Site hosted by Angelfire.com: Build your free website today!

70-220 Brain Dump Revised — June 29th 2001 (Revision 4 – Final Revision)

 

I had Miller Textiles, Just Togs, Proseware, and Hanson. Scored 960

 

This dump zipped (Self-Extracting):

 

https://www.angelfire.com/dc/MS70220/Locksmith70_220_Self_Extracting.exe

I am sure not all answers are correct (check answers) but it is enough to pass!!

 

*****PROSEWARE***** (Case Study #1 – 11 Questions)

 

ProseWare – Temporary Staffing agency – 2500 employees nation-wide

Organization:
HQ – Chicago – 150 people, Dept =Accounting, Payroll, HR (WIN98) & IT (WinNT)
8 Regions –> consists of Branches –> 1 Region Manager/Region
Region manager submits info for the web site, but the branch manager must approve it
200 Branch offices –> 5 – 20 employees –> 1 Manager –> 1 IT “helper” resets machines etc
Customer needs –> 1– 5 employees work on large customer sites
Payroll centers –> Dallas and San Francisco –> payroll for all employees within the region

EXISTING ENVIRONMENT:

28 WinNT 4.0 Servers @ HQ – 1 CA (not used)
– 2 file server
– 25 terminal server
– 1 Outlook WEB access server (OWA1)
– DC1 & DC2
– 3 MS Exchange
– 4 UNIX servers - Oracle databases
– RAS1
Anonymous access for people to post there Resumes to a special folder (Recruiting) on OWA1 & to fill out an application form. Each office has access to this folder

Intranet site – tech support, HR, Company info. – Branch offices –>desktop terminals & one modem PC

PC’s –> WEB & Mail access, Desktop Terminals –>Mail access

WAN: 128 Kbps fractional T1 line between branch offices and HQ

Servers –> Static IP’s Client –> DHCP Each branch = Subnet & Router

Envisioned Network:
Upgrade to Win2K and use AD
OWA1 will remain as WinNT4

Add: RAS2
IIS Server

Security: one enterprise root CA for customers – Implemented
Certificate server for internal users – Required
Secure connections to HR folder – Required
2 way authentication for Laptops – Required

IT:
Centralised Admin, Help desk & Administration group

SALES:
Secure E-mail communication

Branch Offices:
Only the branch manager has access to the HR shared folder

Payroll:
Connect to the Unix machines

START OF QUESTIONS:

 

1. Which business requirement will have the most impact on the win 2000 security design?

 

A. improved network performance

B. continued use of the OWA 1 server in the Windows 2000 environment

C. projected number of branch offices D. resource access for on-site offices

 

Answer: B

 

2. Which two security solutions should you implement for headquarters? (Choose two)

 

A. EFS

B. digital certificate

C. encrypted data transmissions

D. PAP authentication

E. two-factor authentication

 

Answer: B, C

 

3. Design a windows 2000 authentication strategy for Proseware Corp.(use all computers and Auth. Methods)

Boxes are:

 

 

1) DC1

2) OWA1

3) ON-SITE offices

4) Local client computers

5) Anonymous Web Client

 

Auth Methods are:

A) Basic Auth with SSL

B) NTLM

C) Kerberos

DESIGN

Answer:L CL >KERB. >DC-1 >NTLM >OWA1 >SSL >On-Site >SSL >OWA1 >SSL >AWC 4 > C > 1 > B > 2 > A > 3 > A > 2 > A > 5

 

4. Which authentication method should ProseWare Corporation's employees at on-site offices use after the computers are upgraded to Windows 2000?

 

A. NTLM

B. basic authentication with SSL

C. MS-CHAP

D. Kerberos

 

Answer: B

 

5. How can you allow ProseWare Corporation's employees at on-site offices to communicate securely with headquarters?

 

A. Implement L2TP over IPSec

B. Use basic authentication with SSL

C. Implement DNS security and Group Policies

D. Use encrypted authentication with SSL

 

Answer: B

 

6. After all computers are upgraded to Windows 2000, which security component should you reconfigure?

 

A. IPSec

B. authentication protocols

C. Certificate Services

D. network access permissions

 

Answer: D

 

7. What is the primary security risk for ProseWare Corp?

 

A. Unauthorized network authentication.

B. Theft of HR data

C. Unauthorized changes to web content

D. Theft of payroll center data

 

Answer: B

 

8. How can you implement secure communications between the IT Department and the HR Department? (choose 2)

 

a. Use Kerberos authentication, 3DES encryption, and AH

b. Use Kerberos authentication, 3DES encryption, and ESP

c. Use certificate based authentication, 3DES encryption, and AH

d. Use certificate based authentication, 3DES encryption, and ESP

e. Use pre-shared key authentication, 3DES encryption, and AH

f. Use pre-shared key authentication, 3DES encryption, and ESP

g. Implement digital certificates to secure communication between PCs.

 

Answer: B, D

 

9. Which type or types of CA should you implement for internal use? (Choose all that apply)

 

a. Stand alone root CA

b. Enterprise Subordinate CA

c. 3rd Party CA

d. Stand alone subordinate CA

e. Enterprise root CA

 

Answer: B, E

 

10. The planned Active Directory structure for ProseWare Corp. Is shown in the exhibit. How should you implement security for the HR department?

 

a. Assign the Server (Request Security) IPSec policy at the HR Users OU, and assign the Client (Respond Only) IPSec policy at the domain level

b. Assign the Secure Server (Require Security) and the Client (Respond Only) IPSec policy at the Branch Users, HR Users, and IT Users OU’s

c. Assign the Secure Server (Require Security) IPSec policy at the HR Servers OU, and assign the Client (Respond Only) IPSec policy at the Domain level.

d. Assign the local policy and the Client (Respond Only) IPSec at the domain level.

