NOS LABS
1. Create the following folder
C:\KCA
2. Create the following User Accounts in your computer:- (NOTE: select password never expires for all
the User Accounts)
Use the names of group members
3. Enforce the following password policies in your system:-
i). Enforce the minimum password length to be 8 characters
ii). Enforce the password history to 4 passwords
iii). Password expires after 30 days
iv). Lock out the account forever (i.e. zero minutes) after three unsuccessful attempts
4. create a new User account for Mbugua with the password ‘software’
5. When would it be necessary to delete user accounts?
6. Delete the following accounts:-
i). Ken-
ii). James
7. Login as Mbugua using the password: cos60
8. Explain what happens. Correct the problem by typing the right password and then log in.
9. Change the system time to read 10:00 AM. Explain what happens. Were you able to change the time?
Why not?
10. Assign the following user rights to the specified users.
Rights User(s)
Log On Locally,
Access this computer from the network
James
Backup files and directories
Restore files and directories
Log On Locally
Backup files and directories
Restore files and directories Pauline
Change system time
Shut down the system
CREATING AND MANAGING GROUPS
1. Log off and then log on as the Administrator.
2. Create the following Local Groups in your computer:-
GROUP Description
ACCOUNTS Accounts Department
HR HR
TRAINING Training Department
SALES Sales Department
RESEARCH Research Department
3. Add the users in question 2 above to their respective groups as shown in the table below.
Name User Name Password Member Of…
PAULINE ATOTI PAULINE Atoti Training Dept.
Mbugua Mg Mother Sales Dept.
4. Delete the Research group.
AUDIT POLICY
You have discovered that users in your organization have been deleting other peoples file and folders.
Some people also overuse the printer, or change the systems properties and leave the computer with wrong
configurations. You want to monitor the above occurrence.
1. What are some of the audit policies you would define to monitor the above?
2. While logged on as the Administrator; Enforce the following audit policies in your computer:
(HINT: From Start à Programs à Administration Tools à Local Security Policy)
Policy Success Or Failure
Log on events Failure
Object Access Both
Account Management Success
Policy Changes Both
3. Try twice logging on as KEN using the password Kuku. Then use the right password to log on. Double
click the folder D:\NSS\PRACTICE, and then close it again.
4. Use the Security Log in the Event Viewer to check the three last audited events. (HINT: From the
Administration Tools)
Virtual memory
1.Define virtual memory
2. List the current size of virtual memory used by your network operating system
3. Illustrate how you can use disk management to create a second partition in my computer with atleast 2GB