Text Formatting Key:
Conflicts with requirement
Irrelevant background information
You are in charge of a small network with 20 workstations running Windows 2000 Professional, 2 servers running Windows 2000 Server, and 2 computers running Windows 98. You have never given much thought to security and have had a number of security problems.
Your goal is to plan a security design to improve all aspects of security for the network, while causing a minimum of trouble for users.
Two of the Windows 2000 Professional workstations and one of the Windows 98 machines are used remotely via dial-up connections. You have recently had a number of outside attempts to gain access via the dial-up modems. Which of the following dial-up authentication methods could you use to provide the most improvement in security?
You suspect that one or more users have been accessing files they should not have access to. Which of the following could you use to help determine whether this is a problem?
One of the users is storing files on the hard disk of his Windows 98 machine and has noticed that they are not secure. What can you do to improve security?
Use smart card authentication.
Move the files to another machine.
Require the user to change passwords more frequently.
Create a table with the headings Less Secure and More Secure. Place each of the following pairs of items into the appropriate columns ...