"Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings"  Please respond to the following:
 •	Determine one (1) situation that can cause a breach of network  security. Provide two (2) examples to demonstrate the manner in which  GPOs can be used to bolster network security to prevent the situation  from occurring.
 •	Choose at least two (2) Computer Configuration node security settings  and, for each, specify a scenario whereby configuring the setting would  provide security benefits. In each of your scenario descriptions,  compare a pre-security configuration scenario with a post-security  configuration scenario to demonstrate the potential security  improvements.