Page 840 - StudyBook.pdf
P. 840

824    Appendix • Self Test Appendix

                  A. Monitor the success and failure of accessing printers and other resources.
                  B. Monitor the success of changes to accounts.
                  C. Monitor the success of restarts and shutdowns.
                  D. Monitor for escalated use of accounts during off hours.
              Answer D. Monitor for escalated use of accounts during off hours. Because the user normally
                 does not use the account as much as it is being used, it is indicative that someone has acquired
                 the username and password and is using the account without authorization.
              Answers A, B, and C are incorrect, because none of these indicate whether someone is using
                 the account without authorization. Monitoring the success and failure of accessing printers and
                 other resources can show whether improper permissions have been set.Auditing successful
                 changes to accounts, restart, and shutdowns of systems, and the ability to perform other actions
                 can also show if certain users have more access than they should.

             7.  You are configuring operating systems used in your organization. Part of this configuration
                 involves updating several programs, modifying areas of the Registry, and modifying the back-
                 ground wallpaper to show the company’s new logo. In performing these tasks, you want to
                 create documentation on the steps taken, so that if there is a problem, you can reverse the steps
                 and restore systems to their original state.What kind of documentation will you create?
                  A. Change control documentation
                  B. Inventory
                  C. Classification
                  D. Retention and storage documentation
              Answer A. Change control documentation provides information of changes that have been
                 made to a system, and often provides back out steps that show how to restore the system to its
                 previous state.
              Answer B is incorrect, because inventories provide a record of devices and software making up
                 a network, not changes made to the configuration of those devices.Answer C is incorrect,
                 because classification is a scheme of categorizing information, so that members of an organiza-
                 tion are able to understand the importance of information and less likely to leak sensitive infor-
                 mation.Answer D is incorrect, because retention and storage documentation is necessary to
                 keep track of data, so that it can be determined what data should be removed and/or destroyed
                 once a specific date is reached.

             8.  You are the administrator of a network running Novell NetWare, and are having problems with
                 a server’s ability to connect to other servers.The server was able to connect to the network
                 before you installed a recent bug fix.After attempting to solve the problem, you decide to
                 check and see if anyone else has had this problem.Where is the best place to find this informa-
                 tion?

                  A. The manual that came with the server
                  B. The vendor’s Web site
                  C. Service pack
                  D. Microsoft knowledge base



          www.syngress.com
   835   836   837   838   839   840   841   842   843   844   845