Page 814 - StudyBook.pdf
P. 814

798    Appendix • Self Test Appendix

             2.  Melissa is planning to evaluate the permissions on a Windows 2003 server.When she checks the
                 permissions she realizes that the production server is still in its default configuration. She is
                 worried that the file system is not secure.What would you recommend Melissa do to alleviate
                 this problem?
                  A. Remove the Anonymous access account from the permission on the root directory
                  B. Remove the System account permissions on the root of the C drive directory
                  C. Remove the Everyone group from the permissions on the root directory
                  D. Shut down the production server until it can be hardened.
              C. Remove the Everyone group permissions on the root directory will limit access and help
                 secure the file system.
              Answer A is incorrect because removing the anonymous group will not prevent authenticated
                 users from gaining access.Answer B is incorrect because removing the System account permis-
                 sions on the root of the C drive directory will cause accessible problems by system processes.
                 Answer D is incorrect as since it is a production server it may not be possible to take the
                 system off line. Changes will need to be done with the approval of management.

             3.  You have been asked to review the process your organization is using to set privileges for net-
                 work access.You have gone through the process of evaluating risk.What should be the next
                 step?

                  A. Determine authorization requirements
                  B. Make a decision on access method
                  C. Document findings
                  D. Create an ACL
              B.The next logical step would be to make a decision on the access method.
              This would be followed by determining access requirements, creating an ACL, and finally you
                 would need to document the results.Therefore Answers A, C, and D are incorrect.

             4.  You have been asked to review the general steps used to secure an OS.You have already
                 obtained permission to disable all unnecessary services.What should be your next step?
                  A. Remove unnecessary user accounts and implement password guidelines
                  B. Remove unnecessary programs
                  C. Apply the latest patches and fixes
                  D. Restrict permissions on files and access to the registry
              A.The first step after disabling all unnecessary services should be to remove unnecessary user
                 accounts and implement password guidelines.
              Answers B, C, and D are incorrect because the proper order should be: 1) disable all unneces-
                 sary services, 2) restrict permissions on files, 3) remove unnecessary programs, 4) apply the latest
                 patches and fixes, and 5) remove unnecessary user accounts.







          www.syngress.com
   809   810   811   812   813   814   815   816   817   818   819