Lab3

In: Computers and Technology

Submitted By rex099
Words 279
Pages 2
56

Lab #3 | Configure BitLocker and Windows Encryption

LAB #3 – ASSESSMENT WORKSHEET

Configure BitLocker and Windows Encryption
Course Name and Number:
IS3340 Windows Security

Student Name:
Daniel Longo

Instructor Name:
Dakrouni

Lab Due Date:
10/4/2013

Overview
In this lab, you used the Microsoft® Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2008 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft® BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the server and created a recovery key.

Lab Assessment Questions & Answers
1. Within a Microsoft® Windows 2008 server R2 environment, who has access rights to the EFS features and

functions in the server?

2. What are some best practices you can implement when encrypting BitLocker drives and the use of

BitLocker recovery passwords?

38542_Lab03_Pass2.indd 56

3/2/13 10:01 AM

Assessment Worksheet
3. What was the recover key created by BitLocker in this lab?

57

4. BitLocker secured drives. How would you grant additional users access rights to your EFS encrypted

folders and data files?

5. What are the main differences between EFS and BitLocker?

6. The customer privacy data policy in your company’s data classification standard requires encryption in

3
Configure BitLocker and Windows Encryption

two places: data stored in a user’s personal data folders and data stored on the LAN’s shared disk drives. Describe your solution for meeting this policy requirement.

38542_Lab03_Pass2.indd 57

3/2/13 10:01 AM

38542_Lab03_Pass2.indd 58

3/2/13 10:01 AM…...

Similar Documents

Phys216 Lab3

...Worksheet for Interactive Lab3: Circular Motion Name _____________ Physics 216 Grade ___/42 Date ______ Circular motion is one of the fundamental building blocks for understanding the physical world because it is so common. This interactive lets you examine the basic ideas of kinematics and forces for objects moving in circular motion. 1. (6 points) Use the controls under Show Vectors to draw arrows for several different quantities. The velocity vector is drawn in a special way: a big, bold arrow showing its direction and magnitude, plus smaller arrows for its horizontal and vertical components. * How are the directions of the acceleration and force vectors related? Force has a magnitude and a direction, and it is a vector. If a force is applied to an object, the object will accelerate in proportion to the magnitude of the force and in the direction of the applied force * What about the directions of the velocity and force vectors? The velocity of the object changes in response to the application of force. * And how are they influenced by the increase in mass and velocity slide bars? This question can be answered by the equation F = ma or force equals the product of mass and acceleration. An increase in mass or acceleration will result in more force. 2. (6 points) The large slider on the left changes the angle at which you view the spinning system. Try watching the motion from above (the default) and from the side. What would the system look...

Words: 1008 - Pages: 5

Nt2580 Lab3

...50 Lab #3 | Enable Windows Active Directory and User Access Controls LAB #3 – ASSESSMENT WORKSHEET Enable Windows Active Directory and User Access Controls Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab provides students with the hands-on skills needed to create a new Active Directory domain in Windows Server 2003 and demonstrates how to configure a centralized authentication and policy definition for access controls. The Active Directory users and workstation plug-ins will be used to create users, groups, and configure role-based access permissions and controls on objects and folders in a Windows Server 2003 Active Directory system. Lab Assessment Questions & Answers 1. What two access controls can be set up for Windows Server 2003 folders and authentication? Authentication and Access control. 2. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? List Folder Contents 3. What is the Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access? Group Policy Editor 38351_LB03_Pass2.indd 50 26/02/13 11:54 PM Assessment Worksheet 51 4. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. creates security...

Words: 431 - Pages: 2

Lab3

...56 Lab #3 | Configure BitLocker and Windows Encryption LAB #3 – ASSESSMENT WORKSHEET Configure BitLocker and Windows Encryption Course Name and Number: IS3340 Windows Security Student Name: Daniel Longo Instructor Name: Dakrouni Lab Due Date: 10/4/2013 Overview In this lab, you used the Microsoft® Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2008 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft® BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the server and created a recovery key. Lab Assessment Questions & Answers 1. Within a Microsoft® Windows 2008 server R2 environment, who has access rights to the EFS features and functions in the server? 2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords? 38542_Lab03_Pass2.indd 56 3/2/13 10:01 AM Assessment Worksheet 3. What was the recover key created by BitLocker in this lab? 57 4. BitLocker secured drives. How would you grant additional users access rights to your EFS encrypted folders and data files? 5. What are the main differences between EFS and BitLocker? 6. The customer privacy data policy in your company’s data classification standard requires encryption in 3...

