Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Risks threats and vulnerabilities commonly found in the workstation domain

13/10/2021 Client: muhammad11 Deadline: 2 Day

Casestudy

Requirement:

Please complete the Lab 6, 7,8 & 9 available on the Module 8 home page
Include at least 5 peer-reviewed sources properly cited and referenced and your course textbook.

Writing Requirements

8 pages in length (excluding cover page, abstract, and reference list)
5 peer-reviewed sources
APA format, Use the APA template located in the Student Resource Center to complete the assignment.
Please use the Case Study Guide as a reference point for writing your case study.

50 LAB #6 | Auditing the Workstation Domain for Compliance

Lab #6 - Assessment Worksheet

Auditing the Workstation Domain for Compliance Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

In this lab, you learned to recognize the risks, threats, and vulnerabilities commonly found in the Workstation Domain, you identified known vulnerabilities and exploits on the Common Vulnerabilities & Exposures (CVE) database listing, you described how risks, threats, and vulnerabilities or misconfigurations at the operating system level in the Workstation Domain might expose that workstation, and you identified steps to harden the Workstation Domain operating system and applications installed on the user’s workstation for compliance and safeguarding of sensitive data and access to that data. Finally, you applied Department of Defense (DoD) guidelines for securing the Workstation Domain, including the review and assessment of Windows 7 and Windows 2008 security guidelines.

Lab Assessment Questions & Answers

1. What are some risks, threats, and vulnerabilities commonly found in the Workstation Domain that must be mitigated through a layered security strategy?

2. File-sharing utilities and client-to-client communication applications can provide the capability to share files with other users (for instance, peer-to-peer networking or sharing). What risks and/or vulnerabilities are introduced with these applications?

3. Explain how confidentiality can be achieved in the Workstation Domain with security controls and security countermeasures.

51

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual

4. Explain how data integrity can be achieved in the Workstation Domain with security controls and security countermeasures.

5. Explain how availability can be achieved in the Workstation Domain with security controls and security countermeasures.

6. Although users of desktop applications might not create mission-critical data, all of their data represents a resource that, if lost, can result in a permanent loss of information or productivity. Explain what countermeasures and best practices should be implemented to avoid this potential disaster.

7. What is the purpose of the Microsoft® Windows Security Configuration and Analysis snap-in? Explain.

8. How would you go about updating the Windows Security Options File? Explain how this option can help mitigate risk in the Workstation Domain.

9. What does the Microsoft® Windows executable GPResult.exe do and what general information does it provide? Explain how this application helps mitigate the risks, threats, and vulnerabilities commonly found in the Workstation Domain.

10. What is the risk involved in caching logon credentials on a Microsoft® Windows system?

11. What is the current URL for the location of the DISA Military STIGs on Microsoft® Windows 7

operating systems?

52 LAB #6 | Auditing the Workstation Domain for Compliance

12. Within the Windows 7 Security Technical Implementation Guide (STIG), what are the three Vulnerability Severity Code Definitions defined?

13. DumpSec is a tool used by system administrators performing information assurance on a

Microsoft® Windows 7 workstation. What is the purpose of this tool?

14. From the Windows 7 Security Technical Implementation Guide (STIG), where can Windows 7 File & Registry Settings be reviewed and audited on a Windows 7 workstation?

15. As per DoD and information assurance procedures, who must be notified if any exceptions to DoD STIGs standards for workstation configurations are to be implemented?

Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:
Question1:
Question2:
Question3:
Question4:
Question6:
Question7:
Question8:
Question9:
Question10:
Question11:
Question5:
Question12:
Question13:
Question14:
Question15:

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Academic Master
Assignment Guru
Financial Hub
ECFX Market
Quick Finance Master
Homework Master
Writer Writer Name Offer Chat
Academic Master

ONLINE

Academic Master

Give me a chance, i will do this with my best efforts

$35 Chat With Writer
Assignment Guru

ONLINE

Assignment Guru

I have read your project details. I can do this within your deadline.

