Review Questions

 < Day Day Up > 



1.

Which part of the security descriptor is used to grant or deny users and groups access to an object?

  1. Discretionary access control list (DACL)

  2. System access control list (SACL)

  3. Access token

  4. Security ID (SID)

a. the dacl is the part of the security descriptor that is used to grant or deny specific users and groups access to the object. the sacl is used to determine which events are to be audited for specific users or groups. an access token contains the information regarding a logged-on user. the security id (sid) is used to uniquely identify objects in active directory.

2.

Following best practices, put the following tasks in the order that they should be completed when designing a security group strategy.

Place Accounts in Global groups.

Assign Permissions to Domain Local groups.

Nest your Global groups.

Put the Universal group in the Domain Local group.

Place Global groups in a Universal group.

 place accounts in global groups. nest your global groups. place global groups in a universal group. assign permissions to domain local groups. put the universal group in the domain local group. follow the ag(g)udlp method, but the placement of the universal group in the domain local group should be last. by doing this task last, you prevent anyone from accessing the resources until they have been completely secured.

3.

Which of the following permissions are a part of the standard NTFS permissions? (Choose all that apply.)

  1. Full Control

  2. Modify

  3. Read & Execute

  4. Open

  5. Change

c. when a share is created by default, the everyone group is granted full control through the share.

4.

What are the default permissions on a share when it is created?

  1. Users Allow-Read

  2. Everyone Deny-Full Control

  3. Everyone Allow-Full Control

  4. Users Allow-Full Control

  5. Everyone Allow-Read

c. when a share is created by default, the everyone group is granted full control through the share.

5.

Which of the following Active Directory features can you use to minimize the number of individuals who are granted administrative permissions?

  1. Impersonation

  2. Delegation

  3. Microsoft Baseline Security Analyzer (MBSA)

  4. Group Policy

b. rather than making a user such as a help desk technician a member of the administrators or domain administrators group, you can use delegation to grant the user or group control over an object or an entire active directory container, thus minimizing the number of users or groups who require membership in the administrative groups.

6.

Many of the users in your organization use laptops that are running Windows XP Professional and take them out of the office. There is some confidential information that is stored on the laptops, and you need to make sure that if the laptops get lost or stolen, the data is not compromised. What should you do?

  1. Enable the Encrypting File System (EFS) on the folder that the files are stored in.

  2. Use NTFS to secure the folder that the files are stored in.

  3. Configure IPSec to encrypt the data on the disk.

  4. Configure SSL to encrypt the data on the disk.

a. efs is the technology that should be used to secure the data on disk. ntfs will not prevent access to the files and folders if the disk is physically obtained by someone else. ipsec and ssl are used to encrypt data over the network, not on disk.

7.

You are administering a folder that all of the users in the Accountants groups use. The users need to be able to create, modify, and delete files in the AcctData folder. What permissions should you add to the ACL for the Accountants group when you grant them access to the AcctData folder? (Choose all that apply.)

  1. Full Control

  2. Modify

  3. Read & Execute

  4. List Folder Contents

  5. Read

  6. Write

b, c, d, e, f. the only permission that you should not assign to the accountants group is full control because it includes the ability to change permissions and take ownership, which is not required in the scenario presented in the question.

8.

Which of the following users can assign permissions on a file by default? (Choose all that apply.)

  1. An administrator

  2. The last user to modify the file

  3. The Users group

  4. The creator/owner of the file

a, d. by default, an administrator and the creator/owner of the file would have the full control permission, which includes the change permissions special permission.

9.

You are a member of the security group name AcctGroup. The AcctGroup has been granted Full Control to the AcctData share. The AcctData share contains a folder, named MonthlyData, to which the AcctGroup has been assigned the Modify NTFS permission. When accessing files over the network, what permissions do you have? (Choose all that apply.)

  1. Full Control

  2. Modify

  3. Read & Execute

  4. List Folder Contents

  5. Read

  6. Write

b, c, d, e, f. you will have the modify permission across the network. full control is not granted at the folder level; therefore, it will never propagate through the share.

10.

You are a member of the Administrators group and the Employees group. The Employees group has been granted the Change permission to the EmpData share. The EmpData share contains a folder, named VacationData, to which the Employee group has been assigned the Read and List Folder Contents NTFS permission. The Administrators group was removed from the ACL on the share. When accessing files over the network using the EmpData share, what permissions do you have? (Choose all that apply.)

  1. Full Control

  2. Modify

  3. Read & Execute

  4. List Folder Contents

  5. Read

  6. Write

b, c, d, e, f. by default, the everyone group is granted the read permission on a share. the scenario states that the employees group is granted the change permission on the share. when combining share and ntfs permissions, the most restrictive is what is effective. administrators have, by default, the full control ntfs permission on all folders. when combined with the change permission on the share, change is the only permission granted to the administrators group when accessing files and folders through the share.

Answers

1.

A. The DACL is the part of the security descriptor that is used to grant or deny specific users and groups access to the object. The SACL is used to determine which events are to be audited for specific users or groups. An access token contains the information regarding a logged-on user. The Security ID (SID) is used to uniquely identify objects in Active Directory.

2.

Place Accounts in Global groups.

Nest your Global groups.

Place Global groups in a Universal group.

Assign Permissions to Domain Local groups.

Put the Universal group in the Domain Local group.

Follow the AG(G)UDLP method, but the placement of the Universal group in the Domain Local group should be last. By doing this task last, you prevent anyone from accessing the resources until they have been completely secured.

3.

C. When a share is created by default, the Everyone group is granted Full Control through the share.

4.

C. When a share is created by default, the Everyone group is granted Full Control through the share.

5.

B. Rather than making a user such as a help desk technician a member of the Administrators or Domain Administrators group, you can use delegation to grant the user or group control over an object or an entire Active Directory container, thus minimizing the number of users or groups who require membership in the administrative groups.

6.

A. EFS is the technology that should be used to secure the data on disk. NTFS will not prevent access to the files and folders if the disk is physically obtained by someone else. IPSec and SSL are used to encrypt data over the network, not on disk.

7.

B, C, D, E, F. The only permission that you should not assign to the Accountants group is Full Control because it includes the ability to change permissions and take ownership, which is not required in the scenario presented in the question.

8.

A, D. By default, an administrator and the creator/owner of the file would have the Full Control permission, which includes the Change Permissions special permission.

9.

B, C, D, E, F. You will have the Modify permission across the network. Full Control is not granted at the folder level; therefore, it will never propagate through the share.

10.

B, C, D, E, F. By default, the Everyone group is granted the Read permission on a share. The scenario states that the Employees group is granted the Change permission on the share. When combining Share and NTFS permissions, the most restrictive is what is effective. Administrators have, by default, the Full Control NTFS permission on all folders. When combined with the Change permission on the share, Change is the only permission granted to the Administrators group when accessing files and folders through the share.



 < Day Day Up > 



MCSE. Windows Server 2003 Network Security Design Study Guide Exam 70-298
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net