Preview

Lab 4 MBSA Scan IT1400

Satisfactory Essays
Open Document
Open Document
527 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 4 MBSA Scan IT1400
Security assessment: Severe Risk
Computer name: VLABS\WIN2K8A-DC
IP address: 10.10.10.3
Security report name: VLABS - WIN2K8A-DC (9-29-2013 10-10 PM)
Scan date: 9/29/2013 10:10 PM
Scanned with MBSA version: 2.2.2170.0
Catalog synchronization date: Security updates scan not performed

Operating System Scan Results Administrative Vulnerabilities Issue: Local Account Password Test Score: Check not performed Result: Password checks are not performed on a domain controller.

Issue: File System Score: Check passed Result: All hard drives (1) are using the NTFS file system. Detail: | Drive Letter | File System | | C: | NTFS |

Issue: Password Expiration Score: Check failed (non-critical) Result: Some user accounts (2 of 4) have non-expiring passwords. Detail: | User | | Guest | | sec |

Issue: Guest Account Score: Check passed Result: The Guest account is disabled on this computer.

Issue: Autologon Score: Check passed Result: Autologon is not configured on this computer.

Issue: Restrict Anonymous Score: Check passed Result: Computer is properly restricting anonymous access.

Issue: Administrators Score: Check failed (non-critical) Result: More than 2 Administrators were found on this computer. Detail: | User | | VLABS\Administrator | | VLABS\Enterprise Admins | | VLABS\sec |

Issue: Windows Firewall Score: Best practice Result: Windows Firewall is disabled and has exceptions configured. Detail: | Connection Name | Firewall | Exceptions | | All Connections | Off | Services | | student | Off* | Services* | | utility | Off* | Services* |

Issue: Automatic Updates Score: Check failed (critical) Result: The Automatic Updates feature has not been configured on this computer. Please upgrade to the latest

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT 1310 Unit 8 Lab 1

    • 595 Words
    • 2 Pages

    The most critical part, the Cable and Fiber Preparation where the fiber is mounted, is the ferrule. The Ferrule is a long, thin cylinder with the fiber mounted in the center hole. The center hole is sized to match fiber's cladding diameter which is usually 125um. When fiber connector ferrules are made from several types of materials including ceramic(Zirconia), stainless steel and plastic. The ferrule's job is to center and align the fiber and protects it from mechanical damage. The end of fiber is at the end of the ferrule, where the fiber end is polished smooth either flat or with a curvature. The ferrule is mounted in the connector body and then the connector body is attached to the fiber optic cable structure. Finally, a strain-relief rubber boot protects the connector-cable junction.…

    • 595 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Lab 8

    • 551 Words
    • 3 Pages

    The team also noticed some inconsistencies in the graph that they feel could be fixed by changing their code. One of these issues being that cutting off power completely from the AEV’s resulted in the motors having to do extra work in order to get started again. Possibly changing the code so the amount of power supplied to the motors gradually decreased over time instead of stopping the power completely, could make for a more efficient AEV. Theoretically speaking, when a plane begins to near its destination the pilot begins to lower the amount of thrust given to the engines, not cease thrust completely, so if the team were able to find a way to mimic this, they feel that their AEV could save energy overall, and become more productive.…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Lab

    • 91 Words
    • 1 Page

    Transfer the uniformly weighted crushed tablets into a beaker and add 100cm3 of dilute sulfuric acid to the beaker.…

    • 91 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4 Lab

    • 370 Words
    • 2 Pages

    Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…

    • 370 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Lab

    • 140 Words
    • 1 Page

    1.) Test for viscosity: Since DNA molecules are long strands that anneal to each other, they can be very viscous in liquid if they're at a high enough concentration. If I notice the sample sticking together while pipetting it, I'll often know that I have a lot of DNA in the sample.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    5. Why is it important to put the swap file on a separate partition from the root (/)partition?…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1320 Unit 4

    • 540 Words
    • 3 Pages

    But form factor = (r.m.s value)/(average value) =1.11, Then r.m.s value of E.m.f = 1.11*4F*max.Flux = 4.44F*max.Flux, But max .flux = B_m*A…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Lab 1

    • 918 Words
    • 4 Pages

    * The greater the distance between receptors and stimulus the lesser sensitive are the stimulus. The smaller area, the more sensitive.…

    • 918 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Lab 4.1

    • 666 Words
    • 3 Pages

    4.2.4 Explain that non-disjunction can lead to changes in chromosome number, illustrated by reference to Down…

    • 666 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 NT1310 Lab 1

    • 712 Words
    • 3 Pages

    A cellular network or mobile network is a wireless network distributed over land areas called cells, each served by at least one fixed-location transceivers known as a cell site or base station. In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth with each cell.…

    • 712 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    in the previous parts of the lab by using each new user account to access and modify the nested…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Lab

    • 252 Words
    • 2 Pages

    ➢ To define a class of your own and use it to create an object.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LTRE 190 MA4 Test Prep

    • 742 Words
    • 3 Pages

    The test preparation strategy I used for Exploring American Histories in module 3 of LTRE 190 was PORPE. Using this application gave us the bets suited strategy for preparing for a major subjective exam. The main focus of this test-preparation strategy is to prep us on the material we already read and mastered. Following the format of the strategy we know there are five easy steps to follow. 1. Predicting a test question, 2. Organizing the material to write a response, 3. Rehearsing our response, 4. Practice writing, and 5. Evaluating our response. Keeping these five steps in mind I applied them. For example, a test question I would predict that would be in the test would be what was a cause of the Civil rights Act of 1964? Once predicted I gather my materials, my study guides for this section consisting of the 5w’s Who, What Where and When and why. Who were affected African Americans, What did they want? They wanted equal opportunity and desegregation of public buildings. Where: consisted mostly of the south of the United States. When: It had occurred mostly around 1963-1965. Why: Many African Americans were tired of being segregated and not having fair opportunity as white people including a major right to vote. I then move to step 3 and start writing segments of my answer into my head and understanding the concept. Once I reach the step 4, I would write down a sample paper similar to what I would write in the real subjective exam. Finally the final step of I would evaluate. Using a mindset of a teacher I would ask myself If I hit the points of writing where I check if my answer goes well with what was originally asked. I then looked for feedback and help adjust my paper.…

    • 742 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays