Is This Book for You?

 < Day Day Up > 



If you want to acquire a solid foundation in designing security for a Windows Server 2003 network environment and your goal is to prepare for the exam by learning how to design a secure solution for a client using the new operating system, this book is for you. You’ll find clear explanations of the fundamental concepts you need to grasp and plenty of help to achieve the high level of professional competency you need to succeed in your chosen field.

If you want to become certified as an MCSE, this book is definitely for you. However, if you just want to attempt to pass the exam without really understanding how Windows Server 2003 security works, this Study Guide is not for you. It is written for people who want to acquire hands-on skills and in-depth knowledge of Windows Server 2003 security design.

What’s in the Book?

What makes a Sybex Study Guide the book of choice for over 100,000 MCPs? We took into account not only what you need to know to pass the exam, but what you need to know to take what you’ve learned and apply it in the real world. Each book contains the following:

  • Objective-by-objective coverage of the topics you need to know Each chapter lists the objectives covered in that chapter.

    Note

    The topics covered in this Study Guide map directly to Microsoft’s official exam objectives. Each exam objective is covered completely.

  • Assessment Test Directly following this introduction is an Assessment Test that you should take. It is designed to help you determine how much you already know about designing security for Windows Server 2003. Each question is tied to a topic discussed in the book. Using the results of the Assessment Test, you can figure out the areas where you need to focus your study. Of course, we do recommend you read the entire book.

  • Exam Essentials To highlight what you learn, you’ll find a list of Exam Essentials at the end of each chapter. The Exam Essentials section briefly highlights the topics that need your particular attention as you prepare for the exam.

  • Key Terms and Glossary Throughout each chapter, you will be introduced to important terms and concepts that you will need to know for the exam. These terms appear in italic within the chapters, and a list of the Key Terms appears just after the Exam Essentials. At the end of the book, a detailed Glossary gives definitions for these terms, as well as other general terms you should know.

  • Review Questions, complete with detailed explanations Each chapter is followed by a set of Review Questions that test what you learned in the chapter. The questions are written with the exam in mind, which means that they will cover the important topics with regard to the exam.

  • Case Study Questions, complete with detailed explanations Each chapter also includes a Case Study that is similar in look and feel to the types of questions you will encounter on the design exams. The Case Study in each chapter is designed to test your knowledge of the topics covered in the chapter. Question types are the same as question types in the exam, including multiple choice, exhibits, and select-and-place.

  • Design Scenarios Throughout the chapter, you will find scenario-based exercises that are designed to help you think about how you will use the information presented in the chapter in the context of a scenario. They present a Case Study and a few questions that help you think about how you will use the information in the chapter in designing a solution with the Microsoft products.

  • Real World Scenarios Because reading a book isn’t enough for you to learn how to apply these topics in your everyday duties, we have provided Real World Scenarios in special sidebars. These explain when and why a particular solution would make sense, in a working environment you’d actually encounter.

  • Interactive CD Every Sybex Study Guide comes with a CD complete with additional questions, flashcards for use with an interactive device, and the book in electronic format. Details are in the following section.

What’s on the CD?

With this new member of our best-selling MCSE Study Guide series, we are including quite an array of training resources. The CD offers bonus exams and flashcards to help you study for the exam. We have also included the complete contents of the Study Guide in electronic form. The CD’s resources are described here:

The Sybex E-book for Windows Server 2003 Network Security Design Many people like the convenience of being able to carry their whole Study Guide on a CD. They also like being able to search the text via computer to find specific information quickly and easily. For these reasons, the entire contents of this Study Guide are supplied on the CD, in PDF. We’ve also included Adobe Acrobat Reader, which provides the interface for the PDF contents as well as the search capabilities.

The Sybex Test Engine This is a collection of questions that will help you prepare for your exam. The test engine features:

  • Eight Bonus Case Studies designed to simulate the actual live exam. Each Bonus Case Study contains a scenario with 10 questions tied to each Case Study.

  • All the Review and Case Study questions from the Study Guide, presented in a test engine for your review.

  • The Assessment Test.

Here are two sample screens from the Sybex Test Engine:

click to expand

On the actual Microsoft exam, you will likely be presented with a total of four Case Studies, each with a varying number of questions that correspond to that Case Study. Your grade will be cumulative of all four Case Studies.

Sybex MCSE Flashcards for PCs and Handheld Devices The “flashcard” style of question offers an effective way to quickly and efficiently test your understanding of the fundamental concepts covered in the exam. The Sybex Flashcards set consists of more than 100 questions presented in a special engine developed specifically for this Study Guide series. Here’s what the Sybex Flashcards interface looks like:

click to expand

Because of the high demand for a product that will run on handheld devices, we have also developed a version of the flashcard questions that you can take with you on your Palm OS PDA (including the PalmPilot and Handspring’s Visor).

How Do You Use This Book?

This book provides a solid foundation for the serious effort of preparing for the exam. To best benefit from this book, you may wish to use the following study method:

  1. Take the Assessment Test to identify your weak areas.

  2. Study each chapter carefully. Do your best to fully understand the information.

  3. Read over the Design Scenarios and Real World Scenarios to improve your understanding of how to use what you learn in the book.

  4. Study the Exam Essentials and Key Terms to make sure you are familiar with the areas you need to focus on.

  5. Answer the Review and Case Studies at the end of each chapter. If you prefer to answer the questions in a timed and graded format, install the Sybex Test Engine from the book’s CD and answer the questions there instead of in the book.

  6. Take note of the questions you did not understand, and study the corresponding sections of the book again.

  7. Go back over the Exam Essentials and Key Terms.

  8. Go through the Study Guide’s other training resources, which are included on the book’s CD. These include electronic flashcards, the electronic version of the Review and Case Study questions, and the eight Bonus Case Studies.

To learn all the material covered in this book, you will need to study regularly and with discipline. Try to set aside the same time every day to study, and select a comfortable and quiet place in which to do it. If you work hard, you will be surprised at how quickly you learn this material. Good luck!

Hardware and Software Requirements

Most of the exercises in this book are scenario based, which means you will think about the results rather than actually perform steps using the software. Where we felt it would be appropriate to show you how a technology is implemented to clarify its use, we included some hands-on exercises. You will be able to work through the hands-on exercises in this book by using a server with Windows Server 2003 installed as a domain controller. If you desire to gain more experience with the products, then you will need to set up at two computers, one running Windows Server 2003 and one running Windows XP. This will allow you to use various management tools and services to manage security on the network.

You should verify that your computer meets the minimum requirements for installing Windows Server 2003. We suggest that your computer meet or exceed the recommended requirements for a more enjoyable experience.

Contacts and Resources

To find out more about Microsoft Education and Certification materials and programs, to register with Prometric or VUE, or to obtain other useful certification information and additional study resources, check the following resources:

  • Microsoft Training and Certification Home Page

    www.microsoft.com/traincert

    This website provides information about the MCP program and exams. You can also order the latest Microsoft Roadmap to Education and Certification.

  • Microsoft TechNet Technical Information Network

    www.microsoft.com/technet

    800-344-2121

    Use this website or phone number to contact support professionals and system administrators. Outside the United States and Canada, contact your local Microsoft subsidiary for information.

  • Prometric

    www.prometric.com

    800-755-3936

    Contact Prometric to register to take an MCP exam at any of more than 800 Prometric Testing Centers around the world.

  • Virtual University Enterprises (VUE)

    www.vue.com

    888-837-8616

    Contact the VUE registration center to register to take an MCP exam at one of the VUE Testing Centers.

  • MCP Magazine Online

    www.mcpmag.com

    Microsoft Certified Professional Magazine is a well-respected publication that focuses on Windows certification. This site hosts chats and discussion forums and tracks news related to the MCSE program. Some of the services cost a fee, but they are well worth it.

  • Windows & .NET Magazine

    www.windows2000mag.com

    You can subscribe to this magazine or read free articles at the website. The study resource provides general information on Windows Server 2003, Windows XP, and Windows 2000 Server.

  • Cramsession on Brainbuzz.com

    cramsession.brainbuzz.com

    Cramsession is an online community focusing on all IT certification programs. In addition to discussion boards and job locators, you can download one of several free cram sessions, which are nice supplements to any study approach you take.

Assessment Test

1.

The process of analyzing an organization’s assets and determining what needs to be protected versus the cost of protecting the asset and the likelihood that it will be attacked is known as what?

  1. Security threat analysis

  2. Security cost analysis

  3. Security risk analysis

  4. Secure asset analysis

c. security analysis is the first step in creating an effective security policy. first you determine the cost of the asset in business terms (actual loss, loss of productivity, competitive advantage) and then the risk (the likelihood that a threat would be carried out against the asset). for more information, see chapter 1 .

2.

Which of the following is a document that explains what assets your organization needs to secure, how to secure them, and what to do if the security is compromised?

  1. Security brief

  2. Security documentation

  3. Security policy

  4. Security manual

c. this type of document is called a security policy. you would create a security policy after analyzing the risks to the assets on your network. it helps you make decisions about what type of security to implement by defining what an organization s security goals are. for more information, see chapter 1 .

3.

Threats to the security of a network only come from external attackers.

  1. True

  2. False

b. vulnerabilities are actually more likely to come from within your organization rather than from outside of it. see chapter 2 for more information.

4.

In order to create a protected network segment, you could include which of the following firewall configurations in your network design? (Choose all that apply.)

  1. Back-to-back configuration

  2. Firewire configuration

  3. Bastion host configuration

  4. Switch configuration

  5. Three-pronged configuration

a, c, e. back-to-back configuration, three-pronged configuration, and bastion host are all ways to physically secure a network segment using one or more firewalls. routers and switches do not typically provide this type of functionality. see chapter 2 for more information.

5.

What is the purpose of the IP Security (IPSec) protocol with regard to security? (Choose all that apply.)

  1. It provides encryption of IP packets.

  2. It provides verification that the packets have not been changed in transit.

  3. It provides translation of packets through a firewall.

  4. It provides filtering of packets at the firewall.

a, b. ipsec provides for the encryption of data and for verification that the packets have not been changed in transit. it does not have anything to do with moving packets through a firewall or filtering packets, although ipsec can be filtered and have translation issues on a firewall. see chapter 3 for more information.

6.

What are the main vulnerabilities to data transmitted across the network? (Choose all that apply.)

  1. Network monitoring

  2. Identity spoofing

  3. Data modification (man-in-the-middle attack)

  4. Denial of service

a, b, c, d. all of the options are correct. if packets on a network are captured, their content could be revealed. identity spoofing involves changing the source ip address, the from address on e-mail, or icmp packets to fool the receiver. the modification of a packet in transit can make it hard to trust the information or can be used to fool servers into allowing access to privileged data. a denial of service attack involves sending a large volume of packets to a server or sending a special type of packet that will prevent legitimate users from accessing the resource. see chapter 3 for more information.

7.

What two techniques are used to determine if an account is allowed to access a resource? (Choose all that apply.)

  1. Authorization

  2. Replication

  3. Encryption

  4. Authentication

a, d. authentication is determining the identity of the account, and authorization is then determining what that account is permitted to access. replication and encryption do not provide this functionality. see chapter 4 for more information.

8.

A Windows Server 2003 domain cannot trust a Windows NT 4 domain.

  1. True

  2. False

b. a trust relationship can be created between a windows server 2003 domain and a windows nt 4 domain. see chapter 4 for more information.

9.

Which of the following class of user account pose the greatest threat to security?

  1. Normal user

  2. Power user

  3. Administrative user

  4. Temporary user

c. an account with administrative permissions will pose the greatest threat because it has the least restrictions on it. see chapter 4 for more information.

10.

Trusts between domains within a single tree are transitive.

  1. True

  2. False

a. trusts between domains within a single tree are transitive. see chapter 4 for more information.

11.

What feature does Active Directory enable that allows you to give users only the permissions that they require for a specific task?

  1. Encryption

  2. Impersonation

  3. Delegation

  4. Authorization

c. delegation is a feature provided by active directory that allows you to give a user explicit control over explicit resources. see chapter 5 for more information.

12.

The Encrypting File System makes sure that data is encrypted when it is passed over a network.

  1. True

  2. False

b. the encrypting file system keeps data encrypted on disk, not across the network. see chapter 5 for more information.

13.

What does the acronym PKI stand for?

  1. Public knowledge infrastructure

  2. Private key infrastructure

  3. Public key infrastructure

  4. Public key institution

c. pki stands for public key infrastructure, which is a means of authenticating users through public and private key combinations and digital certificates. see chapter 6 for more information.

14.

What document is used to verify the identity of a machine or user?

  1. Signature

  2. Digital certificate

  3. Encryption

  4. Password

b. you can use a digital certificate to validate a machine s or user s identity. it provides information about the machine or user and contains the signature of the root ca which you can trust or not. see chapter 6 for more information.

15.

Which of the following is a method of authentication in Internet Information Server 6?