 

Answer: C

 

11. Design a secure access solution for ProseWare CorpBoxes are:

 

 

1. DC1

2. OWA1

3. Branch Offices

4. On-site Offices

5. Terminal Services

 

Secure Methods are:

A. SSL

B. TCP/IP

C. Remote Desktop Protocol – RDP

 

Answer:

 

 

 

*****Just Togs***** (Case Study #2 – 10 Questions)

 

1. Which type of CA should you use to digitally sign the ActiveX control?

 

A. Enterprise subordinate CA

B. Third-party CA

C. Enterprise root CA

D. Stand-alone root CA

 

Answer: B

 

2. Which audit policy should you use on JTWEB?

 

A. Success and failure audit for process tracking

B. Success and failure audit for object access

C. Success and failure audit for logon events

D. Success and failure audit for directory service access

 

Answer: B??? Cheet-Sheet says C hmmm I chose B On my test passed with a 960

 

3. Which methods should you use to identify and authenticate existing customers on the Web site?

 

A. SSL, NTLM logon, and database validation

B. SSL, anonymous logon, and CHAP

C. SSL, NTLM logon and CHAP

D. SSL, anonymous logon and database validation

 

Answer: Everyone else says A, Cheet-Sheets says D and I agree I passed with a 960, I chose D

 

4. Which audit policy should you use to detect possible intrusions into the Just Togs network?

 

A. Success and failure audit for process tracking

B. Success and failure audit for privilege

C. Success and failure audit for policy change

D. Success and failure audit for logon events

 

Answer: D

 

5. How should you authenticate visitors to the Web site?

 

A. Authenticate visitors to an anonymous account

B. Authenticate visitors by requiring them to enter their user ID and password

C. Authenticate visitors by using cookies

D. Authenticate visitors that place an order as new or existing customers

 

Answer: A

 

RESEARCH #6 and #7 THEY APPEAR DIFFERNTLY ON TEST I FORGOT WHAT I CHOSE??? HMMmmm

 

6. Which technology should you use to securely connect the retail stores to headquarters?

 

A. MS-CHAP

B. IPSec

C. EAP-TLS

D. PPTP

E. L2TP

 

Answer: D

 

7. Which authentication protocol should you use to secure the VPN connection from the retail stores to headquarters?

 

A. EAP

B. PAP

C. SPAP

D. MS-CHAP

 

Answer: D

 

8. Which changes should the retail stores make to Support the VPN connection?

 

A. Configure the connection type to dial in to headquarters. Use L2TP over IPSec to communicate with the VPN server.

B. Configure the connection type to dial in to the ISP. Use L2TP over IPSec to communicate with the VPN server

C. Configure the connection type to dial in to the ISP. Use PPTP to communicate with the VPN server

D. Configure the connection type to dial in to headquarters. Use PPTP to communicate with the VPN server

 

Answer: C

 

9. Design a solution that allows the retail stores to connect security to headquarters over a VPN and customers to connect securely to headquarters by using the internet.

 

(Use all objects and connections.)

 

Objects:

 

1. Customer

2. Headquarters

3. JTVPN

4. JTWEB

5. Retail Store.

 

Connections:

A. SSL

B. TCP/IP

C. VPN Tunnel

 

(You must select two objects and choose which connection they are to be joined by)

 

answer: Retail > VPN > JTVPN > TCP/IP > HQ < JTWEB < SSL < CUST 5 > C > 3 > B > 2 < 4 < A < 1

 

10. Design a network that allows customers to order clothing items on the web site. (Use all objects and connections.)

 

 

 

Objects:

 

1. Customer

2. External Firewall

3. Internal Firewall

4. JTDATA

5. JTWEB

 

Connections:

 

A. Secure Internet Connection

B. TCP/IP Connection

 

answer:

 

Cust. >Sec. IC >EF >Sec. IC >JTWEB >TCP/IP >IF >TPC/IP >JTDATA 1 > A > 2 > A > 5 >B > 3 > B > 4

 

 

*****HANSON BROS.***** (Case Study #3 – 16 Questions)

 

Hanson Brothers – Medical supply company

Head Quarters – Chicago – 1000 Employees – 200 sales representatives
– sells to hospitals in 23 states
– 15 distribution centres in different states

Business Process:

A sales rep visits each hospital – Receives a supply order form
– Checks the supplies at the warehouse
– Fills out a paper order form, & faxes it to the nearest distrib centre

Distribution centre:

Receives fax – Clerk inputs data into mainframe
– Each rep only works for one distribution centre

Customer Service:

It doesn’t effect the question…

Existing IT Environment:

Computers: 1mainframe &250 PC’s @ HQ (CENTRALISED ADMIN)
10 PC’s @ each distribution centre

WAN: T1 line between each distribution centre and HQ

Envisioned IT Environment:

HQ: Replace the Mainframe with Win2K Servers (DC) and a VPN server

Sales-Reps: Laptops – able to load on there own applications
(Win 2K Pro) – Run an app called Salesforce – order supplies
– Contain Customer info – Encrypted & Recoverable (EFS)

IT management – be aware of unauthorised access to the network
Distrib Centres – DC –RRAS – have its own OU
(Win Pro) – IT admin per centre –add users & add/modify user groups (DECENTRALISED ADMIN)

A folder for Each Hospital – Hospital Folder – – Sales rep – Modify
Hospital Order status sub-folder – Order status – – Hospital – Read
Sales Information Sub folder – Sales Information – – Sales Rep – Full control

Hospitals will be connected using RRAS

Sales Reps should be able to a) Dial in orders
b) automatically check order status at any time
c) Dial in though RRAS OR ISP & VPN connection

 

START OF QUESTIONS:

 

1. What are the existing and envisioned IT administrative models for Hanson Brothers?

 

a. Existing centralized, Envisioned centralized

b. Existing centralized, Envisioned decentralized

c. Existing decentralized, Envisioned centralizedd. Existing decentralized, Envisioned decentralized

 

Answer: B

 

2. How should hospitals connect to headquarters to view the status of their orders? “The hospital must provide the phone line with which to connect.”

