Question
1. a. What is the purpose of a Domain Controller in an enterprise environment and why would an attacker want to compromise a Domain Controller?
1.
a. What is the purpose of a Domain Controller in an enterprise environment and why would an attacker want to compromise a Domain Controller? What is the name of the file and its location that stores the user credentials? What would you need (dependencies, tools, and techniques) to open this file?
b. What is Kerberos, which information security services does it provide, and are there any limitations/security considerations to consider with Kerberos tickets?
c. Explain how a users password is stored on Windows or in Linux then explain the steps the operating system takes to authenticate you once you login.
d. Explain the role of Group Policy, how it works, what purpose it serves in an enterprise environment, and under what circumstances we would elect to use it.
e. Explain the purpose of Active Directory (AD), the name of the server active directory resides on, its naming schema and organizational structure, how it is implemented by organizations, and the relationship between AD and LDAP.
f. Explain what a hash value is, how it is used in information security with at least three examples, and why it is considered to be a highly reliable.
g. What is an indicator of compromise (IOC)? Provide at least five examples of different kinds of indicators of compromise and explain how they are implemented by enterprise cyber security teams.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started