discussion questions 387
5 simple questions to answer.
1: Explain how group policies work and the advantages of implementing them. (SLO 1b) Discussion
2: Explain the difference between Group Policy user settings and Group Policy computer settings in the HKEY Local Machine registry. Provide an example of when each would be used.
3: Provide a definition for risk identification, threat assessment, and business impact analysis. Include references to support your definitions APA format.
4: There are three types of threats to an IT infrastructure – natural, man-made, and technical. List seven examples for each type of threat and their potential vulnerabilities to your IT infrastructure. HINT: Use a matrix or spreadsheet listing the three types of threats and their associated vulnerabilities.
5: Explain the differences between an incident response plan, a disaster recovery plan, and business continuity plan. Include references to support your explanations in APA format.