Page 814 - StudyBook.pdf
P. 814
798 Appendix • Self Test Appendix
2. Melissa is planning to evaluate the permissions on a Windows 2003 server.When she checks the
permissions she realizes that the production server is still in its default configuration. She is
worried that the file system is not secure.What would you recommend Melissa do to alleviate
this problem?
A. Remove the Anonymous access account from the permission on the root directory
B. Remove the System account permissions on the root of the C drive directory
C. Remove the Everyone group from the permissions on the root directory
D. Shut down the production server until it can be hardened.
C. Remove the Everyone group permissions on the root directory will limit access and help
secure the file system.
Answer A is incorrect because removing the anonymous group will not prevent authenticated
users from gaining access.Answer B is incorrect because removing the System account permis-
sions on the root of the C drive directory will cause accessible problems by system processes.
Answer D is incorrect as since it is a production server it may not be possible to take the
system off line. Changes will need to be done with the approval of management.
3. You have been asked to review the process your organization is using to set privileges for net-
work access.You have gone through the process of evaluating risk.What should be the next
step?
A. Determine authorization requirements
B. Make a decision on access method
C. Document findings
D. Create an ACL
B.The next logical step would be to make a decision on the access method.
This would be followed by determining access requirements, creating an ACL, and finally you
would need to document the results.Therefore Answers A, C, and D are incorrect.
4. You have been asked to review the general steps used to secure an OS.You have already
obtained permission to disable all unnecessary services.What should be your next step?
A. Remove unnecessary user accounts and implement password guidelines
B. Remove unnecessary programs
C. Apply the latest patches and fixes
D. Restrict permissions on files and access to the registry
A.The first step after disabling all unnecessary services should be to remove unnecessary user
accounts and implement password guidelines.
Answers B, C, and D are incorrect because the proper order should be: 1) disable all unneces-
sary services, 2) restrict permissions on files, 3) remove unnecessary programs, 4) apply the latest
patches and fixes, and 5) remove unnecessary user accounts.
www.syngress.com