SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Auditing the Workstation Domain for Compliance
1.What are some risks, threats, and vulnerabilities commonly found in the Workstation
Domain thatmust be mitigated through a layered security strategy? 2.File-sharing utilities
and client-to-client communication applications can provide the capability toshare files
with other users (for instance, peer-to-peer networking or sharing). What risks
and/orvulnerabilities are introduced with these applications?3.Explain how confidentiality
can be achieved in the Workstation Domain with security controlsand security
countermeasures.4Explain how data integrity can be achieved in the Workstation Domain
with security controls andsecurity countermeasures.5.Explain how availability can be
achieved in the Workstation Domain with security controls andsecurity
countermeasures.6.Although users of desktop applications might not create mission-critical
data, all of their datarepresents a resource that, if lost, can result in a permanent loss of
information or productivity.Explain what countermeasures and best practices should be
implemented to avoid this potentialdisaster.7.What is the purpose of the Microsoft
Windows Security Configuration and Analysis snap-in?Explain.8.How would you go about
updating the Windows Security Options File? Explain how this optioncan help mitigate risk
in the Workstation Domain.9.What does the Microsoft Windows executable GPResult.exe do
and what general informationdoes it provide? Explain how this application helps mitigate
the risks, threats, and vulnerabilitiescommonly found in the Workstation Domain.10.What
is the risk involved in caching logon credentials on a Microsoft Windows system?11.What is
the current URL for the location of the DISA Military STIGs on Microsoft Windows
7operating systems?12.Within the Windows 7 Security Technical Implementation Guide
(STIG), what are the threeVulnerability Severity Code Definitions defined?13.DumpSec is a
tool used by system administrators performing information assurance on aMicrosoft
Windows 7 workstation. What is the purpose of this tool?14.From the Windows 7 Security
Technical Implementation Guide (STIG), where can Windows 7File & Registry Settings be
reviewed and audited on a Windows 7 workstation?15.As per DoD and information
assurance procedures, who must be notified if any exceptions toDoD STIGs standards for
workstation configurations are to be implemented?

Weitere ähnliche Inhalte

Ähnlich wie Auditing the Workstation Domain for Compliance.docx

Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxannette228280
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxjessiehampson
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET Journal
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfadinathfashion1
 
APPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGESAPPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGESIJCSEIT Journal
 
Trusted computing: an overview
Trusted computing: an overviewTrusted computing: an overview
Trusted computing: an overviewTJR Global
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindset02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindseteva
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfsagaraccura
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...MohamedOmerMusa
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayDotha Keller
 

Ähnlich wie Auditing the Workstation Domain for Compliance.docx (20)

CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
APPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGESAPPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGES
 
Trusted computing: an overview
Trusted computing: an overviewTrusted computing: an overview
Trusted computing: an overview
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindset02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindset
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 

Mehr von write12

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docxwrite12
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxwrite12
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docxwrite12
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxwrite12
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docxwrite12
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxwrite12
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxwrite12
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxwrite12
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docxwrite12
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxwrite12
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxwrite12
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docxwrite12
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docxwrite12
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxwrite12
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docxwrite12
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docxwrite12
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docxwrite12
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docxwrite12
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxwrite12
 
social media.docx
social media.docxsocial media.docx
social media.docxwrite12
 

Mehr von write12 (20)

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docx
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docx
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docx
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docx
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docx
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docx
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docx
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docx
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docx
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docx
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docx
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
 
social media.docx
social media.docxsocial media.docx
social media.docx
 

Kürzlich hochgeladen

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Kürzlich hochgeladen (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

Auditing the Workstation Domain for Compliance.docx

  • 1. Auditing the Workstation Domain for Compliance 1.What are some risks, threats, and vulnerabilities commonly found in the Workstation Domain thatmust be mitigated through a layered security strategy? 2.File-sharing utilities and client-to-client communication applications can provide the capability toshare files with other users (for instance, peer-to-peer networking or sharing). What risks and/orvulnerabilities are introduced with these applications?3.Explain how confidentiality can be achieved in the Workstation Domain with security controlsand security countermeasures.4Explain how data integrity can be achieved in the Workstation Domain with security controls andsecurity countermeasures.5.Explain how availability can be achieved in the Workstation Domain with security controls andsecurity countermeasures.6.Although users of desktop applications might not create mission-critical data, all of their datarepresents a resource that, if lost, can result in a permanent loss of information or productivity.Explain what countermeasures and best practices should be implemented to avoid this potentialdisaster.7.What is the purpose of the Microsoft Windows Security Configuration and Analysis snap-in?Explain.8.How would you go about updating the Windows Security Options File? Explain how this optioncan help mitigate risk in the Workstation Domain.9.What does the Microsoft Windows executable GPResult.exe do and what general informationdoes it provide? Explain how this application helps mitigate the risks, threats, and vulnerabilitiescommonly found in the Workstation Domain.10.What is the risk involved in caching logon credentials on a Microsoft Windows system?11.What is the current URL for the location of the DISA Military STIGs on Microsoft Windows 7operating systems?12.Within the Windows 7 Security Technical Implementation Guide (STIG), what are the threeVulnerability Severity Code Definitions defined?13.DumpSec is a tool used by system administrators performing information assurance on aMicrosoft Windows 7 workstation. What is the purpose of this tool?14.From the Windows 7 Security Technical Implementation Guide (STIG), where can Windows 7File & Registry Settings be reviewed and audited on a Windows 7 workstation?15.As per DoD and information assurance procedures, who must be notified if any exceptions toDoD STIGs standards for workstation configurations are to be implemented?