Review Questions



Review Questions

Chapter 6: Host Hardening

1. To know how to install an operating system with secure configuration options, you would use a...

a. security baseline

b. standard

c. security template

d. wizard

2. A systems administrator’s main role is to…

a. manage a network

b. implement security baseline on servers

c. None of the above

3. In a Windows network, which of the following could be used to implement security measures on multiple computers through a domain?

a. Policy Maker

b. Group policies

c. Domain Access Control Lists

4. UNIX command-line interfaces are called _____.

a. versions

b. distributions

c. GUIs

d. shells

e. windows

5. Traditionally, default installations of operating systems _____.

a. turn off most infrequently used services to reduce RAM and processing requirements

b. turn on many infrequently used services to ease management labor

6. In _____, the ps command is used to learn what services are running.

a. Microsoft Windows

b. UNIX/Lunix

c. Novell NetWare

d. None of the above

7. In UNIX, to know what port each connection is using, you would use _____.

a. ps

b. Inetd

c. Rc script

d. netstat

8. In UNIX, infrequently used services are started when users send service requests. Which of the following program starts the services?

a. ps

b. inetd

c. rc scripts

d. TCP wrappers

e. netstat

9. In Windows, when files are encrypted using Encrypted File System, an attacker who breaks in can still get a copy of the files.

a. True

b. False

10. Tripwire is a(n) _____

a. IDS

b. host firewall

c. event logger

d. file integrity checker

e. All of the above.

11. Microsoft’s vulnerability checker is _____.

a. Tripwire

b. MBSA

c. tar

d. the Audit MMC

e. Bloodhound

12. Which of the following is true about installing and configuring software programs?

a) Use different security baselines for different OS and OS versions

b) Use different security baselines for different types of server applications (web service, email service, etc.)

c) Use different security baselines for different types of client applications

d) All of the above

13. You want to know whether a Windows’ system is properly configured or has some vulnerability configurations. What tool can use?

Answer: _____________

14. As a systems administrator, you realized that a couple of services that are not needed at this point by your organization are running on one of the server computers. The services include telnet and Network Dynamic Data Exchange. What should you do?

a) Remove the services in questions from the server computer

b) Turn off the services in question from the server computer

c) None of the above

15. As a systems administrator, you realized that a couple of user accounts belonging to employees who have been suspended are active on the system. What should you do?

Answer: ________________________________________________________________

16. Which of the following is not tree about having services that are not needed running on a server computer?

a) It give attackers less attack opportunities

b) More services can increase host load

c) More services can decrease the performance of the host computer

d) Reducing services reduces logs and makes detection of intrusion easier

e) None of the above

18. File integrity checkers like Tripwire and AFICK are meant to be used in order to determine what files have been compromised after attacks. But they can lead to false positives. How so? Explain.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download