Why is this setup not secure, Computer Network Security


a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and telephone number properties of the user object representing yourself. However, the New User command is unavailable to you. What is the most likely explanation?

b) You enable the password complexity policy for your domain under Windows Server 2003. Describe the requirements for passwords, and when those requirements will take effect.

c) A user has forgotten his or her password and attempts to log on several times with an incorrect password. Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The message suggests that the user contact an administrator. What must you do?

d) If your environment consists of two domains, one Windows Server 2003 and one Windows NT 4, what group scopes can you use for assigning permissions on any resource on any domain-member computer?

e) (i) On the network you administer, you maintain a primary DNS server authoritative for the zone lucernepublishing.com under windows Server 2003. You have also deployed two caching-only servers that forward all requests to the primary server. If most of the name queries directed toward the caching-only servers is for names within the lucernepublishing.com domain, which parameter can you modify on the primary server to decrease DNS query traffic between the caching-only servers and the primary server?

(ii) Under what conditions is it not considered secure to host a DHCP server on a domain controller? Why is this setup not secure?

Posted Date: 11/8/2013 2:51:26 AM | Location : United States

Related Discussions:- Why is this setup not secure, Assignment Help, Ask Question on Why is this setup not secure, Get Answer, Expert's Help, Why is this setup not secure Discussions

Write discussion on Why is this setup not secure
Your posts are moderated
Related Questions
Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

how can you enter the ASVAB practice test on line?

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po