Words: 279 - Pages: 2

218 Report

...]= *bigInteger1[i]- *bigInteger2[i]; else *result[i]= (*bigInteger1[i]+10- *bigInteger2[i]); *result[i+1]=*result[i+1]-1; Multiplication: for(int a=digInteger1; a>0; a--) *result=addition(multiplier); 2. Flowchart 3. Compiling Instruction # include "Lab3.h" # include <cstdlib> # include <cmath> char *add; char *sub; //char *mult; //char *div; int num1,num2,d1,d2; BigInteger::BigInteger() { digit1=NULL; numdigits1=0; digit2=NULL; numdigits2=0; } BigInteger::~BigInteger() { if(digit1!=NULL&&digit2!=NULL) { delete []digit1; delete []digit2; } else if(digit1!=NULL) { delete []digit1; } else delete []digit2; } int BigInteger::addDigit1(string a) { string l; int num1=0; do { if(digit1==NULL) { numdigits1++; l=a.substr(num1,1); digit1=new char[numdigits1]; strcpy(digit1,l.c_str()); num1++; } else { char *temp = new char[numdigits1+1]; for(int i=0;i<numdigits1;i++) { *(temp+i) = *(digit1+i); } l=a.substr(num1,1); strcpy((temp+numdigits1),l.c_str()); //delete []digit1; digit1=temp; numdigits1++; num1++; } l=a.substr(num1,1); } while(l!=""); return numdigits1; } int BigInteger::addDigit2(string b) { string l; int......

Words: 2137 - Pages: 9

My Paper on Things and Stuff

... group on all machines in the Servers OU Workstation Admins – adds the Server Admins, Domain Admins, and Faculty security groups to the Administrators group on all machines in the Workstations OU (can adjust depending on who client would like to have admin access) Internet Explorer Settings – Applies IE managed settings to all machines in the Workstations OU. Currently empty, can discuss what options should be managed. WorkstationDisplay – locks desktop background and screen saver, enables screen saver, sets screensaver timeout to 10 and requires password on resume. Applied to all devices in Workstations OU Lab1Printers, Lab2Printers, Lab3Printers – Automatically maps the printers in the corresponding lab, setting printer 1 as the primary. Applies to devices in Lab1, Lab2, and Lab3 OU, respectively. (currently points to printers using following naming structure: \\PrintSrv01\Lab1Printer1 \\PrintSrv01\Lab3Printer2 , can fix path to reflect actual names) Enabled group policy loopback on all User Configurations to be applied to OUs based on user account. Additional GPOs can be added after discussing with client....

Words: 409 - Pages: 2

Gang Street

...REFERENCES 1) http://chemed.chem.purdue.edu/genchem/lab/equipment/pipet/error.html 2) http://www.indiana.edu/~nimsmsf/P215/p215notes/LabManual/Lab3.pdf 3) http://www.biochem.duke.edu/wysiwyg/downloads/GrimsleyPace.pdf 4) http://www.clinchem.org/content/21/6/776.full.pdf INTRODUCTION Basic Laws of Light Absorption. For a uniform absorbing medium (solution: solvent and solute molecules that absorb light) the proportion of light radiation passing through it is called the transmittance, T, and the proportion of light absorbed by molecules in the medium is absorbance, Abs. Transmittance is defined as: T = I/Io where: Io= intensity of the incident radiation entering the medium. I = intensity of the transmitted radiation leaving the medium. T is usually expressed as percent transmittance, %T: %T = I/Io x 100 The relationship between percent transmittance (%T) and absorbance (A) is given by the following equation: A = 2-log (%T) On most spectrophotometers two scales are present, %T and Abs. Absorbance has no units (Why?) and varies from 0 to 2 (linear region for most substances is from 0.05 to 0.7). The Beer-Lambert Law states that Abs is proportional to the concentration (c) of the absorbing molecules, the length of light-path through the medium and the molar extinction coefficient: A = εcl where: ε = molar extinction coefficient for the absorbing material at wavelength in units of 1/(mol x cm) c...

Words: 376 - Pages: 2

Stewart Netsecurity Lab3

...Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? on 172.30.0.1 port 23 is using telnet port 22 is using ssh on 172.30.0.200 port 23 is using telnet as well port 22 is using ssh Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). The good guys (practitioner) are using nmap to make their network safer. The network management team uses nmap to identify unknown IP addresses that appear in reports or in a network analysis trace. The security team uses nmap to scan the internal network for a specific open port that might help to identify the extent of a spyware infestation. The bad guys (hackers) are already using nmap for reconnaissance, because a single scan can tell you a lot about the open doors and windows in a computer's house. 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. -T4 -A Turn on OS and version detection scanning script (IPv4) -v verbosity options, you can gain information about the remote operating system -PE Standard ICMP Echo Request -PS send SYN packets instead of ACK packets for your TCP Ping 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. -A Turn on OS and version...

Words: 509 - Pages: 3

Sociology

..., called banner, reads input from standard input and sends its output to standard output. Run this program so that it reads input from the student.records file and sends its output to the output.data file. Error messages are appended to the error.log file. Show your session. 11. Create a file test.data using the cat command that contains the following data. Once you have created the file, display its content with the cat command. Show your session. $ cat > test.data This data is to be stored in a file called test.data by using the cat command. We can create the test.data file with this data by using a text editor such as vi. However, the purpose of this exercise is to show an interesting use of output redirection. 12. Combine data in the following files (in this order) and append it to the all.labs file: lab1, lab2, lab3, and lab4. Any errors should be redirected to the error.log file. Show your session. $ cat lab1 lab2 lab3 lab4 >> all.labs 2> error.log 13. The smallFile file used in Lab 10 contains student records. Use a command line to display the records for the top five students in ascending (sorted) order, i.e., with the highest GPA student’s record displayed first. Show your session. $ sort +3 -r -b smallFile | head -5 14. Create two FIFOs, called fifo1 and fifo2. Use these FIFOs, the tee command, and I/O redirection operators to generate the following output: total number of processes running on the......

Words: 5471 - Pages: 22

Lab3

...Name ____Anjad itayem______________ Projectile Motion Go to http://phet.colorado.edu/simulations/sims.php?sim=Projectile_Motion and click on Run Now. Pre Lab Reflections: What are the • What forces are at play on a body under fall ? gravity and air resistance • Make a prediction of which angle results in maximum range. My prediction is that angel of 70 degrees will be the mazimum range Activity: - Open the sim, projectile motion. - Familiarize yourself with the variables shown there. - Ensure the air resistance check box remains unchecked. - Using the mouse set the angle of projection(i) to 5 deg. Alternatively enter the value in directly. - Set the initial speed to a value U=15m/s . - Click on Fire to start the projectile and record the corresponding value of the range R. - Repeat with values i= 10,15,20,25,30,35,40,45,50,60,70,75,80,85. - Draw a graph of Range (R) against Angle of projection (i) You may want your lay out to appear like in the table. U=……… |Angle (i) |Range(m) | |5 |9.7 | |10 |12.2 | |15 |14.9 | |20 |17.5 | |30 |21.8 | |35 |23.2...

Words: 404 - Pages: 2

Lab3

...LAB 3.2 3.1.2 Using Figure 3-1 define each layer of the OSI model in your own words and state what layer provides. Use your textbook or internet to support your answer. Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads 3.2.2 Using Figure 3-2 as a basis, complete the diagram to show the intermediate encapsulation provided by each layer. Application Presentation Session | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.3 Briefly explain the deencapsulation steps in the communication from host B receiving a message from host A destined for an active application. First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the Transport layer processes the segment...

Words: 347 - Pages: 2

Ip Subnetting Project

... restrictions on the hours of operation for payroll DBs and only specific personnel should have access to Human Resources systems. Members of the sales and finance department have abused internet privileges. For assigning IP addresses you can pick any one from the following network addresses. 172.16.0.0/16 172.17.0.0/16 172.18.0.0/16 172.19.0.0/16 172.20.0.0/16 10.10.0.0/16 10.5.0.0/16 10.6.0.0/16 10.7.0.0/16 10.8.0.0/16 Fc00::/7   IP ADDRESSING TABLE Location Number of IP Addresses Required Address Block Assigned San Francisco 1290 172.16.0.0-172.16.7.255/21 Denver Region Denver Campus 441 Remote Office 1 28 Call Center 1 150 Remote Office 2 35 Houston Region Houston Campus 329 Remote Office 3 21 Call Center 2 135 Research and Development R&D IPv6 Lab1 600 R&D IPv6 Lab2 310 R&D IPv6 Lab3 90 Deliverables: Your paper should address the following XUMUC Network Issues. Addresses the issues described above. • Create VLAN, as appropriate, to minimize and Isolate broadcast traffic. • Reduce WAN Traffic • Develop a new IP scheme summarizing at points shown in the diagram The Assignment must comply with APA style and should contain: • Cover page • Index Page • Main Body (3 to 5 Pages) Not to exceed 5 pages of Main body • Executive summary • Technical details (including any assumptions) o Details that address all issues described above o Completed IP addressing table (including......

