ALL >> Education >> View Article
Designing Technical Controls To Manage The Use Of Laptop Computers

Exercise 1: Create a Preliminary List of Technical Controls to Manage Designing exam(http://www.mcse-70-297.com)
the Use of Laptop Computers
1. What should Humongous Insurance do to control the use of laptop computers? Prepare a list of recommendations and provide supporting evidence or reasons why you have included each item.
Answers may vary. Recommendations:
Make laptop users members of the Network Configuration Operators group so that they can make changes as necessary to their network configuration.
Make laptop users members of the Print Operators group so that they can manage a printer connected to their laptop.
Remove laptop user accounts, both user and computer, from general OUs. The goal is to be able to manage them differently. Create a new OU, and place laptop accounts in it.
Design software restriction policies that allow only approved software on the laptop computers. This will keep users from installing or running unauthorized software.
Create IEAK profiles to manage Security Zones and other aspects of Internet Explorer MCSE 2003 exams(http://www.mcse-70-297.com)
...
... configuration and block user access to these configurations. Controlling Security Zone configuration is a good way to protect systems. Tight controls for Internet sites and relaxed controls for intranet sites can be established.
Review the current administrative template settings for computers and users that do not travel. Determine changes that will be needed to relax control so that users can do their job while away from the office.
This chapter presents the skills and concepts related to creating a security design framework. This training kit presumes that you have a minimum of 1 year experience implementing and administering desktop operating systems and network operating systems in environments that have:
At least 250 supported users
Three or more physical locations
Typical network services such as messaging, database, file and print, proxy server or firewall, Internet and intranet, remote access, and client computer management
Three or more domain controllers
Connectivity needs that include connecting branch offices and individual users in remote locations to the
Free Security+ practice exams(http://www.examshots.com/certification/Security+-67.html)
corporate network, and connecting corporate networks to the Internet
In addition, you should have experience designing a network infrastructure.
Add Comment
Education Articles
1. How Exercise Books Foster Organization And CreativityAuthor: The School Print Company
2. Diy Vs. Professional: Choosing The Right Approach For Your School Logo
Author: The School Print Company
3. Top-rated Icse High School In Bhopal For Quality Education
Author: Ronit Sharma
4. Best B. Tech And Engineering College In Meerut And Up
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
5. The Five Borough Academic: Cross-cultural Research In Nyc's Diverse Communities
Author: jonesmiller
6. The Future Of Advertising: How Cgi Is Replacing Traditional Commercials
Author: Rajat Sancheti
7. What Is Iso 27001 Procedures And Why Do They Matter?
Author: john
8. Devops Foundation Certification Course
Author: Simpliaxissolutions
9. The Best Gcp Devops Online Training Institute In Bangalore
Author: visualpath
10. Best Hotel Management College In Delhi
Author: harsh thapa
11. Servicenow Online Training | Servicenow Course In India
Author: krishna
12. Best Google Cloud Platform Ai Training In Hyderabad
Author: visualpath
13. Aws Data Engineering Online Training | Data Analytics
Author: naveen
14. Oracle Fusion Cloud Hcm | Oracle Fusion Hcm Training In Pune
Author: visualpath
15. Why Choose The Certified Big Data Foundation? Key Certification Objectives Explained
Author: gsdc