SlideShare a Scribd company logo
1 of 18
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Creating a Scheduled Backup and Replicating System Folders
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you installed the Windows Distributed File System
and Windows Server
Backup features from the PowerShell command line. You
scheduled a daily backup of
the C:ERPdocuments folder on the TargetWindows01 server
and replicated this backup
to the TargetWindows02 server using the DFS Replication
feature.
Lab Assessment Questions & Answers
1. What is the difference between roles and features in Windows
Server 2008?
2. What is installed when you choose the RSAT-DFS-MGMT-
Con feature?
3. How often should servers be backed up?
4. What are the different types of data backup that are
performed?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. What is the command to create a share?
6. What is a differential backup?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text112: Text113: Text114: Text115: Text116:
Text117:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Managing Group Policy Within the Microsoft Windows
Environment
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you created and linked Active Directory Group
Policy Objects (GPO) to
domain computers and used the Group Policy Manager Console
(GPMC) to deploy
security policies across the domain. You also generated policy
audit reports from the
GPMC and the Windows Command Prompt to analyze the
existence of and effectiveness
of the GPO.
Lab Assessment Questions & Answers
1. Is using the option to Store passwords using reversible
encryption a good security
practice? Why or why not?
2. Compare the GPO Report and the RSOP Report.
3. How often are GPO changes applied? Must the user be logged
off the system?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
4. Which GPO policy takes precedence in the case of a policy
conflict? Why?
5. What is the value of the Group Policy in an enterprise
environment?
6. What are some of the reasons that an organization would need
to document their
existing GPO settings?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text106: Text107: Text108: Text109: Text110:
Text111:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Identifying and Removing Malware from Windows Systems
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used AVG Business Edition, an antivirus and
anti-malware software tool,
to identify malware and malicious software from an infected
Windows 2012 workstation.
You researched remediations for the malware identified by the
scan, and took actions to
remove those programs. You also used Windows Defender to
perform the same actions
on a Windows 2008 workstation.
Lab Assessment Questions & Answers
1. What is the one thing that a virus, a worm, spyware, and
malicious code have in
common? What are the differences among these three threats: a
virus, a worm,
and spyware?
2. How often should you update your antivirus protection?
3. Why is it a best practice to have and to carry an antivirus
boot-up disk or CD?
4. In a corporate environment, should new antivirus definitions
be installed as soon
as they are available?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. Is the manual quick scan good enough protection for a
system?
6. What best practices for the workstation domain that can
mitigate the risks and
threats caused by malicious code?
7. If you have an up-to-date antivirus program, do you still need
a malware detection
program like Windows Defender?
8. What are some of the most common symptoms of malware?
9. What risk or threat do malware applications, such as spyware,
pose to the
workstation domain?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text97: Text98: Text99: Text100: Text101: Text102:
Text103: Text104: Text105:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Configuring BitLocker and Windows Encryption
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used the Microsoft Encrypting File System
(EFS) to encrypt files and
folders on a Windows Server 2012 machine. You documented
the success or failure of
your encryption efforts. You also installed Microsoft BitLocker
Drive Encryption, a data
protection feature that is used to resist data theft and the risk of
exposure from lost,
stolen, or decommissioned computers. You encrypted a data
drive on the remote server
and decrypted it using a recovery key.
Lab Assessment Questions & Answers
1. Within a Microsoft Windows Server 2012 environment, who
has access rights to
the EFS features and functions in the server?
2. What are some best practices you can implement when
encrypting BitLocker
drives and the use of BitLocker recovery passwords?
3. What was the recovery key generated by BitLocker in this
lab?
4. How would you grant additional users access rights to your
EFS encrypted folders
and data files?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. What are the main differences between EFS and BitLocker?
6. The customer privacy data policy in your company’s data
classification standard
requires encryption in two places: data stored locally or on a
LAN, and data
stored on a laptop. Describe your solution for meeting this
policy requirement.
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text1: Text2: Text3: Text4: Text5: Text6:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Using Access Control Lists to Modify File System Permissions
on Windows Systems
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used the Windows command-line utility,
icacls.exe, to establish file-level
permissions following a set of access control requirements. You
tested those permissions
by remotely accessing the Windows server and attempting to
modify files in the secured
folders. You used screen captures to document that the access
control changes you made
in this lab were properly applied.
Lab Assessment Questions & Answers
1. What is the principle of least privilege?
2. What does ACL stand for and how it is used?
3. Why would you add permissions to a group instead of the
individual?
4. List at least three different types of access control
permissions you can enable for
a file using icacls.exe.
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. Which access control permissions allow you to change files
and/or folders?
6. If you don’t remember the syntax when using icacls.exe, what
command do you
type to see the options?
7. Without using the icacls.exe tool, how could you view and
modify the privileges
of the files or folders of a shared drive?
8. Where do permissions modified using the icacls.exe tool
appear in the folder
Properties?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text83: Text84: Text85: Text86: Text87: Text88:
Text89: Text90:
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Implementing Access Controls with Windows Active Directory
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you used the Active Directory Domain Controller to
secure the C-I-A triad,
ensuring confidentiality and integrity of network data. You
created users and global
security groups and assigned the new users to security groups.
You followed a given set
of access control criteria to ensure authentication on the remote
server by applying the
new security groups to a set of nested folders. Finally, you
verified that authentication by
using the new user accounts to access the secured folders on the
remote server.
Lab Assessment Questions & Answers
1. Relate how Windows Server 2012 Active Directory and the
configuration of
access controls achieve C-I-A for departmental LANs,
departmental folders, and
data.
2. Is it a good practice to include the account or user name in
the password? Why or
why not?
3. What are some of the best practices to enhance the strength
of user passwords in
order to maximize confidentiality?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
4. Can a user who is defined in Active Directory access a shared
drive on a
computer if the server with the shared drive is not part of the
domain?
5. Does Windows Server 2012 R2 require a user’s
logon/password credentials prior
to accessing shared drives?
6. When granting access to network systems for guests (i.e.,
auditors, consultants,
third-party individuals, etc.), what security controls do you
recommend
implementing to maximize CIA of production systems and data?
7. In the Access Controls Criteria table, what sharing changes
were made to the
MGRfiles folder on TargetWindows01-DC server?
8. In the Access Controls Criteria table, what sharing changes
were made on the
TargetWindows01-DC server to allow Shopfloor users to
read/write files in the
C:LabDocumentsSFfiles folder?
9. In the Access Controls Criteria table, what sharing changes
were made on the
TargetWindows01-DC server to allow HumanResources users to
read/write files
in the C:LabDocumentsHRfiles folder?
10. Explain how C-I-A can be achieved down to the folder and
data file access level
for departments and users using Active Directory and Windows
Server 2012 R2
access control configurations. Configuring unique access
controls for different
user types is an example of which kind of access controls?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text73: Text74: Text75: Text76: Text77: Text78:
Text79: Text80: Text81: Text82:

