the Local Security Policy, computer science homework help
the Local Security Policy, computer science homework help
Choose 4 questions and answer, add reference under each question:
- How can you use the Local Security Policy to determine if someone has tried to hack into a user account?
- When securing a system, why is it important to audit failed attempts to access files?
- Which policy would you use to monitor when a user changes her password?
- In this lab, you monitor the activity of a single user. What would be a more efficient way to monitor the activities of a collection of users?
- Why does accessing one file create multiple events?
- What is the maximum number of characters that can be used in a Windows password?
- How can you configure Windows so that passwords are not required for user accounts?
- How can you configure a folder so that another user can view the files in the folder but not change them?
- What group policy needs to be set to allow auditing of folder access attempts?
- Why is it important to require passwords for all user accounts on a computer when you want to audit access to a folder?
- What prevents a standard user from disabling auditing on a Windows computer?
- Which file system must be used to enable encryption?
- What is necessary so that a USB flash drive can be used to hold encrypted files and folders?
- When you move an encrypted file from one computer to a second computer, what must you do first before you can open the encrypted file on the second computer?
- What happens to encryption when you move an encrypted file to a Windows 8 or a Windows 7 Home Premium computer? Explain your answer:
- What is the file extension for an exported certificate backup file?
- Why is it necessary to back up or export your encryption certificate key?
- How are rootkits different from other forms of malware?
- Why does running anti-malware software from another operating system (such as a Rescue CD/USB stick) do a better job than running the anti-malware software from Windows?
- Why are kernel-mode rootkits more dangerous than user-mode ones?
- Why should all other applications be closed before scanning for rootkits?
- Why is it preferable to require the Ctrl+Alt+Del key combination for logon?
- Why would you want to require a password to log on after the screen saver activates or the computer comes back on from sleep mode?
- How many characters should the minimum password length be for best security practice?
- What does setting the admin password (sometimes called the supervisor password) in UEFI/BIOS accomplish?
- Why would you want a power-on password?
- Should you rely only on the Windows password to protect your sensitive data stored on the hard drive?
- Why is it important to use a malware removal program, such as Windows Defender, rather than just being careful while surfing the web?
- Why is it important to update virus and spyware definitions on malware removal programs and how often should they be updated?
- Why would you want to quarantine malware and how do you delete quarantined malware from your system? Why could this be important?
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..
