application security lab 2
1. Is using the option to Store passwords using reversible encryption a good security practice? Why or why not?
2. How often are GPO changes applied? Must the user be logged off the system?
3. Which GPO policy takes precedence in the case of a policy conflict? Why?
4. What is the value of the Group Policy in an enterprise environment?
5. What are some of the reasons that an organization would need to document their existing GPO settings?