  1. Pluggable Authentication Module (PAM)

  2. Microsoft Passport .NET

  3. Extensible Authentication Protocol (EAP)

  4. MS-CHAPv2

b. you can use microsoft passport .net authentication to authenticate with users passports, which allows them to have a single logon for the internet sites that support microsoft passport. in addition to using passport .net authentication, you can use basic, integrated windows (which supports ntlm and kerberos authentication), digest, and forms-based authentication methods or using radius. extensible authentication protocol and ms-chapv2 are protocols used to authenticate a vpn or dial-up connection. pam is a way of providing authentication on the apache web server, a competitor to iis. for more information, see chapter 7 .

16.

What methods can be used update content on an IIS Server? (Choose all that apply.)

  1. WebDAV

  2. FTP

  3. FrontPage Server Extensions

  4. File shares

a, b, c, d. all of these methods are available to update an iis server. the appropriate method that you will use will depend on your security needs and the ease-of-use requirements of your content providers. it can also vary depending on the environment of the server (production, staging, development) and the tools in use. for more information, see chapter 7 .

17.

The Security Configuration And Analysis MMC snap-in is used to create and modify security templates.

  1. True

  2. False

b. the security settings mmc snap-in is used to create and modify security templates. the security configuration and analysis mmc snap-in is used to analyze and apply templates. see chapter 8 for more information.

18.

Which of the following methods is the most appropriate to deploy security settings to a group of computers?

  1. Security Configuration And Analysis MMC snap-in

  2. Group Policy

  3. Local Policy MMC snap-in

  4. secutil.exe

b. the best technique to apply security settings is by setting the security on a group policy object and linking it to a container. once you link the template settings to a gpo, the security settings will be refreshed automatically with group policy. see chapter 8 for more information.

19.

What server role would be a candidate for the predefined hisecws.inf security template? (Choose all that apply.)

  1. Domain controller

  2. Database server

  3. Mail server

  4. Web server

  5. Global Catalog server

b, c, d. domain controllers would use the hisecdc.inf security template instead of the hisecws.inf because it has built-in configuration settings for domain controllers. see chapter 8 for more information.

20.

What technologies supported by Windows Server 2003 can be used to apply patches to a computer? (Choose all that apply.)

  1. Microsoft Windows Update website

  2. Software Update Services (SUS)

  3. Systems Management Server 2003

  4. Group Policy

a, b, c, d. all of the listed technologies can be used to apply patches to a computer. see chapter 9 for more information.

21.

In order to analyze the security patches that have been applied to a computer, you could use the Microsoft Baseline Security Analyzer (MBSA) utility.

  1. True

  2. False

a. the microsoft baseline security analyzer (mbsa) can be scheduled to audit several computers and report their security configuration as well as which critical patches have been applied. see chapter 9 for more information.

22.

What technology could you use so that employees can run only approved applications?

  1. Microsoft Baseline Security Analyzer (MBSA)

  2. Security Configuration And Analysis MMC snap-in

  3. Software restriction policy

  4. Software Update Services (SUS)

c. software restriction policies allow administrators to explicitly allow or deny software the ability to execute. see chapter 9 for more information.

23.

What technology provides a graphical remote terminal and can be used to securely manage a remote server as if you were sitting at the console?

  1. Secure Shell

  2. Telnet

  3. Remote Desktop for Administration

  4. Remote Assistance

c. remote desktop for administration is the most common mechanism used to manage windows server 2003. it provides secure mechanisms for authentication, and by default, 128-bit encryption is enabled for communications. for more information, see chapter 10 .

24.

What is the main security concern when using remote management tools to manage a server?

  1. Remote management tools allow data and passwords to pass unencrypted over the network.

  2. Remote management tools don’t work over slow network connections.

  3. Remote management tools don’t work through firewalls or secure routers.

  4. Remote management tools must use remote procedure calls.

a. you should be concerned about the secure authentication mechanisms and encryption mechanisms provided by the tools. if a remote management tool does not provide these mechanisms, you should consider another tool or means of providing secure authentication and encryption. for more information, see chapter 10 .

Answers

1.

C. Security analysis is the first step in creating an effective security policy. First you determine the cost of the asset in business terms (actual loss, loss of productivity, competitive advantage) and then the risk (the likelihood that a threat would be carried out against the asset). For more information, see Chapter 1.

2.

C. This type of document is called a security policy. You would create a security policy after analyzing the risks to the assets on your network. It helps you make decisions about what type of security to implement by defining what an organization’s security goals are. For more information, see Chapter 1.

3.

