CYB_300_4-3

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

300

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by JusticeJellyfishPerson10226

Report
CYB 300 Module Four Lab Worksheet CYB 300 2023 November 19 Manage Certificates Exercise 1—Manage Certificate Templates Prompt Response In the lab section, “Task 1: Install Enterprise Root Certificate Service ,” Step 5, run the command to configure the Active Directory Certificate Services and add your name at the command prompt located after the output. Take a screenshot of the output and your name. In the lab section, “Task 1: Install Enterprise Root Certificate Service , Step 8, take a screenshot of the Certificate Templates folder and the types of certificates that can be issued by PLABDM01. Exercise 2—Manage Certificate Enrollment Prompt Response In the lab section , “ Task 1: Configure a Customized Certificate Template,” Step 4 , replace the name in the “Template display name” with your last name -SecureUser (LastName- SecureUser). In Step 13, scroll down until you see LastName- SecureUser and take a screenshot of the Enable Certificate Templates window. In the lab section , “ Task 2: Create Group Policy for Certificate Auto Enrollment,” Step 10, run the gpupdate /force command to propagate the new user Group Policy to the domain. Add your name after the command prompt and take a screenshot of the output and your name. In the lab section , “ Task 3: Verify the Certificate Issuance,” Step 10 , take a screenshot of the Certificate Installation Results window. What is the importance of creating custom self-signed certificates for your organization? For example, are settings Custom self-signed certificates are valuab they enable customized certifications tail
customized depending on the type or business of the organization? business needs. These certificates can be low-risk local network, offering flexibility certificate's configuration and attributes. Exercise 3—Configuring Key Archival Prompt Response In the lab section, “ Task 1: Enable a Key Recovery Agent,” Step 22, instead of typing AdminKRA, type Admin followed by your initials (no spaces). For example, Jane Doe would type AdminJD. In Step 27 , on the File to Import page, you will enter the same path and file name as you created in Step 22 (AdminYourInitials) followed by .cer. For example, for Jane Doe, you would type c:\AdminJD.cer. Take a screenshot of the Completing the Certificate Import Wizard window in Step 29. Why is it important to use a key archival process? Likewise, why is it important to properly store keys for recovery? Explain your reasoning. Using a key archive process is crucial. Arc data loss, theft, or hacking. If we lose or c original key, having an archive ensures a b saving us from repeating the time-consum the archived keys allows us to restore the point of loss. Key archives also facilitate s transitions. For returning employees, the to its previous state. In contrast, for depa can delete or modify their key for a replac
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help