More Related Content

Similar to Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend .docx

Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
 
Everything about Test Environments.pdf
Everything about Test Environments.pdfEverything about Test Environments.pdf
Everything about Test Environments.pdfEnov8
 
Feb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentFeb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentBarb Tillich
 
Lab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docxLab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docxAASTHA76
 
What are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdfWhat are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdfAnanthReddy38
 
Some of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docxSome of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docxwhitneyleman54422
 
Online student portal
Online student portalOnline student portal
Online student portalZobia Zafar
 
Creating Applications With Drupal
Creating  Applications With  DrupalCreating  Applications With  Drupal
Creating Applications With Drupalguest602bb9
 
Creating Applications With Drupal
Creating Applications With DrupalCreating Applications With Drupal
Creating Applications With Drupalguest602bb9
 
online learning and examination website
online learning and examination websiteonline learning and examination website
online learning and examination websiteAnuj Kumar
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxglendar3
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxtodd581
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive PRunning head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive PMalikPinckney86
 
How to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft TeamsHow to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft TeamsDux Raymond Sy
 
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMalbert0061
 

Similar to Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend .docx (20)

8th sem
8th sem8th sem
8th sem
 
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
 
Everything about Test Environments.pdf
Everything about Test Environments.pdfEverything about Test Environments.pdf
Everything about Test Environments.pdf
 
