Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Task 1: Exploring Password Management Software Password management software, also called password vault software, such as KeePass (keepass.info), LastPass (lastpass.com), and Dashlane (dashlane.com), can hold

Task 1: Exploring Password Management Software

Password management software, also called password vault software, such as KeePass (keepass.info), LastPass (lastpass.com), and Dashlane (dashlane.com), can hold your passwords safely so that you do not forget them or have to write them down. Choose two of these programs and a third of your own selection that interests you, and then answer the following questions about each one:

Which platforms are supported?

Which web browsers are supported?

From how many competitors can the program import passwords?

What types of authentication are supported (e.g., master password, fingerprint, etc.)?

Where are the passwords stored? Are they synced across devices? How is the information protected?

What are some of the differences between the free edition of each program and the paid versions?

What happens to the users account if the user dies or is incapacitated?

Task 2: Using Group Policy to Secure a Workstation

Using Windows 10 Professional or Enterprise, set local security policies to require a password for each account, to audit failed logon events, and to create a logon script that displays the message, The Golden Pineapple Was Here! when anyone signs in to the system. Test your policies by verifying that a password is required, your script executes when you sign in, and a failed sign-in event using an invalid password is logged and can be viewed in Event Viewer.

Answer the following questions:

Which policies did you set and what setting was applied to each policy?

What software did you use to create your script? What is the exact path and file name (including the file extension) to your script?

Which log-in Event Viewer shows the logon failure event?

List three more policies you find in Group Policy that can make a workstation more secure but are not discussed in chapter 16.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions