Intro to Iss

In: Computers and Technology

Submitted By mikeydubb
Words 312
Pages 2
Lab 3

1. What are the three fundamental elements of an effective access control solution for information systems? Identification, Authentication, and Authorization
2. What two access controls can be setup for a Windows Server 2003 folders and authentication?
Denying access to unauthorized users, and by limiting the extent of access provided to authorized users.
3. If you can browse a file on a Windows network share but are not able to copy it or modify it what type of access controls and permissions are probably configured? Role-based access control. What type of Access Control would best describe this access control situation? User only has read only access.
4. What is the mechanism on a Windows Server where you can administer granular policies and permissions on a Windows network using role-based access?
Role-based access control
5. What is two-factor authentication and why is it an effective access control technique?
Is something the user knows and something the user has. This provides an extra layer of security.
6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data.
7. Is it a good practice to include the account or user name in the password? Why or why not? No it is not. It is one of the first things a hacker would try to guess.
8. Can a user who is defined in the Active Directory access a shared drive if that user is not part of the domain? No.
9. Does Windows Server 2003 require a user’s login/password credentials prior to accessing shared drives? Yes
10. When granting access to LAN systems for GUESTS (i.e., auditors, consultants, third party individuals, etc.), what security controls do you recommend be implemented in order to maximize C-I-A of production systems and data?…...