$20 Chat With Writer
Financial Hub

ONLINE

Financial Hub

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$49 Chat With Writer
ECFX Market

ONLINE

ECFX Market

Give me a chance, i will do this with my best efforts

$44 Chat With Writer
Quick Finance Master

ONLINE

Quick Finance Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$24 Chat With Writer
Homework Master

ONLINE

Homework Master

I will cover all the points which you have mentioned in your project details.

$49 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Provide financial and business performance information assignment - Pristiq 25 mg chemist warehouse - Khan academy join your class - How you put people together affects - Words that start with od - Minitab relative frequency histogram - 5-2 Final Project Milestone Three: Analysis of Ethics - Week 6 Assignment: Course Project Part I - Os detection consolidation and reporting - Aluminum nitride ionic compound - 540 dis - Filipino tattoos ancient to modern - Mca metal roof installation manual - Chronic Disease Management - Gunned down the power of the nra worksheet - Trevor noah languages are scary - Singularities in complex analysis examplessingularities in complex analysis examples - Declared area of outstanding biodiversity value - Organisation of data in statistics - Royal north shore birth unit - 2 coments each one 150 words (CITATION AND REFERENCE) BY 9/2 - Language akin to yupik crossword - What pricing strategy does kohls use - Jb hi fi phone warranty - The parthenon (fig. 15.9) in athens is an example of the ________ style of architecture. - Wollondilly anglican college tahmoor - Moody's diversity score calculator - White garment worn by priests - Cambridge primary progression test papers stage 3 - Apr formula core maths - Elite realty acts as an agent in buying - Why is there no electric field inside a conducting sphere - Chapter 1 giver summary - Milton keynes council rent - Systems engineering vce units 1-4 pdf - Assignment 1 - For lunch, kesia eats a piece of salmon with garlic butter. which statement is true about her meal? - Memorandum - Swami niranjan yoga nidra - Inverell council tenders and expressions of interest - Which of the following is true of directors of antirealism - Few lines on drawing room - Bi color led circuit - Heart of darkness kurtz mistress - Sociology - George washington carver ducksters - What does the box in a box plot represent - Under armour advertising budget 2016 - El caballo lifestyle village - Is kfc a public limited company - Mid term break poem - 750 words A review of two research articles - Literature review matrix template doc - Reunion by john cheever summary - Mini-Assignment - Menards procter and gamble rebate - Capstone help - Strategic group map craft beer industry - Watercolor simplified pat weaver - American beauty window scene - Bni referral slip education - Blade and soul climbing to greater heights - Homework Question - Quiz questions - Math Questions due at 10:00pm tonight. - Lost at sea ranking chart - Procedures in maintaining office equipment - Nithyananda peetam bengaluru karnataka - EH week10 DB - SUMMARIZE A PASSAGE - Trail making test b interpretation - Google project oxygen 8 rules - Case study supply and demand - Which of the following statements regarding fixed costs is incorrect - Iris diaphragm microscope function - Process equipment design ppt - Beach a river of sand - The road to hell case study answers - Comparative stasiland and never let me go - Adobe marketing cloud id - Assume that on february procter & gamble - Up in michigan hemingway analysis - Helmet manufacturing plant cost - Case study in IT field - Vce psychology study design 2020 - Oral motor exam cranial nerves - The gift by li young lee theme - Uml diagram for student registration system - Advantages of diagrammatic representation - WRD - Journal of inequalities in pure and applied mathematics - Factor market and product market examples - Hells angels clubhouse coquitlam - How to present nmr data - PNEUMATIC AND HYDRAULIC EQUIPMENT - Edwards and chaffey reserve cabernet 2013 price - Summary of serving in florida by barbara ehrenreich - Feedback mechanism in animals - Action Plan Assignment - Management Principles, Two Papers each 2 and half min pages of full text MLA