B. Vulnerabilities are actually more likely to come from within your organization rather than from outside of it. See Chapter 2 for more information.

4.

A, C, E. Back-to-back configuration, three-pronged configuration, and bastion host are all ways to physically secure a network segment using one or more firewalls. Routers and switches do not typically provide this type of functionality. See Chapter 2 for more information.

5.

A, B. IPSec provides for the encryption of data and for verification that the packets have not been changed in transit. It does not have anything to do with moving packets through a firewall or filtering packets, although IPSec can be filtered and have translation issues on a firewall. See Chapter 3 for more information.

6.

A, B, C, D. All of the options are correct. If packets on a network are captured, their content could be revealed. Identity spoofing involves changing the source IP address, the From address on e-mail, or ICMP packets to fool the receiver. The modification of a packet in transit can make it hard to trust the information or can be used to fool servers into allowing access to privileged data. A denial of service attack involves sending a large volume of packets to a server or sending a special type of packet that will prevent legitimate users from accessing the resource. See Chapter 3 for more information.

7.

A, D. Authentication is determining the identity of the account, and authorization is then determining what that account is permitted to access. Replication and encryption do not provide this functionality. See Chapter 4 for more information.

8.

B. A trust relationship can be created between a Windows Server 2003 domain and a Windows NT 4 domain. See Chapter 4 for more information.

9.

C. An account with administrative permissions will pose the greatest threat because it has the least restrictions on it. See Chapter 4 for more information.

10.

A. Trusts between domains within a single tree are transitive. See Chapter 4 for more information.

11.

C. Delegation is a feature provided by Active Directory that allows you to give a user explicit control over explicit resources. See Chapter 5 for more information.

12.

B. The Encrypting File System keeps data encrypted on disk, not across the network. See Chapter 5 for more information.

13.

C. PKI stands for public key infrastructure, which is a means of authenticating users through public and private key combinations and digital certificates. See Chapter 6 for more information.

14.

B. You can use a digital certificate to validate a machine’s or user’s identity. It provides information about the machine or user and contains the signature of the root CA which you can trust or not. See Chapter 6 for more information.

15.

B. You can use Microsoft Passport .NET authentication to authenticate with users’ Passports, which allows them to have a single logon for the Internet sites that support Microsoft Passport. In addition to using Passport .NET authentication, you can use basic, integrated Windows (which supports NTLM and Kerberos authentication), digest, and forms-based authentication methods or using RADIUS. Extensible Authentication Protocol and MS-CHAPv2 are protocols used to authenticate a VPN or dial-up connection. PAM is a way of providing authentication on the Apache web server, a competitor to IIS. For more information, see Chapter 7.

16.

A, B, C, D. All of these methods are available to update an IIS server. The appropriate method that you will use will depend on your security needs and the ease-of-use requirements of your content providers. It can also vary depending on the environment of the server (production, staging, development) and the tools in use. For more information, see Chapter 7.

17.

B. The Security Settings MMC snap-in is used to create and modify security templates. The Security Configuration And Analysis MMC snap-in is used to analyze and apply templates. See Chapter 8 for more information.

18.

B. The best technique to apply security settings is by setting the security on a Group Policy object and linking it to a container. Once you link the template settings to a GPO, the security settings will be refreshed automatically with Group Policy. See Chapter 8 for more information.

19.

B, C, D. Domain controllers would use the hisecdc.inf security template instead of the hisecws.inf because it has built-in configuration settings for domain controllers. See Chapter 8 for more information.

20.

A, B, C, D. All of the listed technologies can be used to apply patches to a computer. See Chapter 9 for more information.

21.

A. The Microsoft Baseline Security Analyzer (MBSA) can be scheduled to audit several computers and report their security configuration as well as which critical patches have been applied. See Chapter 9 for more information.

22.

C. Software restriction policies allow administrators to explicitly allow or deny software the ability to execute. See Chapter 9 for more information.

23.

C. Remote Desktop for Administration is the most common mechanism used to manage Windows Server 2003. It provides secure mechanisms for authentication, and by default, 128-bit encryption is enabled for communications. For more information, see Chapter 10.

24.

A. You should be concerned about the secure authentication mechanisms and encryption mechanisms provided by the tools. If a remote management tool does not provide these mechanisms, you should consider another tool or means of providing secure authentication and encryption. For more information, see Chapter 10.



 < Day Day Up > 



MCSE. Windows Server 2003 Network Security Design Study Guide Exam 70-298
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net