 

a. Use the VPN with Windows 2000 logon authentication

b. Use Routing and Remote Access with Windows 2000 logon authentication

c. Use the VPN with Remote Authentication Dial-In User Service (RADIUS) authentication.

d. Use Routing and Remote Access with Remote Authentication Dial-In User Service (RADIUS) authentication

 

Answer: B

 

3. To which type of group should you assign sales representatives?

 

a. Universal

b. Local

c. Global

d. Domain local

 

Answer: C

 

4. Tree Question Resources

 

 

 

 

1. Hospital - 1 folder

2. Hospital - 1 Orders subfolders

3. Hospital - 1 Sales Folders Permissions

 

A. All hospitals (read)

B. All Hospitals (Modify)

C. All Hospitals (Full Control)

D. Dallas hospital -1 hospital (Read)

E. Dallas hospital -1 hospital (Modify)

F. Dallas hospital -1 hospital (Full Control)

G. Dallas Hospital -1 sales Rep (Read)

H. Dallas Hospital -1 sales Rep (Modify)

I. Dallas Hospital -1 sales Rep (Full Control)

 

”Hospital can view only their own status information via RRAS”“…only sales representatives can add, delete, and change their hospital folders”“Only sales reps can place orders (verification required)…”

ANSWER:

1. Hospital -1 folder: I [sales reps: F. control ]

2. Hospital -1 Orders subfolders: G,D [s.rep: Read / D.Hosp: Read ]

3. Hospital - 1 Sales Folders: H [s. rep: Modify ]

I THINK THIS EXHIBIT IS WRONG, THE ANSWER IS ABOVE as far as I know (passed with 960 chose above)

 

5. How should you grant the necessary permissions to the IT administrator at each distribution center?

 

a. Create a new administrator account for each distribution center's organizational unit (OU).Grant the necessary permissions to this account.

b. Create an administrator group for each distribution center's organizational unit (OU). Add an existing user designated as an administrator to this account. Grant the necessary permissions to this group.

c. Create a new administrator account for each distribution center's organizational unit (OU) in the headquarters root. Grant the necessary permissions to each new administrator's account.

d. Create an administrator group for each organizational unit (OU) at the headquarters root.Add an existing user designated as an administrator from each OU to this group. Grant the necessary permissions to this group.

 

Answer: B

 

6. How should you encrypt orders from the sales representatives to the distribution centers?

a. Use 40-bit encryption for Routing and Remote Access. Use PPTP with packet filtering for VPN

b. Use 40-bit encryption for Routing and Remote Access. Use PPTP without packet filtering for VPN.

c. Use 128-bit encryption for Routing and Remote Access. Use PPTP with packet filtering for VPN

d. Use 128-bit encryption for Routing and Remote Access. Use PPTP without packet filtering for VPN

 

Answer: C

 

7. Which four actions should you take to meet the security requirements for the Windows 2000 upgrade? (Choose 4)

 

a. Ensure that only the sales representatives can create new orders.

b. Verify that only the Salesforce program can be loaded onto the portable computers.

c. Encrypt data transmitted to the distribution centers.

d. Verify that only unaltered versions of the SALESFORCE program are loaded onto the portable computers.

e. Restrict access to order status information to authorized Hanson Brothers employees and authorized hospitals.

f. Prevent distribution centers from using VPN to access information at other distribution centers.

g. Secure data on the portable computers.

 

Answer: C, D, E, G

 

8. This question presents you with objects and connectors. The question asks you to create relationships between the objects by using the connectors. You create these relationships by selecting two objects and then selecting a connector.

DESIGN Question:

Four Boxes on screen:

 

1. Portable computer

2. RADIUS Server

3. RADIUS Proxy Server

4. RADIUS CLIENT Computer and PPTP Server

 

Connections:

 

A. PPP

B. RADIUS Access Request

C. Proxied Access Request

D. RADIUS Access Reply

E. Proxied Access Reply

 

Design a RADIUS solution that will allow sales reps to securely tunnel to headquarters (Use all resources and all connections)

 

Answer: port--ppp--radclientandpptp--radaccessreq--radprox--proxaccreq--radserv--radaccreply--radprox--proxaccreply--radclientandpptp--ppp--portable1 > A > 4 > B > 3 > C > 2 > D > 3 > E > 4 > A > 1

 

9. How should you implement auditing on the Windows 2000 Server computers?

 

a. Enable success audit for logon events on the VPN server

b. Enable failure audit for logon events on the VPN server

c. Enable success audit for logon events on the domain controllers

d. Enable failure audit for logon events on the domain controllers

 

Answer: D

 

10. Which Group Policy strategy should you use to prevent changes to the wallpaper on all computers?

 

a. Create a Group Policy for each distribution center, and apply the Group Policy at the headquarters domain

b. Create a Group Policy for each distribution center, and apply the Group Policy at each distribution center's organizational unit (OU)

c. Create one Group Policy for all distribution centers, and apply the Group Policy at the headquarters domain.

d. Create one Group Policy for all distribution centers, and apply the Group Policy at each distribution center's organizational unit (OU)

 

Answer: C

 

11. How should you restrict hospital dial-up connections to only authorized hospitals?

 

a. Configure Routing and Remote Access on the remote access server to use callback. Configure callback to dial a phone number specified by the hospital computer during the connection request.

b. Configure Routing and Remote Access on the remote access server to use callback. Configure callback to dial a predefined phone number for each hospital.

c. Set up a proxy server (NAT) on the private side of the remote access server. Configure the proxy server to accept the IP addresses of the hospital computers.

d. Set up a proxy server (NAT) on the public side of the remote access server. Configure the proxy server to accept the IP addresses of the hospital computers.

