Your thoughts on these below discussions

Sep 21st, 2015
Price: $15 USD

Question description


Group policy has many advantages and disadvantages. While reviewing the course material and looking on line for additional information, I found that the largest disadvantage is incorrect configuration having adverse effects on the user community and the security of the system. For instance, if a user is required to follow excessive rules for creating a password, it may sound good because harder passwords are also more challenging to crack. The opposite side of that is the user may forget the password more easily. This may result in more account lockouts or even more likely, the user will write the password down. This ends up having a decrease in security even though the intent was to increase security.

On the other hand, the advantages can be great. “This can be useful for locking down computers, restricting access to specific folders, control panel applets, and applications. It can also be used to change a variety of Windows settings, including ones that can’t be changed from the control panel or require registry tweaks to change. (Hoffman, 2012)” With GPOs properly configured, not only do you decrease the risk of someone being able to attack the system from the outside, you can also protect your system(s) from accidental or malicious actions from your user population.

Hoffman, C. (2012, 09 25). How-To Geek. Retrieved 09 18, 2015, from HTG Explains: What Group Policy Is and How You Can Use It:


 Software Restriction Policies. These policies “allow an organization to control the applications that run in the environment” (TestOut). The nice thing about software restriction is that it allows the administrator to determine just what software they want to allow on the computers within the domain. Software Restriction Policies also let administrators select certain conditions that must be met for software to run. 

Software restriction policies’ conditional restrictions are a great security benefit. Anything that makes a network more secure is vital to organizations these days. These types of policies would allow an administrator to determine whether or not to allow a type of software based upon things like their hash, certificates, network zones, and paths. To dive into those topics just slightly; a hash allows administrators to restrict software to only run if it matches the accepted hash value, which changes with each update of the software programs. Certificates allow administrators to restrict software to only run if the certificate of the publisher is trusted.They can also determine who can add or remove trusted publishers, such as managerial accounts.Network zone’s allow only software from specified, trusted zones to be run. Finally, a path restriction is just what it sounds like. Software is only allowed to run if it is located in an accepted location on the drive. All of these restrictions can be applied to every computer, domain, user, or OU, leaving all kinds of flexibility for the administrator and organization. (TestOut).

  A large disadvantage to Software Restriction Policies would be using hash values to segregate the programs to run. These Hash values must be changed every time the program updates. I’m not sure about you but that would become real old real fast if it were my company. Path restrictions can cause many issues with Windows and smooth running features should an administrator forget to add system essential functions to an allowed path. (Posey) 

  Posey, B. (2004, September 1). Using Software Restriction Policies To Keep Games Off Of Your Network. Retrieved September 18, 2015, from 

Software Restriction Policies. (n.d.). Retrieved September 18, 2015, from

TestOut Corporation. (2015). LabSim for Windows Server Pro: Install and Configure (Instructor ed.). Pleasant Grove, Utah.


a. Functions of the nutrient Vitamin E – the main function of this vitamin in humans appear to be that of antioxidant. Vitamin E maintains the integrity of cell membranes throughout the body and protects the fats in low density from oxidation. It is suited to intercept free radicals and prevent a chain reaction of lipid destruction. There are there are several other functions that were found of Vitamin E, it is known to inhibit the activity of protein kinase C and affect the expression and activities of molecules and enzymes in immune and inflammatory cells. It has also shown to inhibit platelet aggregation to enhance vasodilation

b. Foods that are good sources of the nutrient: Olive oil, Soybean oil Corn oil, Canola oil,Safflower oil

Sunflower oil, Almonds, Hazelnut, Peanuts, Spinach, Carrot, Avocado (California)

c. What happens if a person is deficient in that nutrient (eg. the name of the deficiency, symptoms) severe Vitamin E deficiency is mainly neurological symptoms, impaired balance and coordination (ataxia), injury to sensory nerves (peripheral neuropathy), muscle weakness (myopathy), and damage to the retina of the eye (pigmented retinopathy).

d. Can the nutrient be toxic and if so at what amount, the studies that have been done on the sided effect and toxicity of Vitamin E has lasted only a few weeks to a months and the side effects occurring as a results of long term supplementation have not been adequately studied. The most possibility is that of impaired blood clotting which may increase hemorrhaging in some individuals. Any amount could be potentially harmful in causing hemorrhaging.

Please respond to the answers above with your thoughts

Tutor Answer

(Top Tutor) lizamgaspar
School: University of Virginia

Studypool has helped 1,244,100 students

Review from student
" The best tutor out there!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1828 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors