manual quick scan good enough protection for a
system?
6. What best practices for the workstation domain that can
mitigate the risks and
threats caused by malicious code?
7. If you have an up-to-date antivirus program, do you still need
a malware detection
program like Windows Defender?
8. What are some of the most common symptoms of malware?
9. What risk or threat do malware applications, such as spyware,
pose to the
workstation domain?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text97: Text98: Text99: Text100: Text101: Text102:
Text103: Text104: Text105:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Configuring BitLocker and Windows Encryption
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used the Microsoft Encrypting File System
(EFS) to encrypt files and
folders on a Windows Server 2012 machine. You documented
the success or failure of
your encryption efforts. You also installed Microsoft BitLocker
Drive Encryption, a data
protection feature that is used to resist data theft and the risk of
exposure from lost,
stolen, or decommissioned computers. You encrypted a data
drive on the remote server
and decrypted it using a recovery key.
Lab Assessment Questions & Answers
1. Within a Microsoft Windows Server 2012 environment, who
has access rights to
the EFS features and functions in the server?
2. What are some best practices you can implement when
encrypting BitLocker
drives and the use of BitLocker recovery passwords?
3. What was the recovery key generated by BitLocker in this
lab?
4. How would you grant additional users access rights to your
EFS encrypted folders
and data files?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. What are the main differences between EFS and BitLocker?
6. The customer privacy data policy in your company’s data
classification standard
requires encryption in two places: data stored locally or on a
LAN, and data
stored on a laptop. Describe your solution for meeting this
policy requirement.
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text1: Text2: Text3: Text4: Text5: Text6:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Using Access Control Lists to Modify File System Permissions
on Windows Systems
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used the Windows command-line utility,
icacls.exe, to establish file-level
permissions following a set of access control requirements. You
tested those permissions
by remotely accessing the Windows server and attempting to
modify files in the secured
folders. You used screen captures to document that the access
control changes you made
in this lab were properly applied.
Lab Assessment Questions & Answers
1. What is the principle of least privilege?
2. What does ACL stand for and how it is used?
3. Why would you add permissions to a group instead of the
individual?
4. List at least three different types of access control
permissions you can enable for
a file using icacls.exe.
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. Which access control permissions allow you to change files
and/or folders?
6. If you don’t remember the syntax when using icacls.exe, what
command do you
type to see the options?
7. Without using the icacls.exe tool, how could you view and
modify the privileges
of the files or folders of a shared drive?
8. Where do permissions modified using the icacls.exe tool
appear in the folder
Properties?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text83: Text84: Text85: Text86: Text87: Text88:
Text89: Text90:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Implementing Access Controls with Windows Active Directory
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used the Active Directory Domain Controller to
secure the C-I-A triad,
ensuring confidentiality and integrity of network data. You
created users and global
security groups and assigned the new users to security groups.
You followed a given set
of access control criteria to ensure authentication on the remote
server by applying the
new security groups to a set of nested folders. Finally, you
verified that authentication by
using the new user accounts to access the secured folders on the
remote server.
Lab Assessment Questions & Answers
1. Relate how Windows Server 2012 Active Directory and the
configuration of
access controls achieve C-I-A for departmental LANs,
departmental folders, and
data.
2. Is it a good practice to include the account or user name in
the password? Why or
why not?
3. What are some of the best practices to enhance the strength
of user passwords in
order to maximize confidentiality?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
4. Can a user who is defined in Active Directory access a shared
drive on a
computer if the server with the shared drive is not part of the
domain?
5. Does Windows Server 2012 R2 require a user’s
logon/password credentials prior
to accessing shared drives?
6. When granting access to network systems for guests (i.e.,
auditors, consultants,
third-party individuals, etc.), what security controls do you
recommend
implementing to maximize CIA of production systems and data?
7. In the Access Controls Criteria table, what sharing changes
were made to the
MGRfiles folder on TargetWindows01-DC server?
8. In the Access Controls Criteria table, what sharing changes
were made on the
TargetWindows01-DC server to allow Shopfloor users to
read/write files in the
C:LabDocumentsSFfiles folder?
9. In the Access Controls Criteria table, what sharing changes
were made on the
TargetWindows01-DC server to allow HumanResources users to
read/write files
in the C:LabDocumentsHRfiles folder?
10. Explain how C-I-A can be achieved down to the folder and
data file access level
for departments and users using Active Directory and Windows
Server 2012 R2
access control configurations. Configuring unique access
controls for different
user types is an example of which kind of access controls?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text73: Text74: Text75: Text76: Text77: Text78:
Text79: Text80: Text81: Text82:

