Problem:
Question 1: What is topology?
Question 2: Determine one situation that can cause a breach of network security. Provide two examples to demonstrate the manner in which GPOs can be used to bolster network security to prevent the situation from occurring.
Question 3: Choose at least two Computer Configuration node security settings and, for each, specify a scenario whereby configuring the setting would provide security benefits. In each of your scenario descriptions, compare a pre-security configuration scenario with a post-security configuration scenario to demonstrate the potential security improvements.
Please do not provide cut and paste answers and please include a source.