Chapter 4 Lab Manual Review Questions and Answers

advertisement
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 4- 1
Chapter 4 Lab Manual Review Questions and Answers
Lab 4.1
1. Which MMC snap-in is used to provide a centralized method of
defining security?
a.
b.
c.
d.
Computer Management
Security Configuration and Analysis
Security Templates
Services
2. Security templates can be used to create security settings. True or
False?
3. Which of the following is used in a security template to set
security for user rights and logging for security events?
a.
b.
c.
d.
Account Policies
Local Policies
Restricted Groups
Registry
4. Which of the following is used to set security for local registry
keys? (Choose all that apply.)
a.
b.
c.
d.
regedit
Local Policies section of a security template
Registry section of a security template
regedt32
5. The Local Group Policy is used to apply security templates, but
these policies cannot be used to override a domain-based policy.
True or False?
Answers: c; True; b; c, d; True
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 4- 2
Lab 4.2
1. Which of the following security templates can be used on a
workstation? (Choose all that apply.)
a.
b.
c.
d.
compatws
hisecdc
hisecws
securews
2. Which of the following security templates is most likely to cause a
problem with access to the server?
a.
b.
c.
d.
basicdc
hisecdc
securedc
the absence of a security template
3. The password policy set by the hisecdc template is identical to the
securedc template. True or False?
4. Programs on a workstation that has been upgraded from Windows
NT 4 to Windows Server 2003 fail to run as a member of the local
user group. Which of the following security templates can be
used?
a.
b.
c.
d.
basicws
compatsw
compatws
basicsw
5. What number of characters is the minimum password length
requirement once the hisecdc template is applied?
a.
b.
c.
d.
Answers: a, c, d; b; True; c; c
0
7
8
14
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 4- 3
Lab 4.3
1. Which of the following is the file that contains the Windows
accounts database?
a.
b.
c.
d.
Accounts
Secedit
SAM
SAM.dbf
2. If the system key is lost, it is impossible to recover the system.
True or False?
3. Syskey encrypts which of the following registry hives? (Choose
all that apply.)
a.
b.
c.
d.
SOFTWARE
SAM
SYSTEM
SECURITY
4. Which of the following are system security component files that
are affected by syskey? (Choose all that apply.)
a.
b.
c.
d.
Winlogon.exe
SAM
Samsrv.dll
Samlib.dll
5. Which of the following methods are used by LOphtCrack to attack
the accounts database? (Choose all that apply.)
a.
b.
c.
d.
dictionary
brute force
random generated
sniffing
Answers: c; True; b, c; a, c, d; a, b
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 4- 4
Lab 4.4
1. Which of the following terms best describes a service that depends
on another service to function properly?
a.
b.
c.
d.
required
dependence
child
parent
2. Which of the following is a valid startup type for services?
a.
b.
c.
d.
manual
automatic
disabled
all of the above
3. Services authenticate by using the user’s account and password.
True or False?
4. Which of the following is equivalent to stopping and starting a
service?
a.
b.
c.
d.
restart
reset
redo
reboot
5. Which of the following services supports pass-through
authentication for computers in a domain?
a.
b.
c.
d.
Answers: C; D; False; A; A
Winlogon
Workstation
Net Logon
Server
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 4- 5
Lab 4.5
1. Which of the following is a broadcast-based protocol?
a.
b.
c.
d.
TCP
UDP
NetBIOS
IP
2. In Windows Server 2003, it is possible to filter which of the
following protocols? (Choose all that apply.)
a.
b.
c.
d.
TCP
UDP
NetBIOS
IP
3. In Windows Server 2003, which of the following options can be
used to filter? (Choose all that apply.)
a.
b.
c.
d.
Permit All
Deny All
Permit Only
Deny Only
4. Windows Server 2003 offers another level of TCP/IP protection
by supporting which of the following?
a.
b.
c.
d.
PGP
IPSec
EFS
MD5
5. To configure TCP/IP filtering, you need to know which of the
following? (Choose all that apply.)
a.
b.
c.
d.
the protocol
the port
the IP address
the network ID
Answers: c; a, b, d; a, c; b; a, b
Download