Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings

Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings

> Discussion 9
> 1) “Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings”  Please respond to the following:
> A) Determine one (1) situation that can cause a breach of network security. Provide two (2) examples to demonstrate the manner in which GPOs can be used to bolster network security to prevent the situation from occurring.
> B) Choose at least two (2) Computer Configuration node security settings and, for each, specify a scenario whereby configuring the setting would provide security benefits. In each of your scenario descriptions, compare a pre-security configuration scenario with a post-security configuration scenario to demonstrate the potential security improvements.
>
> 2) With the increased of network threats in todays data driven networks, securing your networking devices before they hit the wire is crucial in any environment. Discuss some of the ways to secure your layer 2/3 network devices.
>
>
>
> 3) “Troubleshooting Management Access”  Please respond to the following:
>
> A) Determine the greatest security challenge that a network administrator might encounter when troubleshooting issues in secured networks. Suggest one (1) way to mitigate such a challenge. Provide a rationale to support your response.
>
>
>
> B) Per the text, Cisco security focuses on three (3) functional planes called the management, control, and data. Give your opinion on whether or not you believe it is logical to divide the security functions into the three (3) areas in the same manner as Cisco security does within a single device. Justify your response.

Solution preview for the order on Bolstering Network Security by Using Group Policy and Configuring GPO Security SettingsBolstering Network Security by Using Group Policy and Configuring GPO Security Settings

APA

847 words