Feb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentFeb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition Development
 
Swetha Nelluru
Swetha NelluruSwetha Nelluru
Swetha Nelluru
 
Srs(at)
Srs(at)Srs(at)
Srs(at)
 
Lab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docxLab #1 – Assessment WorksheetImplementing Access Cont.docx
Lab #1 – Assessment WorksheetImplementing Access Cont.docx
 
What are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdfWhat are the latest trends and learning for Software Testers.pdf
What are the latest trends and learning for Software Testers.pdf
 
Some of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docxSome of the Material in this paper has been repurposed from C.docx
Some of the Material in this paper has been repurposed from C.docx
 
Ecommerce srs
Ecommerce  srsEcommerce  srs
Ecommerce srs
 
Online student portal
Online student portalOnline student portal
Online student portal
 
Creating Applications With Drupal
Creating  Applications With  DrupalCreating  Applications With  Drupal
Creating Applications With Drupal
 
Creating Applications With Drupal
Creating Applications With DrupalCreating Applications With Drupal
Creating Applications With Drupal
 
online learning and examination website
online learning and examination websiteonline learning and examination website
online learning and examination website
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive PRunning head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
 
How to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft TeamsHow to Get Your Organizations To Start Using Microsoft Teams
How to Get Your Organizations To Start Using Microsoft Teams
 
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
 
Software coding and testing
Software coding and testingSoftware coding and testing
Software coding and testing
 

More from vanesaburnand

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxvanesaburnand
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxvanesaburnand
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxvanesaburnand
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxvanesaburnand
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxvanesaburnand
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxvanesaburnand
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxvanesaburnand
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxvanesaburnand
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxvanesaburnand
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxvanesaburnand
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxvanesaburnand
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxvanesaburnand
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxvanesaburnand
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxvanesaburnand
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxvanesaburnand
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxvanesaburnand
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxvanesaburnand
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxvanesaburnand
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxvanesaburnand
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxvanesaburnand
 

More from vanesaburnand (20)

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docx
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docx
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docx
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docx
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docx
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docx
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docx
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docx
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docx
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docx
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docx
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docx
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docx
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docx
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docx
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docx
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docx
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend .docx

