Page 534 - StudyBook.pdf
P. 534
518 Chapter 8 • Infrastructure Security: System Hardening
2. Melissa is planning to evaluate the permissions on a Windows 2003 server.
When she checks the permissions she realizes that the production server is still
in its default configuration. She is worried that the file system is not secure.
What would you recommend Melissa do to alleviate this problem?
A. Remove the Anonymous access account from the permission on the root
directory
B. Remove the System account permissions on the root of the C drive direc-
tory
C. Remove the Everyone group from the permissions on the root directory
D. Shut down the production server until it can be hardened.
3. You have been asked to review the process your organization is using to set
privileges for network access.You have gone through the process of evaluating
risk.What should be the next step?
A. Determine authorization requirements
B. Make a decision on access method
C. Document findings
D. Create an ACL
4. You have been asked to review the general steps used to secure an OS.You
have already obtained permission to disable all unnecessary services.What
should be your next step?
A. Remove unnecessary user accounts and implement password guidelines
B. Remove unnecessary programs
C. Apply the latest patches and fixes
D. Restrict permissions on files and access to the registry
5. Yesterday, everything seemed to be running perfectly on the network.Today,
the Windows 2003 production servers keep crashing and running erratically.
The only events that have taken place are a scheduled backup, a CD/DVD
upgrade on several machines, and an unscheduled patch install.What do you
think has gone wrong?
www.syngress.com