Case Study

Text Formatting Key:

  • Describes requirements

  • Conflicts with requirement

  • Irrelevant background information

You are in charge of a small network with 20 workstations running Windows 2000 Professional, 2 servers running Windows 2000 Server, and 2 computers running Windows 98. You have never given much thought to security and have had a number of security problems.

Your goal is to plan a security design to improve all aspects of security for the network, while causing a minimum of trouble for users.

Multiple Choice

  1. Two of the Windows 2000 Professional workstations and one of the Windows 98 machines are used remotely via dial-up connections. You have recently had a number of outside attempts to gain access via the dial-up modems. Which of the following dial-up authentication methods could you use to provide the most improvement in security?

    1. PAP

    2. CHAP

    3. MS-CHAP

    4. MS-CHAP v2

  2. You suspect that one or more users have been accessing files they should not have access to. Which of the following could you use to help determine whether this is a problem?

    1. NTLM

    2. Auditing

    3. EFS

    4. Smart cards

  3. One of the users is storing files on the hard disk of his Windows 98 machine and has noticed that they are not secure. What can you do to improve security?

    1. Install EFS.

    2. Use smart card authentication.

    3. Move the files to another machine.

    4. Require the user to change passwords more frequently.

Create a Tree

  1. Create a table with the headings Less Secure and More Secure. Place each of the following pairs of items into the appropriate columns on a line of the table.

    1. LM vs. NTLM

    2. NAT vs. Proxy Server

    3. SSL vs. HTTP

    4. Digest authentication vs. standard Windows authentication

    5. Smart cards vs. username and password

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.239.226