Kaplan IT541 unit 4 and 5 assignment
Assignment Grading Rubric
Course: IT541 Unit: 4 Points: 50
Assignment 4
Outcomes addressed in this activity:
Unit Outcomes:
- Judge physical security risks and policy.
- Develop a response to a physical security incident.
- Assess anti-virus software to control risk.
Course Outcomes:
IT541-4: Apply basic information security Best Practices to business scenarios.
Assignment Instructions
This Assignment provides a "hands on" element to your studies. It gives you the opportunity to work with the procedures and see how they operate in real-world environments. Read and perform the lab entitled “IT 541 Assignment 4 Lab" found in Doc Sharing; use the lab sheet included at the end of the lab file to submit your results.
Directions for Submitting Your Assignment:
Use the Lab #4 Worksheet document found at the back of the lab instructions as a guide for what to submit, and save it as a Word document, entitled Username-IT541 Assignment-Unit#.doc (Example: TAllen- IT541 Assignment-Unit4.doc). Submit your file by selecting the Unit 4: Assignment Dropbox by the end of Unit 4.
Assignment Requirements:
- Answers contain sufficient information to adequately answer the questions
- No spelling errors
- No grammar errors
*Two points will be deducted from your grade for each occurrence of not meeting these requirements.
For more information and examples of APA formatting, see the resources in Doc Sharing or visit the KU Writing Center from the KU Homepage.
Also review the KU Policy on Plagiarism. This policy will be strictly enforced on all applicable assignments and discussion posts. If you have any questions, please contact your professor.
Review the grading rubric below before beginning this activity.
Unit 4 Assignment Grading Rubric = 100 points
|
Assignment Requirements |
Points Possible |
Points Earned |
|
|
Document demonstrates that the student was able to correctly define appropriate access controls for students, faculty, and administrators in accordance with a defined access control policy. |
0–20 |
||
|
Document demonstrates that the student was able to correctly identify best practices for assigning appropriate security properties to a variety of user groups. |
0–20 |
||
|
Document demonstrates that the student was able to correctly identify best practices regarding file and folder sharing to mitigate risk within the user domain. |
0–20 |
||
|
Document demonstrates that the student was able to correctly apply best practices within acceptable user policies to mitigate risk within the user domain. |
0–20 |
||
|
Document demonstrates that the student was able to implement best practices for minimizing user exposure to sensitive data, including sanitization of data where necessary. |
0–20 |
||
|
Total (Sum of all points) |
0–100 |
||
|
Points deducted for spelling, grammar, and APA errors |
|||
|
Adjusted total points |
|||
Lab #3 – Assessment Worksheet
Configure Windows File System Permissions
Course Name and Number:
________________________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ________________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you reviewed the scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed.
Lab Assessment Questions & Answers
1. When you designed a file system in the first section of this lab, why did you choose the structure that you selected?
2. As you look back on the file structure that you created, what changes would you want to make if you were to use it for a real college environment?
3. In this lab, you assigned members of the Faculty group Full Control of the Assignments folder. What risk does this pose?
4. What could you do to correct the situation described in question 3?
5. What Windows file security attribute allows a user to move through a folder to access files and folders underneath it?
6. What Windows file security attribute allows a user to view the contents of a file?
Assignment Grading Rubric
Course: IT541 Unit: 5 Points: 100
Assignment 5
Outcomes addressed in this activity:
Unit Outcomes:
- Evaluate best practices in privacy.
- Critique root process security.
- Discuss attacks against a Web security protocol.
Course Outcomes:
IT541-5: Explain the return on investment of various security implementations.
Assignment Instructions
This Assignment provides a "hands on" element to your studies. It gives you the opportunity to work with the procedures and see how they operate in real-world environments. Read and perform the lab entitled “IT 541 Assignment 5 Lab" found in Doc Sharing; use the lab sheet included at the end of the lab file to submit your results.
Directions for Submitting Your Assignment:
Use the Lab #5 Worksheet document found at the back of the lab instructions as a guide for what to submit, and save it as a Word document entitled Username-IT541 Assignment-Unit#.doc (Example: TAllen- IT541 Assignment-Unit5.doc). Submit your file by selecting the Unit 5: Assignment Dropbox by the end of Unit 5.
Assignment Requirements:
- Answers contain sufficient information to adequately answer the questions
- No spelling errors
- No grammar errors
*Two points will be deducted from your grade for each occurrence of not meeting these requirements.
For more information and examples of APA formatting, see the resources in Doc Sharing or visit the KU Writing Center from the KU Homepage.
Also review the KU Policy on Plagiarism. This policy will be strictly enforced on all applicable assignments and discussion posts. If you have any questions, please contact your professor.
Review the grading rubric below before beginning this activity.
Unit5AssignmentGradingRubric=100points
|
Assignment Requirements |
Points Possible |
PointsEarned |
|
Document demonstratesthat the student wasable tocorrectlyinstall DFS on a Windows server. |
0–20 |
|
|
Document demonstratesthat the student wasable toconfigure DFS to replicate data from a Windows Server 2012. |
0–20 |
|
|
Document demonstratesthat the student wasable tocorrectlyinstall Windows Server Backup from the command line. |
0–20 |
|
|
Document demonstratesthat the student wasable tocorrectlyschedule a backup using Windows Server Backup on a Windows Server 2012. |
0–20 |
|
|
Document demonstratesthat the student wasable toverify DFS replication on the Windows Server 2012. |
0–20 |
|
|
Total(Sumof all points) |
0–100 |
|
|
Pointsdeductedforspelling, grammar, andAPAerrors |
|
|
|
Adjusted totalpoints |
|
Lab #6 – Assessment Worksheet
Creating a Scheduled Backup and Replicating System Folders
Course Name and Number: _____________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you installed the Windows Distributed File System and Windows Server Backup features from the PowerShell command line. You scheduled a daily backup of the C:\ERPdocuments folder on the TargetWindows01 server and replicated this backup to the TargetWindows02 server using the DFS Replication feature.
Lab Assessment Questions & Answers
|
1. What is the difference between roles and features in Windows Server 2008? |
|
2. What is installed when you choose theRSAT-DFS-MGMT-Con feature? |
|
3. How often should servers be backed up? |
|
4. What are the different types of data backup that are performed? |
|
5. What is the command to create a share? |
|
6. What is a differential backup? |
-
Rating:
/5
Solution: Kaplan IT541 unit 4 and 5 assignment