More Related Content

Similar to Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend .docx

8th sem
8th sem8th sem
8th sem
nastysuman009
 
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
SANSKAR20
 
Everything about Test Environments.pdf
Everything about Test Environments.pdfEverything about Test Environments.pdf
Everything about Test Environments.pdf
Enov8
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Feb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentFeb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition Development
Barb Tillich
 
Swetha Nelluru
Swetha NelluruSwetha Nelluru
Swetha Nelluru
Swetha Nelluru
 
Srs(at)
Srs(at)Srs(at)
Srs(at)
Smit Pateliya
 
Lab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docxLab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docx
AASTHA76
 
What are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdfWhat are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdf
AnanthReddy38
 
Some of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docxSome of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docx
whitneyleman54422
 
Ecommerce srs
Ecommerce  srsEcommerce  srs
Ecommerce srs
vikram singh
 
Online student portal
Online student portalOnline student portal
Online student portal
Zobia Zafar
 
Creating Applications With Drupal
Creating Applications With DrupalCreating Applications With Drupal
Creating Applications With Drupal
guest602bb9
 
Creating Applications With Drupal
Creating  Applications With  DrupalCreating  Applications With  Drupal
Creating Applications With Drupal
guest602bb9
 
online learning and examination website
online learning and examination websiteonline learning and examination website
online learning and examination website
Anuj Kumar
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
glendar3
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
todd581
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive PRunning head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
MalikPinckney86
 
How to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft TeamsHow to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft Teams
Dux Raymond Sy
 
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
albert0061
 

Similar to Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend .docx (20)

8th sem
8th sem8th sem
8th sem
 
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
 
Everything about Test Environments.pdf
Everything about Test Environments.pdfEverything about Test Environments.pdf
Everything about Test Environments.pdf
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Feb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentFeb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition Development
 
Swetha Nelluru
Swetha NelluruSwetha Nelluru
Swetha Nelluru
 
Srs(at)
Srs(at)Srs(at)
Srs(at)
 
Lab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docxLab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docx
 
What are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdfWhat are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdf
 
Some of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docxSome of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docx
 
Ecommerce srs
Ecommerce  srsEcommerce  srs
Ecommerce srs
 
Online student portal
Online student portalOnline student portal
Online student portal
 
Creating Applications With Drupal
Creating Applications With DrupalCreating Applications With Drupal
Creating Applications With Drupal
 
Creating Applications With Drupal
Creating  Applications With  DrupalCreating  Applications With  Drupal
Creating Applications With Drupal
 
online learning and examination website
online learning and examination websiteonline learning and examination website
online learning and examination website
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive PRunning head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
 
How to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft TeamsHow to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft Teams
 
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
 

More from vanesaburnand

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docx
vanesaburnand
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docx
vanesaburnand
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docx
vanesaburnand
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docx
vanesaburnand
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
vanesaburnand
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docx
vanesaburnand
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docx
vanesaburnand
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docx
vanesaburnand
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docx
vanesaburnand
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docx
vanesaburnand
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docx
vanesaburnand
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
vanesaburnand
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docx
vanesaburnand
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docx
vanesaburnand
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docx
vanesaburnand
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docx
vanesaburnand
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docx
vanesaburnand
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docx
vanesaburnand
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docx
vanesaburnand
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docx
vanesaburnand
 

More from vanesaburnand (20)

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docx
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docx
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docx
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docx
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docx
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docx
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docx
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docx
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docx
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docx
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docx
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docx
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docx
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docx
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docx
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docx
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docx
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docx
 

Recently uploaded

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 

Recently uploaded (20)

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend .docx

  • 1. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Creating a Scheduled Backup and Replicating System Folders Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you installed the Windows Distributed File System and Windows Server Backup features from the PowerShell command line. You scheduled a daily backup of
  • 2. the C:ERPdocuments folder on the TargetWindows01 server and replicated this backup to the TargetWindows02 server using the DFS Replication feature. Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? 2. What is installed when you choose the RSAT-DFS-MGMT- Con feature? 3. How often should servers be backed up? 4. What are the different types of data backup that are performed? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual
  • 3. 5. What is the command to create a share? 6. What is a differential backup? Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text112: Text113: Text114: Text115: Text116: Text117: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Managing Group Policy Within the Microsoft Windows Environment Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________
  • 4. Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you created and linked Active Directory Group Policy Objects (GPO) to domain computers and used the Group Policy Manager Console (GPMC) to deploy security policies across the domain. You also generated policy audit reports from the GPMC and the Windows Command Prompt to analyze the existence of and effectiveness of the GPO. Lab Assessment Questions & Answers 1. Is using the option to Store passwords using reversible encryption a good security practice? Why or why not? 2. Compare the GPO Report and the RSOP Report.
  • 5. 3. How often are GPO changes applied? Must the user be logged off the system? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 4. Which GPO policy takes precedence in the case of a policy conflict? Why? 5. What is the value of the Group Policy in an enterprise environment? 6. What are some of the reasons that an organization would need to document their existing GPO settings?
  • 6. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text106: Text107: Text108: Text109: Text110: Text111: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Identifying and Removing Malware from Windows Systems Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used AVG Business Edition, an antivirus and
  • 7. anti-malware software tool, to identify malware and malicious software from an infected Windows 2012 workstation. You researched remediations for the malware identified by the scan, and took actions to remove those programs. You also used Windows Defender to perform the same actions on a Windows 2008 workstation. Lab Assessment Questions & Answers 1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware? 2. How often should you update your antivirus protection? 3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD? 4. In a corporate environment, should new antivirus definitions be installed as soon as they are available?
  • 8. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 5. Is the manual quick scan good enough protection for a system? 6. What best practices for the workstation domain that can mitigate the risks and threats caused by malicious code? 7. If you have an up-to-date antivirus program, do you still need a malware detection program like Windows Defender? 8. What are some of the most common symptoms of malware? 9. What risk or threat do malware applications, such as spyware, pose to the workstation domain?
  • 9. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text97: Text98: Text99: Text100: Text101: Text102: Text103: Text104: Text105: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Configuring BitLocker and Windows Encryption Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used the Microsoft Encrypting File System (EFS) to encrypt files and
  • 10. folders on a Windows Server 2012 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the remote server and decrypted it using a recovery key. Lab Assessment Questions & Answers 1. Within a Microsoft Windows Server 2012 environment, who has access rights to the EFS features and functions in the server? 2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords? 3. What was the recovery key generated by BitLocker in this lab? 4. How would you grant additional users access rights to your EFS encrypted folders and data files?
  • 11. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 5. What are the main differences between EFS and BitLocker? 6. The customer privacy data policy in your company’s data classification standard requires encryption in two places: data stored locally or on a LAN, and data stored on a laptop. Describe your solution for meeting this policy requirement. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text1: Text2: Text3: Text4: Text5: Text6: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Using Access Control Lists to Modify File System Permissions
  • 12. on Windows Systems Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used the Windows command-line utility, icacls.exe, to establish file-level permissions following a set of access control requirements. You tested those permissions by remotely accessing the Windows server and attempting to modify files in the secured folders. You used screen captures to document that the access control changes you made in this lab were properly applied. Lab Assessment Questions & Answers 1. What is the principle of least privilege?
  • 13. 2. What does ACL stand for and how it is used? 3. Why would you add permissions to a group instead of the individual? 4. List at least three different types of access control permissions you can enable for a file using icacls.exe. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 5. Which access control permissions allow you to change files and/or folders? 6. If you don’t remember the syntax when using icacls.exe, what command do you type to see the options?
  • 14. 7. Without using the icacls.exe tool, how could you view and modify the privileges of the files or folders of a shared drive? 8. Where do permissions modified using the icacls.exe tool appear in the folder Properties? Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text83: Text84: Text85: Text86: Text87: Text88: Text89: Text90: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Implementing Access Controls with Windows Active Directory Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________
  • 15. Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used the Active Directory Domain Controller to secure the C-I-A triad, ensuring confidentiality and integrity of network data. You created users and global security groups and assigned the new users to security groups. You followed a given set of access control criteria to ensure authentication on the remote server by applying the new security groups to a set of nested folders. Finally, you verified that authentication by using the new user accounts to access the secured folders on the remote server. Lab Assessment Questions & Answers 1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data.
  • 16. 2. Is it a good practice to include the account or user name in the password? Why or why not? 3. What are some of the best practices to enhance the strength of user passwords in order to maximize confidentiality? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 4. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain? 5. Does Windows Server 2012 R2 require a user’s logon/password credentials prior to accessing shared drives? 6. When granting access to network systems for guests (i.e., auditors, consultants,
  • 17. third-party individuals, etc.), what security controls do you recommend implementing to maximize CIA of production systems and data? 7. In the Access Controls Criteria table, what sharing changes were made to the MGRfiles folder on TargetWindows01-DC server? 8. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01-DC server to allow Shopfloor users to read/write files in the C:LabDocumentsSFfiles folder? 9. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01-DC server to allow HumanResources users to read/write files in the C:LabDocumentsHRfiles folder? 10. Explain how C-I-A can be achieved down to the folder and data file access level for departments and users using Active Directory and Windows Server 2012 R2 access control configurations. Configuring unique access controls for different
  • 18. user types is an example of which kind of access controls? Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text73: Text74: Text75: Text76: Text77: Text78: Text79: Text80: Text81: Text82: