Question

I need help answer this network and security question. Describe the process by which a domain...

I need help answer this network and security question.

Describe the process by which a domain workstation is authenticated to the MS domain controller. After that workstation is authenticated, what happens when a person logs on to a workstation in an MS domain and receives access to a file share on another server in the same domain.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

When you use a domain account to log on to a computer, you might expect the event to be logged on the DC. In reality, the logon occurs on the workstation or server that you are accessing. Therefore, the event is logged in that computer’s Security log—if Audit logon events is enabled on that system. Without DCs logging authentication activity, completing an audit trail of domain-user logon activity is impossible: You would need to collect the Security logs from every workstation and server on your network

Windows supports two kinds of user accounts: domain accounts and local accounts as shown below. Local accounts are stored in the SAM of member servers and workstations and are authenticated by the local system. Domain accounts are stored in AD and are authenticated by DCs. Because of the associated maintenance problems, avoiding the use of local accounts is often best. However, attackers frequently target local accounts, so you should understand how Windows records logon attempts against those accounts.

When a user attempts a network logon, such as to a shared folder on another computer, the workstation by default reuses the credentials that the user entered when he or she initially logged on. However, the user can specify a different local or domain account.

Add a comment
Know the answer?
Add Answer to:
I need help answer this network and security question. Describe the process by which a domain...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • For the following questions I would like you to discuss the particulars of each attack scenario...

    For the following questions I would like you to discuss the particulars of each attack scenario and how Kerberos defends against it. You will need to consider various elements of the attack scenarios. Some attacks can be implemented between multiple Kerberos components. For example, a MITM attack could occur between various components at various times. State your assumptions about how the attack is occurring, then describe how Kerberos defends against it. Good answers will describe both the particulars of the...

  • My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and so...

    My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.

  • Hi I need some help writing a security code using python mongodb restful api. I just...

    Hi I need some help writing a security code using python mongodb restful api. I just need help on how to provide a security login to user to enter their username and password or to have a block in using extra access once they have logined and they want more access to the databases they will be force to sign out of the server but I just do not know how to start on it can someone show me how...

  • hi I want short answer ,please Q/Describe Network security solutions including VPN, firewalls, proxy server, IDS,

    hi I want short answer ,please Q/Describe Network security solutions including VPN, firewalls, proxy server, IDS,

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • I need help to accurately and detailed describe the process that occurs on the Physical, data...

    I need help to accurately and detailed describe the process that occurs on the Physical, data link and network layers of this network following the issued ping command from Laptop 201.66.100.5. The issued ping: Fa0 201.66.160.0/24 PC-PT LTD-PC1 20166.150.5 Fa0/2 Fa10 Fa0/0 F:1/0 Fa0/1 201.66.140.0/24 2811 FaDj1 Fa0/1 LTO-5wtch2 Fa0/o 201.66.120.0/24 2811 Fa1/0 201.65.100.0/24 Fa0/2 201.66. 150.0/24 Fa0/1 Fa0 Fa0/2 aptop PT Laptop 1 201.65. 100.5 2960-24TT Red-Switch 2960-24 LTD-Switchi Server-PT LTD-DS1 201.66.150.10 Fa0/1 201.66.130.0/24 2960-2Fa0/2 Fa0/1 201.66.110.0/24 Server-PT LTD-DS2...

  • Complete the following short answer questions: 1. Design an Ethernet network to connect a single client...

    Complete the following short answer questions: 1. Design an Ethernet network to connect a single client PC to a single server which will contain a wired connection to both digital storage media as well as an optical device. Both the client and the server will connect to their respective workgroup switches via UTP. Their workgroup switches are connected directly by a trunk link. The two switches are 1,700 meters apart. They need to communicate at 500 Mbps. Your design should...

  • I need help with the question below. Nurses have a tremendous advantage in the political process...

    I need help with the question below. Nurses have a tremendous advantage in the political process given the public’s overall respect for the profession and nurses’ expertise in healthcare. Year after year, nurses are voted as the most “ethical” profession by Gallup polls, and the average person perceives nurses as altruistic, caring, and intelligent. Describe two key reasons that nurses are uniquely positioned to take the lead in challenging policy situations. (1-2 paragraphs)

  • Database Hello I need help with the following question: Question 9 Features of the DBMS which...

    Database Hello I need help with the following question: Question 9 Features of the DBMS which are important to the process of database design and implementation include all of the following except how the DBMS supports referential integrity how the DBMS supports domain integrity O how costly the DBMS is to maintain the file structure of storage that the DBMS uses the database objects supported

  • please i need your help for network MPLS is a layer-3 protocol. DiffServ is a layer-3...

    please i need your help for network MPLS is a layer-3 protocol. DiffServ is a layer-3 protocol. Out of three main security requirements (privacy, integrity, and authentication), integrity involves the most complicated process. In the context of network security, the worm is a type of malicious code that, when executed, inserts itself in other programs. Rate-Monotonic Scheduling (RMS) is based on dynamical priority with preemption. Earliest-Deadline-First Scheduling (EDFS) is based on static priority without preemption. IPsec consists of two protocols:...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT