CYB 300 Module Four Lab Worksheet David Obi
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
300
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by JusticeRain3195
CYB 300 Module Four Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Manage Certificates
1
Exercise 1—Manage Certificate Templates
Prompt
Response
In the lab section, “Task 1: Install Enterprise Root Certificate Service
,”
Step 5, run the command to configure the Active Directory Certificate Services and add your name at the command prompt located after the output.
Take a screenshot of the output and your name.
In the lab section, “Task 1: Install Enterprise Root Certificate Service
,
”
Step 8, take a screenshot of the Certificate Templates folder and the types of certificates that can be issued by PLABDM01.
2
Exercise 2—Manage Certificate Enrollment
Prompt
Response
In the lab section
, “
Task 1: Configure a Customized Certificate Template,” Step 4
, replace the name in the “Template display name” with your last name -SecureUser (LastName-
SecureUser). In Step 13, scroll down until you see LastName-
SecureUser
and take a screenshot of the Enable Certificate Templates window.
In the lab section
, “
Task 2: Create Group Policy for Certificate Auto Enrollment,”
Step 10,
run the gpupdate /force
command to propagate the new user Group Policy to the domain
. Add your name after the command prompt and take a screenshot of the output and your name.
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Create user Peter, Brian and Cindy, create group Family and Friend. Add user Peter and Brian to the Family group, add Cindy to the Friend group. Set up password for all three users.
Log in as Peter, create a file “Peter-file1”, set up permission to allow Brian to read and modify the file, but not Cindy.
Verify your set up to see Peter and Brian can read and modify the file, but not Cindy.
Take screenshot of your configuration.
arrow_forward
response page checks username and
password against arrays of valid usernames
and passwords (normally this is done
against a database - we'll change it later)
If valid - saves username to cookie, and sets
session variable LoggedIn to TRUE. If not,
sets the session variable to FALSE.
Displays link to "content page" (the page
you're protecting).
Created with Mi Notes
arrow_forward
PLZ help with the following:
arrow_forward
PLz help with the following:
To open the Registry Editor, enter the regedit command and respond to the UAC box.Then you will see the five main keys and several subkeys listed on the left. Click the triangles on the left to see the subkeys. When you select a subkey, such as KeyboardClass , the names of the values in that subkey are displayed in the right pane along with the data assigned to each value.
2. Suppose we want to backup the registry key that contains a list of installedsoftware,whichisHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall. First click the appropriate triangles to navigate to the key. Next, right-click the key and select Export from the shortcut menu. The Export Registry File dialog box appears.
arrow_forward
Written Use Case
Follow the sample format shown in the attached photo.Sample have its label, while the one you should make a written use case is the one who have blue ovalsNOTE: YOU SHOULD MAKE THE WRITTEN USE CASE AS YOU CAN SEE IN THE SAMPLE TABLE. SOMEONE IS ANSWERING MY QUESTION WRONG!
arrow_forward
Using C# in Visual Studio.
Create a form with a button that will insert new data into a Database, the read button will retrieve data from a database and display it on the form, Update button will update a record into the database using the full name, and the delete button will delete a record into the database using full name.
arrow_forward
Task 4:
The Development team of InstantStay wants to ensure that all email data of the users are lowercase. Otherwise, their login system could have problems finding the users. Therefore, they want you to ensure that each email in the table will always be lowercase after a new user is added. Create a TRIGGER called email_insert that will SET new email addresses to lowercase and run before new emails are added to the USERS table.
Task: Create a TRIGGER to ensure all new email address are lowercase
(SQL Database Test): Create a TRIGGER when adding new email to enforce a lowercase standard
(SQL Database Test): The TRIGGER converts new emails to a lowercase format
arrow_forward
Create a Custom Toast View as given below. (Provide only Java Code)
arrow_forward
I need help with the part below and please add comments in the code to help me understand better what I am doing wrong in my own code.
I have already created my database and the connection and some of the code but am stuck on these parts."Home" and "Create Account" pages
The index.php file will ask the user to log in to the system with a login form
If they're already logged in, the home page will NOT show the login form. It will show a "welcome to our store" type of message instead even if they click on the "home" button in the navigation.
The create-account.php page has them fill out a form for creating an account.
Use real-time JavaScript validation (and regex) to:
Verify that the password and "verify password" match as they are typing.
Verify that the password contains at least one number and is at least 8 characters long
Be sure to display user feedback messages on the screen as they type, e.g.:
Password must contain a number
Password must be 8 characters long
Password and…
arrow_forward
Please see the attach photo for the instructions and the scenario
arrow_forward
List all swing controls in given frame.
arrow_forward
Written Use Case
Follow the sample format shown in the attached photo.Sample have its label, while the one you should make a written use case is the one who have blue ovals
arrow_forward
QUESTION PROVIDE IN ATTACHMENT. KINDLY SEE.
MATCH OUTPUT AS IT IS WITH QUESTION OUTPUT.
arrow_forward
Two separate commands, DELETE and TRUNCATE, exist.
arrow_forward
To keep the existing path environment variables when we add new path(s), we will need to include this as part of the command.
Group of answer choices
%oldpath%
&path&
%path%
(path)
arrow_forward
NOTE: Use the API endpoints available at https://jsonplaceholder.typicode.com/ to get the data required in these exercises.
HINT: Read the documented Resources and Routes.
Also the guide: https://jsonplaceholder.typicode.com/guide/
///////////////////////
2) Create a function named "getAllUsers".
Use Fetch with Async/Await to request all the posts. The function should return all the posts as JSON data.
arrow_forward
The contact form page must contain a form that contains the following fields: • Name • Email • The
message that the user wants to send When the form is submitted, all fields must be checked to
make sure they have been filled out. If the form validation is not successful, a bold red error
message should be displayed to the user on the page by manipulating the DOM. If the form
validation is successful, a bold green success message should be displayed to the user on the page by
manipulating the DOM. The message should say: "Dear Name, Thank you for your inquiry. One of
our team members will be in touch with you shortly" In the above message Name should be
replaced by the user's name from the form.
arrow_forward
You can review the outcome of GitHub Script execution on the Actions tab of the GitHub portal. Select Yes if the statement is true. Otherwise, select No.
arrow_forward
Please provide the command(s) to accomplish each of the following actions AND specify what changes in the output above.
Change the group to “Seneca”.
Remove Execute permissions for all.
Adjust the permissions to only be “Read Only” for all.
Modify the modification date/time to reflect the current date/time.
Create hard link to the file.
Generate soft link to the file.
Empty the file of all existing content without deleting the file.
Using “Octal” set the permissions to be “rwxr-x-wx”.
arrow_forward
Crescent Credit Union League Richard Coates is the IT manager at the Crescent Credit Union League (CCUL), an advocacy group for credit unions providing a political voice for credit unions and offering education and training for CCUL members. Richard wants you to work on the CCUL’s staff directory page for its website. He wants users to be able to search the directory, retrieving contact information for specific employees at CCUL.
The staff directory is stored in an object literal named "staff" that contains a single object named "directory". The directory object contains an array of objects that displays each employee's id, first and last name, position, department, e-mail address, phone number, and image file.
Your job is to create a search tool that searches the staff object directory array for employees whose last name, position, and/or department matches the user's search conditions. A preview of the page you will create is shown in Figure 14-48.
Setup
Use your editor to open the…
arrow_forward
Deluxe Bath Controller (This scenario is used by questions 14 and 15.)
At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath.
What is the name given to the security attack when an opponent prevents messages from reaching a destination?
Denial of service
Masquerading
Modification of messages
Eavesdropping
Which of these is the highest-level part of the directory structure on Linux?
Directory
Topmost Directory
File Allocation Table
Superblock
Which security goal aims to protect information from disclosure?
Integrity
Confidentiality
Authenticity
Accountability
What does a network switch do?
It broadcasts messages to all the computers that are connected to it
It job is to disable part of the network
It collects all the network cables in one place
Routes a message…
arrow_forward
Complete the following sentence.
