Using checklists appropriate for your operating system and server role (if applicable), perform a security audit of the system, noting any deficiencies by comparing each item on the checklist to the...

Using checklists appropriate for your operating system and server role (if applicable), perform a security audit of the system, noting any deficiencies by comparing each item on the checklist to the actual configuration of your system. If you’re having trouble locating an appropriate checklist, try searching the Web sites of the operating system vendor or recognized security resources, such as the Computer Emergency Response Team (http://www.cert.org) or the Microsoft Security Checklists and Resource Guides site (http://www.microsoft.com/technet/security/chklist/default.mspx). Provide your instructor with a copy of the completed checklists.

Dec 05, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here