Unit 6 Lab Questions
IS4680
1. What are some common risks, threats, and vulnerabilities commonly found in the Workstation Domain that must be mitigated through a layered security strategy?
2. File sharing utilities and client-to-client communication applications can provide the ability to share files with other users (i.e., Peer-to-Peer Networking or Sharing). What risks and/or vulnerabilities are introduced with these applications?
3. Explain how confidentiality can be achieved within the Workstation Domain with security controls and security countermeasures.
4. Explain how data integrity cab be achieved within the Workstation Domain with security controls and security countermeasures.
5. Explain how availability can be achieved within the Workstation Domain with security controls and security countermeasures.
6. Although users of desktop applications may not be creating mission critical data, all their data represents a resource that, if lost, could result in a permanent loss of information or productivity. Explain what countermeasures and best practices should be implemented to avoid this potential disaster.
7. What is the purpose of the Microsoft Windows Security Configuration and Analysis Snap-In? Explain.
8. How would you go about updating the Windows Security options File? Explain how this option can help mitigate risk within the Workstation Domain.
9. What does the Microsoft Windows executable GPResult.exe do and what general information does it provide? Explain how this application helps mitigate the risks, threats, and vulnerabilities commonly found in the Workstation Domain.
10. What is the risk involved in caching logon credentials on a Microsoft Windows system?
11. What is the current URL for the location of the DISA military STIGs on Microsoft Windows 7 Operating Systems?
12. Within the Windows 7, Security Technical implementation Guide (STIG) Version 1, Release 5, dated July 29, 2011, what are the 3 Vulnerability Security Code Definitions defined?
Vulnerability Severity Codes |
|
Category I |
Vulnerabilities that allow an attacker immediate access into a machine, allow superuser access, or bypass a firewall. i.e. Granting unnecessary accounts the User Right Act as part of the Operating System as an example with Windows |
Category II |
Vulnerabilities that provide information that have a high potential of giving access to an intruder. i.e. Not requiring password complexity would increase the risk of an intruder gaining access. |
Category III |
Vulnerabilities that provide information that potentially could lead to compromise. i.e. Allowing users to install printer drivers could potentially lead to compromise with unapproved drivers. |
13. From the Windows 7, Security Technical Implementation Guide (STIG) Version 1, Release 5, where can Windows 7 – File & Registry Settings be reviewed and audited on a Windows 7 workstation?
14. DumpSec is a tool used by System Administrators performing Information Assurance on a Microsoft Windows 7 workstation. What is the purpose of this tool?
15. As per DoD and Information Assurance procedures, who must be notified if any exceptions to DoD STIDs standards for Workstation configurations are to be implemented?
Our motto is deliver assignment on Time. Our Expert writers deliver quality assignments to the students.
Get reliable and unique assignments by using our 100% plagiarism-free.
Get connected 24*7 with our Live Chat support executives to receive instant solutions for your assignment.
Get Help with all the subjects like: Programming, Accounting, Finance, Engineering, Law and Marketing.
Get premium service at a pocket-friendly rate at AssignmentHippo
I was struggling so hard to complete my marketing assignment on brand development when I decided to finally reach to the experts of this portal. They certainly deliver perfect consistency and the desired format. The content prepared by the experts of this platform was simply amazing. I definitely owe my grades to them.
Get instant assignment help