In the event that a script is running an infinite loop, the user can use the
command to halt the process and regain control.
arrow_forward
Name the types of swing controls used in given frame.
arrow_forward
Question 9
A use case description is generic with few details. For this reason it does not contain numbered steps and alternatives to those
steps. That is the kind of information contained in a user story.
True
False
Question 10
Which git command would you use to update a remote repository with the current changes made in a local repository?
pull
clone
commit
add
None of the above
Question 11
The UML symbol to show composition/aggregation is a diamond. The diamond should be attached to the
containing class
contained class
fat headed arrow
center of a dashed line
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Related Questions
- Create user Peter, Brian and Cindy, create group Family and Friend. Add user Peter and Brian to the Family group, add Cindy to the Friend group. Set up password for all three users. Log in as Peter, create a file “Peter-file1”, set up permission to allow Brian to read and modify the file, but not Cindy. Verify your set up to see Peter and Brian can read and modify the file, but not Cindy. Take screenshot of your configuration.arrow_forwardresponse page checks username and password against arrays of valid usernames and passwords (normally this is done against a database - we'll change it later) If valid - saves username to cookie, and sets session variable LoggedIn to TRUE. If not, sets the session variable to FALSE. Displays link to "content page" (the page you're protecting). Created with Mi Notesarrow_forwardPLZ help with the following:arrow_forward
- PLz help with the following: To open the Registry Editor, enter the regedit command and respond to the UAC box.Then you will see the five main keys and several subkeys listed on the left. Click the triangles on the left to see the subkeys. When you select a subkey, such as KeyboardClass , the names of the values in that subkey are displayed in the right pane along with the data assigned to each value. 2. Suppose we want to backup the registry key that contains a list of installedsoftware,whichisHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall. First click the appropriate triangles to navigate to the key. Next, right-click the key and select Export from the shortcut menu. The Export Registry File dialog box appears.arrow_forwardWritten Use Case Follow the sample format shown in the attached photo.Sample have its label, while the one you should make a written use case is the one who have blue ovalsNOTE: YOU SHOULD MAKE THE WRITTEN USE CASE AS YOU CAN SEE IN THE SAMPLE TABLE. SOMEONE IS ANSWERING MY QUESTION WRONG!arrow_forwardUsing C# in Visual Studio. Create a form with a button that will insert new data into a Database, the read button will retrieve data from a database and display it on the form, Update button will update a record into the database using the full name, and the delete button will delete a record into the database using full name.arrow_forward
- Task 4: The Development team of InstantStay wants to ensure that all email data of the users are lowercase. Otherwise, their login system could have problems finding the users. Therefore, they want you to ensure that each email in the table will always be lowercase after a new user is added. Create a TRIGGER called email_insert that will SET new email addresses to lowercase and run before new emails are added to the USERS table. Task: Create a TRIGGER to ensure all new email address are lowercase (SQL Database Test): Create a TRIGGER when adding new email to enforce a lowercase standard (SQL Database Test): The TRIGGER converts new emails to a lowercase formatarrow_forwardCreate a Custom Toast View as given below. (Provide only Java Code)arrow_forwardI need help with the part below and please add comments in the code to help me understand better what I am doing wrong in my own code. I have already created my database and the connection and some of the code but am stuck on these parts."Home" and "Create Account" pages The index.php file will ask the user to log in to the system with a login form If they're already logged in, the home page will NOT show the login form. It will show a "welcome to our store" type of message instead even if they click on the "home" button in the navigation. The create-account.php page has them fill out a form for creating an account. Use real-time JavaScript validation (and regex) to: Verify that the password and "verify password" match as they are typing. Verify that the password contains at least one number and is at least 8 characters long Be sure to display user feedback messages on the screen as they type, e.g.: Password must contain a number Password must be 8 characters long Password and…arrow_forward
- Please see the attach photo for the instructions and the scenarioarrow_forwardList all swing controls in given frame.arrow_forwardWritten Use Case Follow the sample format shown in the attached photo.Sample have its label, while the one you should make a written use case is the one who have blue ovalsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L