Page 803 - StudyBook.pdf
P. 803

Self Test Appendix • Appendix  787

                 9.  You are creating a new LDAP directory, in which you will need to develop a hierarchy of orga-
                    nizational units and objects.To perform these tasks, on which of the following servers will you
                    create the directory structure?
                      A. DIT
                      B. Tree server
                      C. Root server
                      D. Branch server
                  C.The root server is used to create the structure of the directory, with organizational units and
                    objects branching out from the root. Because LDAP directories are organized as tree structures,
                    the top of the hierarchy is called the root.
                  Answer A is incorrect, because the DIT is the name given to the tree structure.Answers B and
                    D are incorrect, because there is no such thing as a Branch server or Tree server in LDAP


                 Chapter 6: Infrastructure

                 Security: Devices and Media


                 1.  You are working for a company who is updating their network and telecommunications infras-
                    tructure.As part of the upgrade, they are in-sourcing their voicemail system rather than con-
                    tinue to pay their telecom provider for this service.The new voicemail system is connected to
                    the corporate network for maintenance purposes.What actions would you recommend be
                    taken?
                      A. Change all the default passwords on the new voicemail system.
                      B. Disconnect the new voicemail system from the corporate network when the connection
                         is not in use for servicing the system.
                      C. Store the new voicemail system in a secure location.
                      D. All of the above.
                  D.All of the recommendations listed are valid, therefore D is the correct answer.
                  A, B, C. Answers A, B, and C are all incorrect because they each comprise only a part of the
                    best solution.
                 2.  You have recently installed an IDS on your corporate network.While configuring the NIDS,
                    you decide to enable the monitoring of network traffic for a new exploit focused on attacking
                    workstations that go to a malformed URL causing the browser to experience a stack dump.To
                    configure the NIDS to watch for this, what must it be capable of monitoring?
                      A. HTTP Headers
                      B. TCP Headers
                      C. XML Content
                      D. HTTPS Content




                                                                              www.syngress.com
   798   799   800   801   802   803   804   805   806   807   808