 

Answer: B

 

12. Design Question

 

 

Design a secure connection between headquarters and the Dallas Dist Center (Use all resources and Connections)

 

8 boxes on chart:

 

1. Headquarters

2. Headquarters Internet Adpt

3. Headquarters Intranet Adpt

4. Headquarters win 2000 Router

5. Dallas Dist Center

6. Dallas Intranet Adpt

7. Dallas Internet Adpt

8. Dallas Windows 2000 Router

 

Connections:

 

A. Hardware connection

B. Intranet Connection

C. L2TP Internet Tunnel

Answer: hq--intraconnection--hqintradapt--hware--hgw2krouter--hware--hqinteradapt--L2TP--dallasinteradapt--hware--dallasw2krouter--hware--dallasintraadapt--intraconnection--dallasdistcentre1 > B > 3 > A > 4 > 2 > C > 7 > A > 8 > A > 6 > B > 5

 

13. Another Design Question:

Design a secure access solution to allow sales reps to access to network resources at headquarters (use all resources and all connections)

 

5 Boxes on Chart:

 

1. ISP

2. Portable Computer

3. Headquarters VPN Server

4. Hanson Brothers Internal Resources

5. Headquarters Remote Access Server

 

Connections:

 

A. ISP Connection

B. VPN Connection

C. PPP connection

D. Headquarters Internal Network

 

PC >PPP >ISP >ISP CON. >HQVPN >VPN CON. >HQRAS >HIN >HB IR

 

Answer: 2 > C > 1 > A > 3 > B > 5 > D > 4

 

 

14. How should you restrict hospitals' access to the order status information?

 

a. Set permissions on each hospital's order file to grant all hospitals Read permission to all order files

b. Set permissions on each hospital's order file to grant that hospital Read permission to its own order file information

c. Enable Encrypting File System (EFS) on the order status folder, and give a single copy of the recovery' key to all hospitals

d. Enable Encrypting File System (EFS) on the order status folder, and give a copy of the unique recovery key to each hospital

 

Answer: B

 

15. How should you configure secure communications between the Pittsburgh distribution center and headquarters?

 

a. Enable L2TP and configure an enterprise subordinate CA on the private Hanson Brothers network

b. Enable L2TP and configure an enterprise root CA on the private Hanson Brothers network

c. Enable L2TP and configure an enterprise root CA on the public network.

d. Enable L2TP and configure an enterprise subordinate CA on the public network

 

Answer: A

 

16. How should you implement IP filters at headquarters to secure the connection to the Pittsburgh distribution center?

 

a. Add source filters for the Pittsburgh distribution center for UDP port 500 and IP protocol 50. Add destination filters for headquarters for UDP port 500 and IP protocol 50

b. Add source filters for the Pittsburgh distribution center for UDP port 1701 and IP protocol 50. Add destination filters for headquarters for UDP port 1701 and IP protocol 50

c. Add source filters for headquarters for UDP port 500 and IP protocol 50. Add destination filters for the Pittsburgh distribution center for UDP port 500 and IP protocol 50.

d. Add source filters for headquarters for UDP port 1701 and IP protocol 50. Add destination filters for the Pittsburgh distribution center for UDP port 1701 and IP protocol 50.

 

Answer: B

 

 

*****Miller Textiles***** (Case Study #4 – 10 Questions)

 

Miller Textiles: 12,000 employees

Joint venture Fabrikam (300 employees, 1 manufacturing company in Miami) & Miller Textiles

Engineers from Fabrikam & Miller will work together

Organisation:

Each company have a Engineering, Manufacturing and Sales department

Existing Environment: (Miller)

Win 2k Manufacturing and Engineering Servers – Distributed Administration

LAN & WAN Manufacturing connect to HQ with a T1 line (max use 40%)
1 RRAS at each site
100 Mbps cards on the Intranet
Single Domain, an OU for each manufacturing site, with its own IT admin (DECENTRALISED ADMIN)


Existing Environment: (Fabrikam)
Win 2k single domain,
FABHQVPN – VPN server & an e-mail server
MILLERSPACE – shared folder on a Fabrikam server
– Engineers from Fabrkam
– Engineers from Miller have Read & Modify
–
– permissions

Envisioned Environment (Miller)
Sales rep – Customer folder on there laptop – EFS – Secure Sync when logged onto network
FabrikamSPACE – shared folder on the engineering server @ each location
Engineering & Manufacturing Servers will only have site specific info
Engineering & Manufacturing departments will have their own OU @ each location
IT admin @ each location will admin the OU with full control

LAN & WAN
T1 line between the HQ and all sites will remain
The RRAS on the manufacturing sites will be removed
Sales reps will be able to use the RAS servers located in the HQ – backup to VPN
VPN connections should be encrypted
Trust relationship between Boston and Fabrikam

Problem statement (Miller)
All data for joint venture must be available to all engineers & Secure
Resources @ both companies should be shared i.e. Printers
Auditing of the FabrikamSPACE – who modifies or views the info

 

START OF QUESTIONS:

 

1. What are the two primary security risks for Miller Textiles? (Choose 2)

 

A. Fabrikam, Inc., engineers modifying the manufacturing schedules for Miller Textiles

B. Unauthorized users viewing manufacturing schedules

C. Fabrikam, Inc, employees viewing confidential information from Miller Textiles

D. Unauthorized users gaining access to data for the space blankets

E. Unauthorized users gaining access to customer information on the portable computers

 

Answer: D,E

 

2. Which security group strategy should you use for the Miller Textiles sales representatives?

 

A. Assign all sales representatives to domain local groups within their own domain. Put the domain local groups into global groups.

B. Assign all sales representatives to global groups. Put the global groups into domain local groups

C. Assign all sales representatives to universal groups. Put the global groups into universal groups

D. Assign all sales representatives to computer local groups. Put the computer local groups into universal groups

 

Answer: B

 

3. How should you encrypt information over the VPN between the BOSTON organizational unit (OU) and the FABRIKAM domain?

 

A. Implement L2TP over IPSec at the BOSTON OU only

B. Implement L2TP over IPSec at both the BOSTON OU and the FABRIKAM domain

C. Implement PPTP at both the BOSTON OU and the FABRIKAM domain

D. Implement PPTP at the BOSTON OU only

 

Answer: B

 

4. How should you protect the Internet interface on the Miller Textiles VPN server from unauthorized users?

 

A. Use Routing and Remote Access filters on the Internet interface of the VPN server

B. Use Routing and Remote Access filters on the internal interface of the VPN server

C. Disable dynamic DNS updates on the internal interface of the VPN server

D. Disable dynamic DNS updates on the Internet interface of the VPN server

 

Answer: A

 

5. How should you authenticate users from Fabrikam, Inc who access Miller Textiles network over the VPN?

 

A. Use the fully qualified domain name (FQDN) and password

B. Use certificate-based authentication

C. Use EAPD. Use Internet Authentication Service (IAS)

 

Answer: A

 

6. How should you assign the authority for adding new user accounts at Miller Textiles after the upgrade?

 

A. Create one administrative group at the BOSTON organizational unit (OU) with the authority to create new users at each OU

B. Delegate authority to a domain administrator at each organizational unit (OU) to create new users for all OUs

C. Delegate authority to a domain administrator at the BOSTON organizational unit (OU) to create new users at each OU

D. Create a new administrative group at each organizational unit (OU) with the authority to create new users at that OU

 

Answer: D

 

7. Which two security components should you use on the portable computers? (Choose 2)

 

A. Internet Authentication Service (IAS)

B. PPTP

C. Remote access policy

D. L2TP over IPSec

E. Remote Authentication Dial-In User Service (RADIUS)

F. Encrypting File System (EFS)

 

Answer: D,F

 

8. For the Miller Textiles sales representatives how should you implement Encrypting File System (EFS) on the portable computers to allow central recovery?

 

A. Create enterprise root CAs at the BOSTON, ATLANTA, BAJA, and DUBLIN organizational units (OUs). Define the recovery agent at the OU level.

B. Use a third-party CA. Use the third party as the recovery agent.

C. Use a self-signed certificate. Define the local administrator as the recovery agent.

D. Create an enterprise root CA at the BOSTON organizational unit (OU), and create enterprise subordinate CA’s at the ATLANTA, BAJA, and DUBLIN OUs. Define the recovery agent at the domain level

 

Answer: D

 

9. Specify the required level of security for each resource. Move the appropriate permissions to the appropriate resource(s). Use only permissions that apply and you might need to reuse permissions.

 

Resources:

1. Boston Engineering data

2. Boston Manufacturing data

3. Atlanta engineering data

4. Atlanta manufacturing data

5. Baja engineering data

6. Baja manufacturing data

7. Dublin engineering data

8. Dublin manufacturing data

 

Permissions:

A. Baja engineer (Modify)

B. Boston engineer (Modify)

C. Boston Sale Representative (Read)

D. Fabrikam, Inc. engineer (Modify)

E. Fabrikam, Inc. engineer (Read)

 

answer: ABD > for: 1,3,5,7 C > for: 2,4,6,8

 

10. Design a secure communications strategy. (Use only locations and connections that apply.)

 

 

 

 

Objects to connect:

 

1. Boston (Miller Textiles)

2. Atlanta (Miller Textiles) A(B)

3. Dublin (Miller Textiles) A(B)

4. Baja (Miller Textiles) A(B)

5. Portable Computers (Miller Textiles) C(B)

6. Miami (Fabrikam, Inc.) B

 

Connections:

 

A. T1 Line

B. L2TP VPN

C. Routing and Remote Access

D. PPTP VPN

(You must select two objects to connect)

 

Answer:

BOSTON—(A) T1: 2,3,4 BOSTON— (B) L2TP VPN: 5,6 (and possibly, 5; PC’s may need C; RRAS??)

 

*****HIABUV TOYS***** (Case Study #5 – 8 Questions)


High above Toys:
20% growth/year www.highabovetoys.com Private IP = 172.16.0.0

HQ Minneapolis –> Sales, Marketing, HR, IT, Legal, Accounting and Executives – 4500 employees
350 Retail stores –> 50 –100 employees each
50 new stores/y –> including Casablanca, Morocco (64Kbps)
15 Service Cent –> 100 employees & 5 managers

128 Kbps link with a68 Kbps back up link from HQ to stores and service centre
T1 line between the HQ buildings

Computers:
HQ –>4,500 WinNT WS, 150 WinNT Servers – application & file servers __ WS = DHCP
Sales1 –> BDC + runs IIS ––> Sales Domain __Server = Static
Only DC’s and applications have shared resources
HR1 –> encrypted connections
Each Store –> 30 Win2k Pro and 2 WinNT Server (1 PDC &1BDC) __ Static IP
Each Service Centre –> 30 Win2k Pro and 1 WinNT Server (1BDC) __ Static IP

