Primary techniques of implementing security


Question1. There are up to 14 different built-in groups that may be located by default in Builtin container including “Account Operators”, “Incoming Forest Trust Builders” and “Pre-Windows 2000 Compatible Access”. Give a small explanation of these three built-ins.

Question2. What are the two primary techniques of implementing security? Briefly describe each one.

Question3. Give the three elements which determine a user’s access and which define the permissions they have to object.

Question4. Name and explain the two different types of Access Control Lists (ACLs) in security descriptor.

Question5. Authentication relies on standards and protocols which are used to confirm the identity of a user or object. Windows Server 2003 supports several types of network authentication. Two types of these network authentications are Lightweight Directory Access Protocol or Secure Sockets Layer (LDAP or SSL) and Public Key Infrastructure (PKI). Explain in details how these two kinds of network authentications work.

Question6. Describe the purpose of “Access Token” in Security Principals and Security Identifiers.

Request for Solution File

Ask an Expert for Answer!!
Operating System: Primary techniques of implementing security
Reference No:- TGS05580

Expected delivery within 24 Hours