Network Communication , Security, and Authentication

 

A. JBL Lab- Configuring Windows File System Permissions

Log into your account atwww.jblearning.com (Links to an external site.) to access JBL virtual labs

NOTE: Follow the lab guide / instruction in jblearning website

Requirements

NOTE: When you complete this assignment, you need to take screen captures of the applications running on your computer screen.

Do NOT take screen captures of PDF files, graphics, or electronic textbooks.

The assignment has three parts: Lab (Section 1 & 2, and Challenge). You are required to submit the following deliverables for grading:

Lab Report file including screen captures of the following steps:

Deliverables found in the Introduction section of lab guide at JBL

For your Lab Report, using a word processor, such a Microsoft Word or OpenOffice Writer, submit the above requirements, by following these instructions:

You need to submit a real lab report not screen captures only (you can use the template format below “Lab Sample Template v0p1.docx”

Download from Here (Click here to Download “Lab Sample Template v0p1.docx”)Preview the document

At the top of your document, center the following title (without the quotes): “Lab # : Lab Title”

Skip a line and left justify a title named “Lab # Screen Captures”

Paste the screen captures and make sure your captures include the following: time, day, month, year stamp in the lower right corner of your screen (Mac users may have timestamps at top-right)

At the top of each screen capture, put a title such as “Part 1 Step 9”, etc. Do NOT put the title at the bottom of the screen capture.

 

 

B. JBL LAB: Configuring Linux File System

JBL Lab – Configuring Linux File System Permissions

Log into your account at www.jblearning.com (Links to an external site.) to access JBL virtual labs

NOTE: Follow the lab guide / instruction in jblearning website

Requirements

NOTE: When you complete this assignment, you need to take screen captures of the applications running on your computer screen.

Do NOT take screen captures of PDF files, graphics, or electronic textbooks.

The assignment has three parts: Lab (Section 1 & 2, and Challenge). You are required to submit the following deliverables for grading:
Lab Report file including screen captures of the following steps:
Deliverables found in the Introduction section of lab guide at JBL
For your Lab Report, using a word processor, such a Microsoft Word or OpenOffice Writer, submit the above requirements, by following these instructions:

You need to submit a real lab report not screen captures only (you can use the template format below “Lab Sample Template v0p1.docx”
Download from Here (Click here to Download “Lab Sample Template v0p1.docx”)
At the top of your document, center the following title (without the quotes): “Lab # : Lab Title”
Skip a line and left justify a title named “Lab # Screen Captures”
Paste the screen captures and make sure your captures include the following: time, day, month, year stamp in the lower right corner of your screen (Mac users may have timestamps at top-right)
At the top of each screen capture, put a title such as “Part 1 Step 9”, etc. Do NOT put the title at the bottom of the screen capture.
C. JBL LAB: Auditing the Workstation Domain for ComplianceJBL Lab – Auditing the Workstation Domain for Compliance

Log into your account at www.jblearning.com (Links to an external site.) to access JBL virtual labs

NOTE: Follow the lab guide / instruction in jblearning website

Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your
instructor:

1. Lab Report file; Download from Here (Click here to Download “Lab Sample Template v0p1.docx”)

2. Lab Assessments file (Click here to Download “Lab Assessment Worksheet”)

Deliverables can also be found in the Introduction section of the lab guide at JBL
For your Lab Report, using a word processor, such a Microsoft Word or OpenOffice Writer, submit the above requirements, by following these instructions:

 

 

 

The post Network Communication , Security, and Authentication first appeared on COMPLIANT PAPERS.

Posted in Uncategorized