Envisioned network:
Upgraded to Win2K
Sales1 will not be upgraded but replaced with a Win2k sever when all upgrades complete – native mode
Legal1 – Secure Private Network between Legal1 & HR1
One account domain for HQ & one for retail stores
Security:
Secure tunnelling for authorised users to access shared resources @ HQ
Confidential documents should be sent secure internally
Wants to implement a PKI

IT:
Administer user & computers, No Strong passwords
WAN: oversees the WAN
LAN: manages user acc’s, oversees the LAN, Win2Kserv & domains and the retail store servers
Internet: oversee Internet security and connectivity

Sales & Marketing: Laptops & Colour printer
Secure Authentication of external manufactures
Access the retail stores for Sales history Info
LEGAL:
Copy confidential documents to shared folders for 1) HR 2) Executive dept 3) Company Law firm

Retail Stores:
1) Cash Registers –>WinNT generic log on for cashier access, No info stored on the register
2) Managers –> Win 2K Laptops, with e-mail and web access
3) 5 secured WinNT PC’s for employees to browse pre-approved site
4) 3 Kiosk –> customers can register for gifts or place orders –> automatically boot

Service Centres:
Unique log on names
Centre technician has access to e-mail & Internet

 

START OF QUESTIONS:

 

 

1. Which security requirement will affect design of windows 2000 forest?

 

A. Implementation of Kerberos authentication

B. Secure transactions at Store Registers

C. Organization of user accounts

D. Secure communication between legal and HR.

 

Answer: C

 

2. Which server or servers provide the least security for user access?

 

A. Retail store servers

B. Service centers servers

C. SALES1

D. HR1

E. LEGAL1

 

Answer: C

 

3. How should you secure the new servers at the Casablanca store?

 

A. Install the serves into a new OU and implement Group Policies at the Site Level

B. Install the serves into a new OU and implement Group Policies at the OU Level

C. Install the servers into their own Active Directory tree and implement Group Policies at the Domain Level

D. Install the servers into the same Active Directory tree as stores and modify the schema

 

Answer: B

 

4. Which strategy should you use to accommodate the new Casablanca store?

 

A. Add the Help Desk employee to the Domain Admins group

B. Add the Help Desk employee to the Enterprise Admins group

C. Delegate authority to the Help Desk employee to manage the PC

D. Delegate authority to the Help Desk employee to modify accounts and groups

 

Answer: D

 

5. Which security method should you implement to provide data security between LEGAL1 and HR1?

 

A. Group Policies for shared folders

B. IPSec with ESP (encrypts data)

C. IPSec with AH (encrypts header information but not data)

D. EFS

 

Answer: B

 

6. Which security solution should you implement to allow the service centers to communicate with manufactures?

 

A. DFS with Crypto API

B. IPSecC. Secure DNS

D. Secure Email

answer: D

 

7. How should you design windows 2000 domain and OU structure for HIABUVTOYS?

 

A. 2 accounts domains, Migrate all resource domains into OUs under the HQ Domain

B. 2 accounts domains, Migrate all resource domains into OUs under the store Domain

C. 2 accounts domains, Migrate existing stores domain into OUs under store domain

D. 2 accounts domains, Migrate existing stores domain into OUs under HQ domain

 

answer: C

 

8. Specify the required level of security for each resource. (Some may be used more than once)

 

Conditions:

 

A. Additional restrictions for anonymous connections.

B. Disable the Ctrl-Alt-Del for logon.

C. Do not display last user name in logon screen.

D. Message text for users attempting to logon.

E. Rename administrator account

 

Objects:

 

1. Domain Controller - ADE

2. Application Server - ADE

3. Cash register - BCDE

4. Public Kiosk - BCDE

 

answer: DomCont: ADE / Appserv: ADE / Cashreg: BCDE / Pubkiosk.: BCDE

 

 

*****Fabrikam***** (Case Study #6 – 13 Questions)

 

Fabrikam, Inc – manufacturer of food and Beverages – 20,000 world wide – 10,000 US

HQ – San Fe – 3 groups Corporate, Engineering & Operations

Corporate: Most @ HQ – HR, Legal, executive, accounting and Sales & Marketing departments
Has its own IT employees

Engineering: Design and build the operations facilities, including the network
After being built and tested –> handed over to the Operations department
Has its own IT employees, who manage its network

Operations: Maintaining and operating facilities
Most employees work at the facilities sites
Has its own IT employees, who manage its network

Problem Statement:
Upgrade to Win2K, use AD, Delegate OU authority
Enterprise admins = Members of each group who are members of “Enterprise architecture committee”


Existing environment:
NT4 multi-master domain model = Each of the 3 primary groups have its own master domain
Domains = CORP, ENGR, OPER
Resource Domain = ENGRFLD = temporary resources located at worksites

 

START OF QUESTIONS:

 

 

1. What is Fabrikam, Inc.'s business model?

 

a. Centralized management and decentralized operations

b. Centralized management and centralized operations

c. Decentralized management and decentralized operations

d. Decentralized management and centralized operations

 

Answer: A

 

2. What is the Engineering group's tolerance for risk?

 

a. The Engineering group is willing to try new approaches only after careful testing

b. The Engineering group is very conservative and does not take any risks

c. The Engineering group is willing to try some new approaches

d. The Engineering group is comfortable with a high level of risk

 

Answer: C

 

3. What is Fabrikam, Inc.'s IT model for management and operations?

 

a. Centralized management and decentralized operations

b. Decentralized management and centralized operations

c. Centralized management and centralized operations

d. Decentralized management and decentralized operations

 

Answer: D

 

4. Which two security risks facing the Operations group can you reduce or eliminate by using smart cards? (Choose two)

 

a. Remote hackers connected via modem

b. Remote hackers connected via the Internet

c. Denial of service attack launched from the Internet

d. Employees connected via the LAN

e. Unauthorized visitors physically entering a facility and connecting via the LAN

 

Answer: B,E

 

5. Which Windows 2000 domain structure should you use for Fabrikam, Inc.? (There are four answer choices Choose one)

 

a. Create a single domain for the entire company Replace existing resource domains with organizational units (OUs)

b. Create three domains one domain for Corporate, one domain for Engineering, and one domain for Operations. Create each domain in its own forest. Replace existing resource domains with organizational units (OUs)

c. Create three domains trees. One domain tree for Corporate, one domain tree for Engineering, and one domain tree for Operations. Create the trees in the same forest. Replace existing resource domains with organizational units (OUs)

d. Create three domain trees one domain tree for Corporate, one domain tree for Engineering, and one domain tree for Operations Create these trees in the same forest. Replace existing resource domains with new domains

 

Answer: C

 

6. Which four technologies should you include in the security strategy for the engineering group? (Choose four)

 

a. Basic authentication with SSL

b. Kerberos authentication

c. EAP

d. Internet Authentication Service (IAS)

e. L2TP over IPSec

f. Directory Service (DS) mapping

g. Certificate Services

 

Answer: B,C,E,G

 

7. Which technology or technologies should you include in your security strategy for the Operations group? (Choose all that apply)

 

a. Basic authentication with SSL

b. Encrypting File System (EFS)

c. Internet Authentication Service (IAS)

d. L2TP over IPSec

e. Kerberos authentication

 

Answer: BDE

 

8. What should you include in an audit policy for the CORP domain? (Choose one)

 

a. Failure audit for account logon eventsFailure audit for directory service access Success and failure audit for policy change Success and failure audit for account management

b. Failure audit for object accessFailure audit for account logon eventsFailure audit for directory service access Success and failure audit for policy change

c. Success and failure audit for object access Success and failure audit for policy change Success and failure audit for account logon events Success and failure audit for account management

d. Success and failure audit for object access Success and failure audit for policy change Success and failure audit for account logon events Success and failure audit for directory service access

 

Answer: D

 

9. Which administrative task or tasks should you complete to maintain the network at the operations facilities? (Choose all that apply)

 

a. Group Policy administration

b. Digital certificate administration

c. User account administration

d. Remote access administration

e. Web content administration

 

Answer: A,C

 

10. Which two technologies should engineers use for secure dial-up access when traveling?

(Choose two)

 

a. SSL

b. Kerberos authentication

c. Smart cards

d. Encrypting File System (EFS)

e. PPTP

 

Answer: BC

 

11. Which technology should you use for engineers working at existing operations facilities?

 

a. Kerberos authentication

b. Digital certificates

c. Basic authentication with SSL

d. Routing and Remote Access

e. Internet Authentication Service (IAS)

 

Answer: A

 

12. Which three policies should you include in a security strategy for the CORP domain? (Choose three)

 

a. Enable account lockout

b. Disable password aging

c. Prevent the installation of unsigned drivers

d. Disable account lockout

e. Enforce strong passwords and password aging

f. Allow CD-ROM access to all usersg. Limit CD-ROM access to users who are logged on locally

 

Answer: A,C,E

 

13. How should you prevent unauthorized users from accessing the Engineering group's file servers?

 

a. Enforce strong passwords, implement password aging, disable unneeded services, audit file access in folders containing confidential files, and set NTFS permissions

b. Block access to TCP and UDP ports 135-139 at the server, enforce strong passwords, implement password aging, and use Encrypting File System (EFS) to control access to folders containing confidential files

c. Block access to TCP and UDP ports 135-139 at the server, and audit failed logon attempts

d. Enforce strong passwords, block access to TCP and UDP ports 135-139 at the perimeter router, and disable unneeded services

 

Answer: B

 

*****LITWARE PHOTO***** (Case Study #7 – 13 Questions)

 

 

Litware, Inc sells digital cameras, printers etc supplies NA HQ –>Cleveland

Existing Environment:
Merged wit a French company: 8 offices –>1,200 employees
Offices connected through a WAN
IT:
5 employees at each site
HQ –> 4 network engineers, 1 web master, 3 web developers, 10 programmers/analysts
10 programmers/analysts –> maintain inventory, purchasing, billing and payroll applications
Customer Service:
Each office has 1: studios report problems to them, order supplies (Record each call)
Try and fix problems with the web site (The Photo folder) or report it to the webmaster

Envisioned Environment:
1) Web site: Studios can post proofs of their customers photo’s – hosted at HQ – Win2K IIS
2) Customers could access their pictures using a User name & password received from the studio

When customers visit the web site VB programs will be downloaded to their PC’s to view the Pics
Programs stored on a folder (Programs) on the Web server
The new Webmaster will have full control over the Web Servers
Each studio will have its own folder on the server consisting of a) Purchase history b) Customer folder for each customer which will be password protected
Office manager will create and administer the customer folders
Secure connection to the Web server for Credit card details
Hold 5000 active customer accounts and how many orders are placed on the web site

2 Web servers –> LITWWEB & LITWDATA (Customer info)
Proxy –> LITWPROX
DC –> LITWDC
Only the Webmaster should be able to put new app’s on LITWWEB
Each Studio will be an OU
Photo’s displayed on WEB for only 30 days

Customer Service:
Access to customer Information

Sales Representatives:
Access to customers order history

Enable Customers to securely view and order pictures
Enable studios to upload the Photo’s via the WEB to ONLY their customer folders
Customer Info should be available for Reports, support and Marketing
The server should be stable

 

START OF QUESTIONS:

 

1. What is the primary security requirement for the studios?

 

a. Ensure that photos on the Web site cannot be altered

b. Ensure that customers can access only their own photos on the Web site

c. Ensure that customers' credit card numbers are secure.

d. Prevent customers' computers from being infected with a virus when they view their photos on the Web site

 

Answer: C

 

2. Network configurations are shown in the exhibit (Click the Exhibit button). Which network configuration provides the most security for LitWare, Inc?

