Security+ Guide to Network Security, Second Edition Lab Manual Solutions 4- 1 Chapter 4 Lab Manual Review Questions and Answers Lab 4.1 1. Which MMC snap-in is used to provide a centralized method of defining security? a. b. c. d. Computer Management Security Configuration and Analysis Security Templates Services 2. Security templates can be used to create security settings. True or False? 3. Which of the following is used in a security template to set security for user rights and logging for security events? a. b. c. d. Account Policies Local Policies Restricted Groups Registry 4. Which of the following is used to set security for local registry keys? (Choose all that apply.) a. b. c. d. regedit Local Policies section of a security template Registry section of a security template regedt32 5. The Local Group Policy is used to apply security templates, but these policies cannot be used to override a domain-based policy. True or False? Answers: c; True; b; c, d; True Security+ Guide to Network Security, Second Edition Lab Manual Solutions 4- 2 Lab 4.2 1. Which of the following security templates can be used on a workstation? (Choose all that apply.) a. b. c. d. compatws hisecdc hisecws securews 2. Which of the following security templates is most likely to cause a problem with access to the server? a. b. c. d. basicdc hisecdc securedc the absence of a security template 3. The password policy set by the hisecdc template is identical to the securedc template. True or False? 4. Programs on a workstation that has been upgraded from Windows NT 4 to Windows Server 2003 fail to run as a member of the local user group. Which of the following security templates can be used? a. b. c. d. basicws compatsw compatws basicsw 5. What number of characters is the minimum password length requirement once the hisecdc template is applied? a. b. c. d. Answers: a, c, d; b; True; c; c 0 7 8 14 Security+ Guide to Network Security, Second Edition Lab Manual Solutions 4- 3 Lab 4.3 1. Which of the following is the file that contains the Windows accounts database? a. b. c. d. Accounts Secedit SAM SAM.dbf 2. If the system key is lost, it is impossible to recover the system. True or False? 3. Syskey encrypts which of the following registry hives? (Choose all that apply.) a. b. c. d. SOFTWARE SAM SYSTEM SECURITY 4. Which of the following are system security component files that are affected by syskey? (Choose all that apply.) a. b. c. d. Winlogon.exe SAM Samsrv.dll Samlib.dll 5. Which of the following methods are used by LOphtCrack to attack the accounts database? (Choose all that apply.) a. b. c. d. dictionary brute force random generated sniffing Answers: c; True; b, c; a, c, d; a, b Security+ Guide to Network Security, Second Edition Lab Manual Solutions 4- 4 Lab 4.4 1. Which of the following terms best describes a service that depends on another service to function properly? a. b. c. d. required dependence child parent 2. Which of the following is a valid startup type for services? a. b. c. d. manual automatic disabled all of the above 3. Services authenticate by using the user’s account and password. True or False? 4. Which of the following is equivalent to stopping and starting a service? a. b. c. d. restart reset redo reboot 5. Which of the following services supports pass-through authentication for computers in a domain? a. b. c. d. Answers: C; D; False; A; A Winlogon Workstation Net Logon Server Security+ Guide to Network Security, Second Edition Lab Manual Solutions 4- 5 Lab 4.5 1. Which of the following is a broadcast-based protocol? a. b. c. d. TCP UDP NetBIOS IP 2. In Windows Server 2003, it is possible to filter which of the following protocols? (Choose all that apply.) a. b. c. d. TCP UDP NetBIOS IP 3. In Windows Server 2003, which of the following options can be used to filter? (Choose all that apply.) a. b. c. d. Permit All Deny All Permit Only Deny Only 4. Windows Server 2003 offers another level of TCP/IP protection by supporting which of the following? a. b. c. d. PGP IPSec EFS MD5 5. To configure TCP/IP filtering, you need to know which of the following? (Choose all that apply.) a. b. c. d. the protocol the port the IP address the network ID Answers: c; a, b, d; a, c; b; a, b