Review

Answering the following questions will reinforce key information presented in this chapter. If you are unable to answer a question, review the appropriate lesson and then try the question again. Answers to the questions can be found in the appendix.

  1. A computer game company creates versions of the same software for PCs, Linux, and Macintosh. Each version of the software is managed at separate branch offices, while the primary source code is stored on the corporate head office's Windows 2000 network. How would you authenticate Macintosh users and provide secure access to source code in the corporate office?



  2. The branch office that develops the Linux version of games uses a NetWare 5.0 network to store all common data. All data related to the Linux branch office is stored on a NetWare 5.0 server named LINDATA. Assuming that all accounting users will require the same level of access, how would you provide users in the corporate accounting office with secure access to payroll data stored on the LINDATA server?



  3. An organization currently uses both NetWare 4.11 and Windows 2000 Active Directory in the networking environment. User accounts are defined for all employees in both network operating systems. Many users are locked out of the network due to password violations related to maintaining two separate user accounts. What can you include in your design to limit password violations?



  4. An organization maintains user information in several directory services in the enterprise network. Human Resources uses Lotus Notes to track personal employee information such as home addresses, Information Technology uses Active Directory for managing user accounts on the network, and Payroll uses NDS for managing payroll information. Many employees have complained that address updates aren't being uniformly performed across the directory services. Assuming that the organization wants each department to control user attributes pertaining to their department, how can you secure the integration of the directory services?



  5. Several users in your organization use both Macintosh computers and Windows 2000 Professional computers to access the corporate network. Your organization recently implemented a new password policy that requires passwords to be a minimum of nine characters. Once the password policy came into effect, several of the multioperating system users could authenticate only on the Windows 2000 Professional computers. They lost the ability to log on to the network from the Macintosh computers. What might be causing this problem? What can your organization do to enable the users to continue using their Macintosh computers?



Answers



Microsoft Corporation - MCSE Training Kit (Exam 70-220. Designing Microsoft Windows 2000 Network Security)
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
ISBN: 0735611343
EAN: 2147483647
Year: 2001
Pages: 172

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net