the Local Security Policy computer science homework help

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadlines.


Order a Similar Paper Order a Different Paper

Choose 4 questions and answer, add reference under each question:

  1. How can you use the Local Security Policy to determine if someone has tried to hack into a user account?
  2. When securing a system, why is it important to audit failed attempts to access files?
  3. Which policy would you use to monitor when a user changes her password?
  4. In this lab, you monitor the activity of a single user. What would be a more efficient way to monitor the activities of a collection of users?
  5. Why does accessing one file create multiple events?
  6. What is the maximum number of characters that can be used in a Windows password?
  7. How can you configure Windows so that passwords are not required for user accounts?
  8. How can you configure a folder so that another user can view the files in the folder but not change them?
  9. What group policy needs to be set to allow auditing of folder access attempts?
  10. Why is it important to require passwords for all user accounts on a computer when you want to audit access to a folder?
  11. What prevents a standard user from disabling auditing on a Windows computer?
  12. Which file system must be used to enable encryption?
  13. What is necessary so that a USB flash drive can be used to hold encrypted files and folders?
  14. When you move an encrypted file from one computer to a second computer, what must you do first before you can open the encrypted file on the second computer?
  15. What happens to encryption when you move an encrypted file to a Windows 8 or a Windows 7 Home Premium computer? Explain your answer:
  16. What is the file extension for an exported certificate backup file?
  17. Why is it necessary to back up or export your encryption certificate key?
  18. How are rootkits different from other forms of malware?
  19. Why does running anti-malware software from another operating system (such as a Rescue CD/USB stick) do a better job than running the anti-malware software from Windows?
  20. Why are kernel-mode rootkits more dangerous than user-mode ones?
  21. Why should all other applications be closed before scanning for rootkits?
  22. Why is it preferable to require the Ctrl+Alt+Del key combination for logon?
  23. Why would you want to require a password to log on after the screen saver activates or the computer comes back on from sleep mode?
  24. How many characters should the minimum password length be for best security practice?
  25. What does setting the admin password (sometimes called the supervisor password) in UEFI/BIOS accomplish?
  26. Why would you want a power-on password?
  27. Should you rely only on the Windows password to protect your sensitive data stored on the hard drive?
  28. Why is it important to use a malware removal program, such as Windows Defender, rather than just being careful while surfing the web?
  29. Why is it important to update virus and spyware definitions on malware removal programs and how often should they be updated?
  30. Why would you want to quarantine malware and how do you delete quarantined malware from your system? Why could this be important?

"Is this question part of your assignment? We can help"

ORDER NOW

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper