Answering the following questions will reinforce key information presented in this chapter. If you are unable to answer a question, review the appropriate lesson and then try the question again. Answers to the questions can be found in the appendix.
- Scott Culp is concerned about the security of his contacts database. The database is in a shared folder on his computer named Contacts. He has set share permissions to allow only members of the Scott Contacts group Read permissions to the share and to ensure that only his account has Full Control permissions. Scott's computer is configured to dual boot with Windows 98 and the Contacts folder is stored on his c:\ drive. Are Scott's concerns valid?
- Bob has created a new folder on his desktop that he wants to share with Brian. If Bob enables only sharing and doesn't configure permissions, what security risks may exist?
- Your organization wants to secure the transmission of print jobs to a network printer. All client computers are using Windows 2000 Professional. The plan is to use IPSec to protect the transmission of print jobs between the client computer and the print server and from the print server to the physical network print device. Is this strategy feasible? If not, what can you do as an alternative?
- What security concerns result from leaving the domain's EFS recovery agent as the default EFS recovery agent?
- Two users in the Marketing department are working on a new ad campaign, and other members of the marketing department shouldn't know the details. Only the two user accounts must be able to open the document. An outside consultant has recommended using EFS to encrypt the file so that only the two users can access the document. Explain whether this proposal will work. If it won't, provide an alternative solution.