![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 08.03.2021 19:50 omriejs5
Securing Windows networks and systems requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability. As a security administrator working for Ken 7 Windows Limited, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security. You can select from a short list of security controls. For each security policy statement listed below, select an appropriate hardening technique to meet the requirements of the security policy statement. Provide rationale for each selection.
Select from these hardening techniques:
Place a firewall between the Internet and your Web server.
Place a firewall between your Web server and your internal network.
Enforce password complexity.
Implement Kerberos authentication for all internal servers.
Run weekly update checks for all software to ensure the latest patches have been applied.
Create a set of new user accounts with administrator privileges and disable all administrative-level user accounts.
Require all personnel attend a lunch and learn session on updated network security policies.
Security policy statements:
a. Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess.
b. Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.
c. Anonymous users of the Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous Web application users should be able to access any protected resources in the Ken 7 infrastructure.
d. To protect servers from attack, each server should authenticate connections based on the source computer and user.
Passwords should not be words found in the dictionary.
![ansver](/tpl/images/cats/User.png)
Answers: 3
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 20:30
Where is permanent data in the computer stored whenever gym starts his laptop he sees some commands in numbers appearing on the screen these instructions are being preceded by the control unit in
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 08:20
The main circuit board inside the system uit is called megaboard / true or false
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 08:30
Which of the following terms is described as βthe art and design of using textβ? a. typography b. elements of design c. typos d. graphic design
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 13:00
What are the different components of the cloud architecture?
Answers: 1
You know the right answer?
Securing Windows networks and systems requires recognizing potential vulnerabilities and selecting t...
Questions
![question](/tpl/images/cats/mat.png)
Mathematics, 30.10.2019 20:31
![question](/tpl/images/cats/fizika.png)
Physics, 30.10.2019 20:31
![question](/tpl/images/cats/geografiya.png)
Geography, 30.10.2019 20:31
![question](/tpl/images/cats/obshestvoznanie.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/istoriya.png)
History, 30.10.2019 20:31
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/istoriya.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 30.10.2019 20:31
![question](/tpl/images/cats/istoriya.png)
![question](/tpl/images/cats/fizika.png)
![question](/tpl/images/cats/en.png)
English, 30.10.2019 20:31
![question](/tpl/images/cats/mat.png)
Mathematics, 30.10.2019 20:31
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/biologiya.png)
Biology, 30.10.2019 20:31
![question](/tpl/images/cats/istoriya.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 30.10.2019 20:31
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 30.10.2019 20:31
![question](/tpl/images/cats/mat.png)
Mathematics, 30.10.2019 20:31
![question](/tpl/images/cats/obshestvoznanie.png)
Social Studies, 30.10.2019 20:31