下沙论坛

 找回密码
 注册论坛(EC通行证)

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 3537|回复: 0
打印 上一主题 下一主题

Killtset 70-299题库(DEMO)

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2008-10-7 18:00:37 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
认证名称:Implementing and Administering Security in a Microsoft Windows Server 2003 Network
/ X7 m5 h4 X  |1 ~, H! h考题数目:55
  c- _3 y! Q* E" M5 h0 C价格:¥ 300 - q( Z; T/ b3 f( t
更新:2008-09-01
4 b$ B( i$ ?/ F7 C1.You are a security administrator for your company. The network consists of a single Active Directory domain.
3 f' O7 f% n8 f+ EAll servers run Windows Server 2003. All client computers run Windows XP Professional.
/ ~- I( t2 a% O+ t) `! WEight Windows Server 2003 computers are members of the domain. These computers are used to store confidential files. They reside in a data center that only IT administration personnel have physical access to. 5 O, x( w' c8 ^; u+ b
You need to restrict members of a group named Contractors from connecting to the file server computers. Allother employees require access to these computers. 6 E5 }5 H* @6 K* C
What should you do
) i" W; b1 {# Y* A( DA. Apply a security template to the file server computers that assigns the Access this computer from the network right to the Domain Users group.* a& L2 l, p2 F( i* C/ ?+ a
B. Apply a security template to the file server computers that assigns the Deny access to this computer from the net work right to the Contractors group. 5 n! \: u1 F" L( a9 d
C. Apply a security template to the file server computers that assigns the Allow log on locally right to the Domain Users group. - i* [' t2 k% r- ^8 e" d9 _# [/ R  f
D. Apply a security template to the file server computers that assigns the Deny log on locally right to the Contractors group.
0 _9 L6 t& v7 `4 n3 mAnswer B
! P1 k3 O# `8 v4 ^* L; k: C6 S / a4 X" j6 A" G/ U
2. You are a security administrator for your company. The network consists of a single Active Directory domain.   s, A7 ~* S6 O
Four Windows Server 2003 computers run IIS and serve as Web servers on the Internet. # _! j3 v% _  K$ z- e9 [7 n; z
The company's written security policy states that computers that are accessible from the Internet must be hardened against attacks. The procedure for hardening computers includes disabling unnecessary services. You evaluate which services are necessary by using the following information about the Web servers Customers and business partners access Web content on the Web servers after they authenticate by using a user
- J8 e) U$ ]5 a: Z% o1 ~; s4 [name and password. To access certain parts of the site, some of these connections use the SSL protocol.
5 m0 Y4 v7 l) FAll software is installed locally on the Web servers by using removable media, except for service packs and security patches. + ?: j, y/ B- ~7 w; Y
The Web servers automatically download service packs and security patches from an internal computer that runs Software Update Services (SUS).
' R  Z; w! ^( V6 ?- NThe Web servers are not functioning as any other roles.6 ]. M/ B" a) l9 I4 W! N3 x+ r
You need to create a security template for the Web servers that disables unnecessary services and allows necessary services to operate.
, D6 |. Q' y7 T* i/ I4 k3 ^2 _% q* ~What should you do . r; w" u, z' K7 d
To answer, drag the appropriate service startup types to the correct locations in the work area.
1 m9 M* ]) d! u6 S- Y) X8 ] . G# v- N% T3 ~. v  y3 R
Answer
. a" |6 t5 E$ K7 D1 E
5 K! i& p8 L; U4 [% D) ?7 w6 a # \' M  E( a* ]0 g' s
3. You are a security administrator for your company. The network consists of a single Active Directory domain. ) c) @. e; G7 l0 ^* I3 T/ S: N
Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows 2000 Professional. The latest operating system service pack is installed on each computer. + K: N# F. Q; `) ]3 b
Thirty Windows Server 2003 computers are members of the domain and function as file servers. Client computers access files on these file servers over the network by using the Server Message Block (SMB) protocol. You are concerned about the possible occurrence of man-in-the-middle attacks during SMB communications.
5 m- m" @0 Q2 E, c) ^* _" l: B& f+ LYou need to ensure that SMB communications between the Windows Server 2003 file servers and the client computers are cryptographically signed. The file servers must not communicate with client computers if the client computers cannot sign SMB communications. Client computers must be able to use unsigned SMB
: O  r2 q" C% s7 V) P5 [communications with all other computers in the domain.4 b/ c- `6 D  l$ U' @3 z
What should you do to configure the file servers4 t9 k/ ~4 M5 k+ L+ N/ u+ w
A. Apply a security template that enables the Microsoft network server Digitally sign communications (always) setting. ; u% O) x4 |8 G; h- v
B. Apply a security template that enables the Microsoft network server Digitally sign communications (if client agrees) setting. 7 J" L* ~- \+ {8 r
C. Apply a security template that enables the Domain member Digitally sign secure channel data (when possible)setting.
8 [  z( b% a% Q, p1 n) pD. Apply a security template that enables the Domain member Digitally encrypt or sign secure channel data(always) setting.
* e/ `2 m5 I. R4 w( KAnswer A
5 N9 Y7 c1 i; {! j5 J7 k  E
, K$ C) G" y3 ^( b4. You are a security administrator for your company. The network consists of two Active Directory domains that are in separate Active Directory forests. No Active Directory trust relationships exist between the domains. All servers run Windows Server 2003. Client computers run either Windows XP Professional or Windows 2000Professional. All domain controllers run Windows Server 2003.- f& R8 d3 ~8 d- V; M. ^
You discover that users in one domain can obtain a list of account names for users in the other domain. This capability allows unauthorized users to guess passwords and to access confidential data." Y* u5 I# L# Y6 d7 a
You need to ensure that account names can be obtained only by users of the domain in which the accounts reside. 0 ?0 F0 A9 \$ s! W6 L% ]" K
Which two actions should you perform on the domain controllers (Each correct answer presents part of the solution. Choose two.)
4 q# L+ z; t* \1 B  h# N% CA. Apply a security template that disables the Network access Allow anonymous SIDName translation setting.  {1 \* @( ]* {1 F' I
B. Apply a security template that enables the Network access Do not allow anonymous enumeration of SAM accounts setting.
1 @/ R6 c5 C& A2 o7 |C. Apply a security template that enables the Network security Do not store LAN Manager hash value on next password change setting.) x" _: ]! b/ \. D
D. Apply a security template that sets the Domain controller LDAP server signing requirements setting to Require signing. ' W9 E( k( v7 f& P
Answer A AND B
+ D% z5 F5 {% o# b4 w/ d! Q
0 P; z+ \$ J, Q4 Q0 ?$ c7 a( S5. You are a security administrator for your company. The network consists of a single Active Directory domain.
* A3 L& [% S! `' RAll servers run Windows Server 2003. All client computers run Windows 2000 Professional. Twenty Windows Server 2003 computers serve as domain controllers. Your organization uses only Active Directory integrated DNS. ) q3 J( z* U; Z7 a5 ~& V
The company's written security policy states that computers that contain employee user account names and passwords must be hardened against attacks. The procedure for hardening computers includes disabling unnecessary services. You are evaluating which services are necessary by using the following information about the domain controllers
- h3 K: ~% Y' s% rDomain controllers do not function as Web servers, application servers, file servers, or print servers. + }9 ~0 _: k' H+ Y1 ~) |
Service packs and security patches are manually installed on domain controllers from local media. Service packs and security patches are installed only by IT administrators.
4 W& R6 O% i; h  v7 [All servers in the company are remotely managed by using a third-party program.
3 M% L7 V5 o& D0 gPrinting is not allowed from the domain controllers.
7 U3 g6 G$ Q' N% {Domain controllers do not run any IP routing protocols.
/ ^, i4 [- {/ G) z$ ]2 Z' HYou need to create a security template to be applied to all domain controllers that disables unnecessary services while allowing necessary services to operate.& N( F* H) s+ h. W. y# [. G9 W" \- M! y
What should you do
- C7 D5 V- e" D/ r( u: g. KTo answer, drag the appropriate service startup types to the correct locations in the work area. ) h* b6 O+ }7 d0 P
5 H+ ?  ^0 P* `% |9 ^& Q
Answer
' i/ K+ A( b+ Q7 m. @; d" k& @+ K% x
8 p1 O& t6 P  J! ~ & _8 a- `( r, P1 R' h1 E: }" b3 C
6. You are a security administrator for your company. The network consists of a single Active Directory domain.
2 G9 b! j* Q) {% f1 A8 L; p0 cAll servers run Windows Server 2003. All client computers run Windows XP Professional. You manage client computers by using Group Policy.
3 K3 f7 d! @  P* j/ b1 o# GSome of the administrators in your company are responsible for managing network connectivity and TCPIP.
6 o$ T8 r# t. B$ \  DThese administrators are known as infrastructure engineers and are members of a global group named Infra_Engineers. The infrastructure engineers must be able to configure and troubleshoot TCPIP settings on servers and client computers. 0 K! s( g" _2 I0 n
You need to configure a Restricted Groups policy that ensures that only infrastructure engineers are members of the Network Configuration Operators local group on all client computers. You want to achieve this goal without granting unnecessary permissions to the infrastructure engineers. . f) ]) c' q5 G: E6 H
What should you do 0 \9 [) p8 ?% U% O% ?% w$ V  a
To answer, drag the appropriate group or groups to the correct list or lists in the dialog box in the work area.
3 b! S3 o- Q4 A2 @+ K0 e) U* X, p+ D% v : k# {/ n$ O6 D
Answer ! f% @1 S. V+ X  ~, W7 j1 @6 G3 U5 I
" \! @7 H7 Y) }1 D
; ]- b. H2 w  L7 i/ m& @! K# ~
7. You are a security administrator for your company. The network consists of a single Active Directory domain. 3 P) V. I+ }" r4 v: y' N
All servers run Windows Server 2003. All client computers run Windows 2000 Professional.+ ^% e$ P. {+ \! Y3 P, Y( ]1 U
The company's written security policy states the following requirements
  L) ]" _3 p7 k" a4 CAll access to files must be audited.
$ U: q: A7 t: i4 J" y. I% v" H' w; @File servers must be able to record all security events.
% i" N) P6 m. I! uYou create a new Group Policy object (GPO) and filter it to apply to only file servers. You configure an audit policy to audit files and folders on file servers. You configure a system access control list (SACL) to audit the appropriate files. , ?2 D' F6 c3 m
You need to ensure that the GPO enforces the written security policy.
. s( b5 B# w+ k2 H4 B3 i% _6 \Which two additional actions should you perform to configure the GPO (Each correct answer presents part of the solution. Choose two.) / A6 w' j% k4 @& G9 `
A. Set a manual retention method for the security log.. \9 J9 R) C0 m3 k/ w/ ~
B. Set the security log to retain entries for 7 days. 6 K& W$ F$ {/ M, x
C. Set the maximum security log size to the maximum allowed size.
" @9 A" _  F9 {7 ^! qD. Configure the GPO to shut down the computer if it is unable to log security audits. $ L. E7 B1 D2 M# K" p
E. Ensure that users who are responsible for reviewing audit log data are granted the right to manage the securitylog.
4 C% k* e  a* e: ?6 eAnswer D AND A8 E. ?. H. B( y

! G$ o) B) O, u4 C, n6 b2 L8. You are a security administrator for your company. The network consists of a single Active Directory domain.
4 q( S7 H4 M+ R6 N. D/ x6 k. q! l/ ?. hAll servers run Windows Server 2003. All client computers run Windows XP Professional.3 C  h0 u  I3 k8 {& A& u- m3 H, Q
Administrators in your company use scripts to perform administrative tasks when they troubleshoot problems on client computers. They connect to the Telnet service on client computers when they run these scripts. For security reasons, all Telnet traffic is encrypted by using an IPSec policy. In addition, the Telnet service is configured for manual startup on all client computers. Administrators manually start and stop the Telnet service when they perform administrative tasks.
4 }; D" e- r2 z! `. O1 Z2 N2 OAdministrators report that they sometimes cannot start the Telnet service on client computers. You examine several client computers and discover that the Telnet service is disabled.4 ?( v4 u* J! H' {, k) k
You need to ensure that administrators can troubleshoot problems on client computers at all times.
* l: i: n9 X  x) B; FWhat should you do * f/ [: ?7 k: M. v
A. Use a Restricted Groups policy in a new Group Policy object (GPO) to add the Domain Admins group to the Power Users group on each client computer.
" M: y( `+ \8 q5 TB. Use a Restricted Groups policy in a new Group Policy object (GPO) to ensure that the Power Users group on each client computer contains no members. + F5 u) l3 Z1 J% i
C. Use a System Services policy in a new Group Policy object (GPO) to ensure that only Domain Admins can manage the Telnet service.
% C, [6 ^- ~/ N' W( Y7 CD. Use an Administrative Template setting to prevent local users from starting the Services snap-in.
% S4 F. ~0 `- E0 t  L/ H. j: pAnswer C . o. M+ Q1 U# u/ Q& S( i& t' ~
7 k6 r( R/ I  W* r% v6 ~
9. You are a security administrator for your company. The network consists of a single Active Directory domain. ' N% ^; W, e/ g. x
Servers on the network run Windows Server 2003. All servers are in an organizational unit (OU) named Servers,or in Ous contained within the Servers OU.
- t# W* d! S6 e/ WBased on information in recent security bulletins, you want to apply settings from a security template namedMessenger.inf to all servers on which the Messenger service is started. You do not want to apply these settings to servers on which the Messenger service is not started. You also do not want to move servers to other Ous. 5 t* x) Z4 N& k" ^
You need to apply the Messenger.inf security template to the appropriate servers.   g  x( F6 q7 @; m
What should you do 2 Q1 m1 t* u" g; |" h! D0 ~0 p
A. Import the Messenger.inf security template into a Group Policy object (GPO), and link the GPO to the Servers OU. Configure Administrative Templates filtering in the GPO. * R1 _/ }  L& N1 Y0 U! t
B. Import the Messenger.inf security template into a Group Policy object (GPO), and link the GPO to the Servers OU. Configure a Windows Management Instrumentation (WMI) Filter for the GPO. ; L% W9 O" W5 T3 U
D. Configure a logon script in a Group Policy object (GPO), and link the GPO to the Servers OU. Configure the script to run the gpupdate command if the Messenger service is started. 2 w. B; h9 z1 L- e) |
E. Edit the Messenger.inf security template to set the Messenger service startup mode to Automatic, and then run the secedit refreshpolicy command.
6 Y2 `3 \& ~7 T% y. v4 XAnswer B " J, Y0 G6 ~0 l6 y; u

. z6 \$ v1 S& r* {8 @10. You are a security administrator for your company. The network consists of a single Active Directory domain. 6 |5 s; Z) \; h2 i; j& R1 I
All domain controllers and servers run Windows Server 2003. All computers are members of the domain. 3 S# i. w+ y. d% ]( e
The domain contains 12 database servers. The database servers are in an organizational unit (OU) named DBServers. The domain controllers and the database servers are in the same Active Directory site.
* Z7 K" r6 t% \2 {* m) {You receive a security report that requires you to apply a security template named Lockdown.inf to all database servers as quickly as possible. You import Lockdown.inf into a Group Policy object (GPO) that is linked to the DBServers OU. , C- n1 w) R* r# q: V  D. v- u
You need to ensure that the settings in the Lockdown.inf security template are applied to all database servers as quickly as possible. 9 T* w1 n0 z9 k/ q% D% L0 o
What should you do 8 T2 \0 k  C2 S; P! j
A. On each database server, run the repadmin replicate command. ! x5 n0 `: X) o7 [3 D3 Z
B. On each database server, run the gpupdate command. & Z8 o5 h/ Y$ r+ v" o# `9 j
C. On each database server, run the secedit refreshpolicy command. 9 e+ d2 v0 i, m( X# V) i) h
D. On each database server, open Local Computer Policy, select Security Settings, and then use the Reload command.
, d2 ^* [3 O) X- `5 _E. On each database server, open Resultant Set of Policy, and then use the Refresh Query command. : H; B! @4 x: _1 J+ Z- @
Answer B3 H. L& @& L* J: u( V$ e
8 Z. S4 W: T, I9 n8 w2 P
点击下载70-299考试题库预览部分(PDF格式)
4 r9 m% w, ]" ?* E9 r2 L! d% F" s- s
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表