Page 26 - Security+ (635 notes by Nikkhah)
P. 26

DNS servers
            424- DNS servers update other DNS servers using zone transfers.

            425- Zone transfers should be configured for authorized DNS servers only.

            426- DNS servers should listen to name resolution requests from intended interfaces only.
            427- Secure dynamic updates should be used only.

            428- Administrators should detect and remove rogue DNS servers on the network.

            429- DNS servers for web services should be placed inside a DMZ.



            File and print servers
            430- File and print servers are the most frequently used and heavily loaded servers.

            431- They  should  be  secured  with  Access  Control  Lists,  authentication  processes, and
            effective auditing and logging.

            432- If a user does not need to share a file or folder, he should not.

            433- Default  share  permissions  should  be  disabled,  and  anonymous  access  should not  be
            allowed.



            DHCP servers

            434- DHCP servers are used to automatically assign IP addresses to DHCP clients.
            435- DHCP servers maintain blocks of IP addresses in DHCP scopes.

            436- Access  to  a  DHCP  server  can  provide  information  about  an  internal  IP addressing

            scheme.
            437- DHCP  servers  must  be  secured  properly  and  kept  up  to  date  with  security patches,

            hotfixes, and service packs.

            438- Rogue DHCP servers should be detected and taken offline immediately.
            439- DHCP servers should be configured to send secure dynamic updates to DNS servers.

            440- Only authorized administrators should be permitted to manage DHCP servers.




















                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 24
   21   22   23   24   25   26   27   28   29   30   31