Page 69 - StudyBook.pdf
P. 69

General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1  53

                      A. Log file analysis

                      B. System scanning
                      C. Penetration testing
                      D. Segregation of duties


                  13. You have been asked to configure a remote access server (RAS) for external
                      dial-up users to use on your TCP/IP-based network.As part of this configura-
                      tion, you must determine which protocols to allow to be routed through the
                      RAS and which to explicitly deny.Which of the following would you choose
                      to explicitly deny?
                      A. TCP/IP

                      B. IPX/SPX
                      C. NETBIOS
                      D. CDP

                  14. The screenshot below is from a file server on your corporate network.You
                      had a suspicion that there were some services running on the system that were
                      unnecessary. By performing a ‘netstat –a’ you confirmed that there is a service
                      listening on a well-known port which is not necessary for a file server.Which
                      service is this?


                 Figure 1.17 Netstat Screenshot





























                                                                              www.syngress.com
   64   65   66   67   68   69   70   71   72   73   74