Words: 526 - Pages: 3

Book Review

... merge allows the shop to appreciate its frequent customers by discounting their next purchases. This makes the proposed pos suitable for selling the skating boards. Other factors not covered by lab3 sheet evaluation like security, pricing and general reporting should also be considered to arrive at a better recommendation for the suitability of the POS system. Task 2 Alternative solutions are meant to ensure that the client settles on the best POS based on their quality and performance. The alternate solutions should offer different point of views for the POS, this diverse view allows the user to flex their decisions and go for what satisfies their requirements. Square is one of the alternative solutions for the POS. The Square POS is fully customized to integrate to existing hardware. One of the outstanding pros of square is that it accepts all common credit and debit cards. It also allows next day deposits. This means that in the skate board selling point, all transactions made in a day are banked the following day, this gives more convenience to the skate board selling shop. The square also allows for offline swipe. This means it doesn’t breakdown or halt transaction when offline. This improves the dependability on this POS. Square POS can also send receipts through text or emails. It also has a print out option, more to this, it allows for signature and logo customization. Customers can make orders online from anywhere; this is in conformance of modern trade...

Words: 2915 - Pages: 12

Lab3

...ET1410 - Module 2 - Homework Wk3 Due: Beginning of Class Week 4 Student Name: _________________________ Instructions: This is a homework assignment that covers Week 3 of our ET1410 class. You should neatly show your steps in the middle column, and provide your final answer in the right hand column. NEATNESS COUNTS. You must work in pencil, not pen. Must include units of measure in your answer!!! If no units, or incorrect units, points will be deducted. ProblemNo. | Your Solution | Final Answer (Restate Your Final Answer Here) | 1 | The upper critical frequency of an op-amp’s open-loop response is 200 Hz. If the midrange gain is 175,000 what is: (a) ideal gain at 200 Hz? (b) the actual gain? (c) The op-amps open loop bandwidth? | (a)____________(b)____________(c)____________ | 2 | Determine the attenuation of an RC lag network with fc = 12 kHz for each of the following frequencies. (a) 1 kHz (b) 5 kHz (c) 12 kHz (d) 20 kHz (e) 100 kHz | (a)____________(b)____________(c)____________(d)____________(e)____________ | 3 | Determine the phase shift through the network at a frequency of 2 kHz: | | 4 | Determine the phase shift through the network at a frequency of 2 kHz: | | 5 | Determine the phase shift through the network at a frequency of 2 kHz: | | 6 | A certain op-amp has three internal amplifier stages with midrange gains of 30dB, 40dB, and 20dB. Each stage also has a critical frequency associated with it as follows: fc1...

Words: 484 - Pages: 2

Cis 170 C Ilab 3 of 7 Looping

... continue . . . Step 2: Processing Logic Using the pseudocode below, write the code that will meet the requirements. Write report heading Loop as long as there are divers to process Input diver’s name and city Initialize highest score, lowest score and total score Using a do-while loop input the 5 judge’s scores Validate the score to ensure it is between 0 and 10 Add score to total Determine highest and lowest scores Input and validate the degree of difficulty Calculate the overall diver’s score Display the diver’s information and overall score Add diver’s overall score to the final score Add 1 to the number of divers Prompt the user if she wants to process another diver End-Loop Calculate the average score for all divers Display the number of divers and the average score for all divers Step 3: Create a New Project Create a new project and name it LAB3. Write your code using the Processing Logic in Step 2. Make sure to save your program. Step 4: Build Solution To compile the program, click Debug then Build solution (F7). You should receive no error messages. If you see some error messages, check the code above to make sure you didn’t key in something wrong. Once you make your corrections to the code, go ahead and click Build >> Build Solution again. Step 5: Execute the Program Once you have no syntax errors, to execute or run your program, click Debug on the menu bar and then click Start Debugging. Step 6: Capture the Output Capture a screen......

Words: 1109 - Pages: 5

Cis 170 Lab 3

... below, write the code that will meet the requirements.Write report headingLoop as long as there are divers to process Input diver's name and city Initialize highest score, lowest score and total score Using a do-while loop input the 5 judge's scores Validate the score to ensure it is between 0 and 10 Add score to total Determine highest and lowest scores Input and validate the degree of difficulty Calculate the overall diver's score Display the diver's information and overall score Add diver's overall score to the final score Add 1 to the number of divers Prompt the user if she wants to process another diverEnd-LoopCalculate the average score for all diversDisplay the number of divers and the average score for all divers | Step 3: Create a New Project | Create a new project and name it LAB3. Write your code using the Processing Logic in Step 2. Make sure to save your program. | Step 4: Build Solution | To compile the program, click Debug then Build solution (F7). You should receive no error messages. If you see some error messages, check the code above to make sure you didn’t key in something wrong. Once you make your corrections to the code, go ahead and click Build >> Build Solution again. | Step 5: Execute the Program | Once you have no syntax errors, to execute or run your program, click Debug on the menu bar and then click Start Debugging. | Step 6: Capture the Output | 1. Capture a screen print of your output. (Do a PRINT SCREEN and......

Words: 1057 - Pages: 5