Page 533 - StudyBook.pdf
P. 533

Infrastructure Security: System Hardening • Chapter 8  517


                 A: ACL use can define who can access, configure, and control a device, and can
                    also be used to control services and protocols that are allowed to pass through
                    devices on your network.Therefore, they become very important in the config-
                    uration of your security plan.


                 Q: Why are Web servers considered to be a high vulnerability item?
                 A: As development of the technologies for highly graphic sites has come about,
                    many of the new processes have exposed weaknesses that were not anticipated
                    in the original construction of the underlying OS and NOS structure. It is now
                    increasingly important to keep current on all of the latest security fixes to
                    reduce the level of vulnerability in your network.


                 Q: I would have never thought about a DHCP server being vulnerable! Can you
                    tell me why I need to worry about it?
                 A: DHCP servers can be used to configure client machines to reach other net-
                    works.A DHCP server that is not configured by you but is connected to your
                    network in any way, could redirect your client machines and allow a high level
                    of compromise to occur.


                 Self Test



                 A Quick Answer Key follows the Self Test questions. For complete questions,
                 answers, and explanations to the Self Test questions in this chapter as well as
                 the other chapters in this book, see the Self Test Appendix.


                 1. Bob is preparing to evaluate the security on his Windows XP computer and
                    would like to harden the OS. He is concerned as there have been reports of
                    buffer overflows.What would you suggest he do to reduce this risk?

                      A. Remove sample files
                      B. Upgrade is OS
                      C. Set appropriate permissions on files

                      D. Install the latest patches








                                                                              www.syngress.com
   528   529   530   531   532   533   534   535   536   537   538