Why is this setup not secure, Computer Network Security


a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and telephone number properties of the user object representing yourself. However, the New User command is unavailable to you. What is the most likely explanation?

b) You enable the password complexity policy for your domain under Windows Server 2003. Describe the requirements for passwords, and when those requirements will take effect.

c) A user has forgotten his or her password and attempts to log on several times with an incorrect password. Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The message suggests that the user contact an administrator. What must you do?

d) If your environment consists of two domains, one Windows Server 2003 and one Windows NT 4, what group scopes can you use for assigning permissions on any resource on any domain-member computer?

e) (i) On the network you administer, you maintain a primary DNS server authoritative for the zone lucernepublishing.com under windows Server 2003. You have also deployed two caching-only servers that forward all requests to the primary server. If most of the name queries directed toward the caching-only servers is for names within the lucernepublishing.com domain, which parameter can you modify on the primary server to decrease DNS query traffic between the caching-only servers and the primary server?

(ii) Under what conditions is it not considered secure to host a DHCP server on a domain controller? Why is this setup not secure?

Posted Date: 11/8/2013 2:51:26 AM | Location : United States

Related Discussions:- Why is this setup not secure, Assignment Help, Ask Question on Why is this setup not secure, Get Answer, Expert's Help, Why is this setup not secure Discussions

Write discussion on Why is this setup not secure
Your posts are moderated
Related Questions
Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of