Pre-Assessment Answers-1

Similar documents
0Activity Answers. Table A1-1: Operating system elements and security mechanisms. The Security Accounts Manager (SAM)

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.

Strategic Infrastructure Security

Protection. CSE473 - Spring Professor Jaeger. CSE473 Operating Systems - Spring Professor Jaeger

Datasäkerhet/Data security EDA625 Lect5

Operating system security models

Exercises with solutions, Set 2

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20.

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem

19.1. Security must consider external environment of the system, and protect it from:

Introduction to Systems Security

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Operating system security

UNIX/Linux Auditing. Baccam Consulting, LLC Training Events

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)

Chapter 8: Security under Linux

SERVER HARDENING CHECKLIST

An Overview to Windows Server Security

Project #3: Implementing NIS

HP OpenVMS CIFS File Security and Management

Privilege Separation

O/S & Access Control. Aggelos Kiayias - Justin Neumann

Processes are subjects.

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9

User accounts and authorization

Unix, History

Introduction to Computer Security

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Unified CCE Security Compliance for Windows Server 2012 R2

FINAL Examination Paper (COVER PAGE)

IT Service Delivery And Support Week Four - OS. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao

Security. Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018

You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

Securing Linux Systems Before Deployment

Processes are subjects.

CISNTWK-11. Microsoft Network Server. Chapter 4

n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems

Ekran System v Program Overview

We ve seen: Protection: ACLs, Capabilities, and More. Access control. Principle of Least Privilege. ? Resource. What makes it hard?

Exam : Title. : Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

CS 392/681 - Computer Security. Module 6 Access Control: Concepts and Mechanisms

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

CIT 470: Advanced Network and System Administration. Topics. Namespaces. Accounts and Namespaces. 1. Namespaces 2. Policies

How to Connect the MediCap USB200 or USB170 to a Network

Unix Basics. UNIX Introduction. Lecture 14

User & Group Administration

FluidFS in a Multi-protocol (SMB/NFS) Environment

Hardware. Ahmet Burak Can Hacettepe University. Operating system. Applications programs. Users

Race Condition Vulnerability Lab

Secure Architecture Principles

Activity 1: Using Windows XP Professional Security Checklist

CompTIA SY CompTIA Security+

CS 392/681 - Computer Security. Module 5 Access Control: Concepts and Mechanisms

Operating System Security

Password policy settings control the complexity and lifetime for passwords. This section discusses each specific password policy setting

Users, Groups and Permission in Linux

IS 2150 / TEL 2810 Information Security and Privacy

Secure Architecture Principles

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Subtitle: Join Sun Solaris Systems to Active Directory with Likewise

Files (review) and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1

User Accounts. The Passwd, Group, and Shadow Files

UNIT 10 Ubuntu Security

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

Provide general guidelines and procedures for Unix Account Management

SDC EMEA 2019 Tel Aviv

System Administration

Authentication System

Security Essentials. Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems.

CS 290 Host-based Security and Malware. Christopher Kruegel

McAfee Policy Auditor Content Update Summary. New Checks

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)

CSE 565 Computer Security Fall 2018

IBM Spectrum Scale Audit Logging With Varonis DatAdvantage

Processes and authentication

Group Policy Reference

Lab Authentication, Authorization, and Accounting

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Can Delete Sharing Folder Windows 7 Access Denied

Mozy. Administrator Guide

Introduction to Computer Security

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

FreeBSD Advanced Security Features

Protection and Security

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

Operating Systems. Copyleft 2005, Binnur Kurt

CIS 5373 Systems Security

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]

7 Windows Linux.

Linux User Management Administration Guide

SECURITY & PRIVACY DOCUMENTATION

Secure Architecture Principles

Unit OS7: Security The Security Problem. Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze

Exam4Free. Free valid exam questions and answers for certification exam prep

NetIQ Secure Configuration Manager Installation Guide. October 2016

Passwords CSC 193 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Spring 2014

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Transcription:

Pre-Assessment Answers-1 0Pre-Assessment Answers Lesson 1 Pre-Assessment Questions 1. What is the name of a statistically unique number assigned to all users on a Windows 2000 system? a. A User Access Token (AT). b. A Security Account Descriptor (SAD). c. An Access Control List (ACL). d. A Security Identifier (SID). 2. What is the function of the /etc/pam.d/ directory? a. It determines what console applications are allowed to be run by nonroot users. b. It holds the configuration files that determine how the system authenticates. c. It contains the Linux registry. d. It contains the password and shadow files. 3. What six broad elements, as defined by ISO, are available to help security professionals achieve an appropriate security implementation? Audit, administration, encryption, access control, user authentication and the corporate security policy.

Pre-Assessment Answers-2 Lesson 2 Pre-Assessment Questions 1. What Windows 2000 feature can you use to rename default accounts? a. The Computer Management snap-in. b. The Connection Manager Administration Kit. c. The passfile.dll file. d. The Local Security Policies snap-in. 2. What is password aging? a. The practice of requiring users to change their passwords after a specified interval. b. The length of time a system login manager will hold a password after a user logs on and changes his or her password. c. The practice of requiring an account to lockout after a certain number of invalid login attempts. 3. What fields do you have to change in order to configure a non-root account to become a root account? The user id (UID) and group id (GID) fields.

Pre-Assessment Answers-3 Lesson 3 Pre-Assessment Questions 1. Which rights are used when share and NTFS permissions are combined? a. The more granular set. b. The less restrictive set. c. The more restrictive set. d. The share permissions. 2. What UNIX command is used to set subsequent file creation mode bits? a. umask. b. chown. c. chmod. d. chattr. 3. Where is a Linux user s identification number (UID) located? In the /etc/passwd file.

Pre-Assessment Answers-4 Lesson 4 Pre-Assessment Questions 1. What kind of program can invisibly record every keystroke on a computer, store the keystrokes in a file, and send the file to a pre-defined e-mail address? a. A keylogger program. b. A system scanning program. c. The UNIX rlogin command. d. A Trojan horse. 2. A system has been configured so that the /etc/shadow file is worldreadable. What type of threat has this configuration created? a. Active threat b. Passive threat. c. Accidental threat. d. Bug-based threat. 3. In Windows 2000, what three sets of defaults should be changed to enhance security in an Internet-based system? The default directories, default account names and the default shares.

Pre-Assessment Answers-5 Lesson 5 Pre-Assessment Questions 1. Your Windows 2000 server is at its default Server Message Block (SMB) encryption setting. What will your Windows 2000 server do when another system connects to it and makes an SMB request? a. It will respond with an NTLMv2 encryption request. b. It will allow only NTLM encryption. c. It will allow only LM encryption. d. It will negotiate the appropriate encryption level. 2. You want to notify users on your Linux and Windows 2000 systems that the system is for authorized users only. What should you do? a. Place text inside the /etc/banners file. b. Modify the binaries for each daemon you want to secure. c. Create a banner for each service. 3. After setting your Windows 2000 system to use only NTLMv2 encryption, you find that your Linux Samba servers can no longer connect to it. Why? Because Samba uses LM-level encryption.