  • 1. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Creating a Scheduled Backup and Replicating System Folders Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you installed the Windows Distributed File System and Windows Server Backup features from the PowerShell command line. You scheduled a daily backup of
  • 2. the C:ERPdocuments folder on the TargetWindows01 server and replicated this backup to the TargetWindows02 server using the DFS Replication feature. Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? 2. What is installed when you choose the RSAT-DFS-MGMT- Con feature? 3. How often should servers be backed up? 4. What are the different types of data backup that are performed? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual
  • 3. 5. What is the command to create a share? 6. What is a differential backup? Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text112: Text113: Text114: Text115: Text116: Text117: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Managing Group Policy Within the Microsoft Windows Environment Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________
  • 4. Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you created and linked Active Directory Group Policy Objects (GPO) to domain computers and used the Group Policy Manager Console (GPMC) to deploy security policies across the domain. You also generated policy audit reports from the GPMC and the Windows Command Prompt to analyze the existence of and effectiveness of the GPO. Lab Assessment Questions & Answers 1. Is using the option to Store passwords using reversible encryption a good security practice? Why or why not? 2. Compare the GPO Report and the RSOP Report.
  • 5. 3. How often are GPO changes applied? Must the user be logged off the system? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 4. Which GPO policy takes precedence in the case of a policy conflict? Why? 5. What is the value of the Group Policy in an enterprise environment? 6. What are some of the reasons that an organization would need to document their existing GPO settings?
  • 6. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text106: Text107: Text108: Text109: Text110: Text111: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Identifying and Removing Malware from Windows Systems Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used AVG Business Edition, an antivirus and
  • 7. anti-malware software tool, to identify malware and malicious software from an infected Windows 2012 workstation. You researched remediations for the malware identified by the scan, and took actions to remove those programs. You also used Windows Defender to perform the same actions on a Windows 2008 workstation. Lab Assessment Questions & Answers 1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware? 2. How often should you update your antivirus protection? 3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD? 4. In a corporate environment, should new antivirus definitions be installed as soon as they are available?
  • 8. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 5. Is the manual quick scan good enough protection for a system? 6. What best practices for the workstation domain that can mitigate the risks and threats caused by malicious code? 7. If you have an up-to-date antivirus program, do you still need a malware detection program like Windows Defender? 8. What are some of the most common symptoms of malware? 9. What risk or threat do malware applications, such as spyware, pose to the workstation domain?
  • 9. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text97: Text98: Text99: Text100: Text101: Text102: Text103: Text104: Text105: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Configuring BitLocker and Windows Encryption Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used the Microsoft Encrypting File System (EFS) to encrypt files and
  • 10. folders on a Windows Server 2012 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the remote server and decrypted it using a recovery key. Lab Assessment Questions & Answers 1. Within a Microsoft Windows Server 2012 environment, who has access rights to the EFS features and functions in the server? 2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords? 3. What was the recovery key generated by BitLocker in this lab? 4. How would you grant additional users access rights to your EFS encrypted folders and data files?
  • 11. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 5. What are the main differences between EFS and BitLocker? 6. The customer privacy data policy in your company’s data classification standard requires encryption in two places: data stored locally or on a LAN, and data stored on a laptop. Describe your solution for meeting this policy requirement. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text1: Text2: Text3: Text4: Text5: Text6: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Using Access Control Lists to Modify File System Permissions
  • 12. on Windows Systems Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used the Windows command-line utility, icacls.exe, to establish file-level permissions following a set of access control requirements. You tested those permissions by remotely accessing the Windows server and attempting to modify files in the secured folders. You used screen captures to document that the access control changes you made in this lab were properly applied. Lab Assessment Questions & Answers 1. What is the principle of least privilege?
  • 13. 2. What does ACL stand for and how it is used? 3. Why would you add permissions to a group instead of the individual? 4. List at least three different types of access control permissions you can enable for a file using icacls.exe. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 5. Which access control permissions allow you to change files and/or folders? 6. If you don’t remember the syntax when using icacls.exe, what command do you type to see the options?
  • 14. 7. Without using the icacls.exe tool, how could you view and modify the privileges of the files or folders of a shared drive? 8. Where do permissions modified using the icacls.exe tool appear in the folder Properties? Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text83: Text84: Text85: Text86: Text87: Text88: Text89: Text90: Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Implementing Access Controls with Windows Active Directory Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________
  • 15. Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you used the Active Directory Domain Controller to secure the C-I-A triad, ensuring confidentiality and integrity of network data. You created users and global security groups and assigned the new users to security groups. You followed a given set of access control criteria to ensure authentication on the remote server by applying the new security groups to a set of nested folders. Finally, you verified that authentication by using the new user accounts to access the secured folders on the remote server. Lab Assessment Questions & Answers 1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data.
  • 16. 2. Is it a good practice to include the account or user name in the password? Why or why not? 3. What are some of the best practices to enhance the strength of user passwords in order to maximize confidentiality? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 4. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain? 5. Does Windows Server 2012 R2 require a user’s logon/password credentials prior to accessing shared drives? 6. When granting access to network systems for guests (i.e., auditors, consultants,
  • 17. third-party individuals, etc.), what security controls do you recommend implementing to maximize CIA of production systems and data? 7. In the Access Controls Criteria table, what sharing changes were made to the MGRfiles folder on TargetWindows01-DC server? 8. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01-DC server to allow Shopfloor users to read/write files in the C:LabDocumentsSFfiles folder? 9. In the Access Controls Criteria table, what sharing changes were made on the TargetWindows01-DC server to allow HumanResources users to read/write files in the C:LabDocumentsHRfiles folder? 10. Explain how C-I-A can be achieved down to the folder and data file access level for departments and users using Active Directory and Windows Server 2012 R2 access control configurations. Configuring unique access controls for different
  • 18. user types is an example of which kind of access controls? Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text73: Text74: Text75: Text76: Text77: Text78: Text79: Text80: Text81: Text82: