Page 69 - StudyBook.pdf
P. 69
General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1 53
A. Log file analysis
B. System scanning
C. Penetration testing
D. Segregation of duties
13. You have been asked to configure a remote access server (RAS) for external
dial-up users to use on your TCP/IP-based network.As part of this configura-
tion, you must determine which protocols to allow to be routed through the
RAS and which to explicitly deny.Which of the following would you choose
to explicitly deny?
A. TCP/IP
B. IPX/SPX
C. NETBIOS
D. CDP
14. The screenshot below is from a file server on your corporate network.You
had a suspicion that there were some services running on the system that were
unnecessary. By performing a ‘netstat –a’ you confirmed that there is a service
listening on a well-known port which is not necessary for a file server.Which
service is this?
Figure 1.17 Netstat Screenshot
www.syngress.com