 

a. FigureA

b. FigureB (keine Antwort!)

c. FigureC

d. FigureD

 

answer: ???

 

3. To which type of group should you assign all Web developers?

 

a. Global

b. Local

c. Domain local

d. Universal

 

Answer: A

 

4. How should you ensure that each customer's account is disabled after 30 days?

 

a. Manually disable each customer's user account after 30 days

b. Add a Group Policy to the LitWare organizational unit (OU) that specifies the expiration rules for each customer's user account

c. Add a Group Policy to each studio's organizational unit (OU) that specifies the expiration rules for each customer's user account

d. Set an expiration date on each customer's user account

 

Answer: D

 

5. Which task should you delegate to the office managers?

 

a. Modify the membership of a group

b. Manage Group Policy links

c. Create, delete, and manage customer accounts.

d. Create, delete, and manage groups.

 

Answer: C

 

6. Which type of CA should you use to digitally sign the Microsoft Visual Basic programs?

 

a. Third-party CA

b. Enterprise root CA

c. Stand-alone root CA

d. Enterprise subordinate CA

 

Answer: A

 

7. Which two authentication methods should you use to allow customers access to their photos on the Web site? (Choose two)

 

a. Basic authentication with SSL

b. Anonymous access

c. Integrated Windows authentication

d. Digest authentication with SSL

e. Digest authentication without SSL

f. Basic authentication without SSL

 

Answer: A,D

 

8. This question asks you to create a tree structure. The tree structure includes three levels of nodes, each marked with distinct colors and shapes.

 

LITWWEBB Resources Permissions:

 

A. Studio (read)

B. Studio (modify)

C. Studio (Full control)

D. Customer (Read)

E. Customer (Modify)

F. Customer (Full Control)

G. Webmaster (Read)

H. Webmaster (Modify)

I. Webmaster (Full Control)

This Graphic is from a newer dump (doesn’t look right to me, but maybe it might help someone???)

 

 

 

1. LitWare Root –    Webmaster (Full Control)

2. Program folder –  Webmaster (Full Control)

3. Studio Folder –   Studio    (Full Control)

4. Customer folder – Studio    (Full Control)

5. Photo folder –    Customer  (Read)

 

Answer: I1--I2--C3—C4--D5

 

Specify the required level of security for each Web Site resource. The folder Hierarchy for the web site is shown in the exhibit. (Don΄t have it). Move the appropriate permission to the appropriate resource or resources. (Use only permissions that apply. You might need to reuse permissions.)

 

9. How should you allow studios to create their own customer accounts?

 

a. Delegate authority to the office manager in each studio's organizational unit (OU)

b. Delegate authority to the administrator in the LitWare organizational unit (OU)

c. Add a new organizational unit (OU) under each studio, add an Administrator account in the new OU, and assign administrator rights to the new Administrator account by using Group Policy

d. Add a new organizational unit (OU) for each studio under the LitWare OU, add an Administrator account in the new OU, and assign administrator rights to the new Administrator account by using Group Policy

 

Answer: A

 

10. Which authentication method or methods can you use to allow studios to securely post pictures to LlTWWEB? (Choose all that apply)

 

a. Digest authentication without SSL

b. Anonymous access

c. Integrated Windows authentication

d. Basic authentication without SSL

e. Digest authentication with SSL

f. Basic authentication with SSL

 

Answer: E,F

 

11. How should you allow programming changes to the Web site?

 

a. Grant the Webmaster Full Control permission

b. Grant the Webmaster Read and Write permission only

c. Grant the Web developers Full Control permission.

d. Grant the Web developers Read and Write permission only

 

Answer: A

 

12. Which audit policy should you use on LlTWWEB to detect unauthorized access to the credit card files?

 

a. Failure audit for logon events

b. Success audit for logon events

c. Success and failure audit for process tracking

d. Success and failure audit for object access

 

Answer: D

 

13. How should you secure the customer photos on LlTWWEB?

 

a. Grant customers Read permission to their own photo folder

b. Digitally sign each customer's photo folder, and give the private key to the customer

c. Apply Encrypting File System (EFS) to each customer's photo folder, and give the private key to the customer

d. Grant customers Read permission to each photo in their own photo folder

 

Answer: A

 

*****Enchantment Lakes***** (Case Study #8 – 10 Questions)

 

 

Enhancement Lakes Corporation (EL) Software consulting firm

HQ – Minneapolis (Sales, Marketing, IT, HR, Executive and Acc Depts) 300 people – 250 Consultants
Branch – 1 office manager &10 – 12 consultants

Network:
HQ – >17 Win2K advance Server & 250 Win 2K Pro (230 dial in Laptops)
Marketing, HR & IT have the desktop PC’s
Dial in server (inside the firewall) RAS1 only for employees
VPN1
IIS server runs a program called TIMEENTRY TIME1 (consultants enter there time sheets here)
Outlook Web Access OWA1 Secure connection only
Sales –> 2 Win2K Server (SQL)

Connectivity:
HQ – Internet = T1 line

Branch office:
10 – 15 portable Win2K Pro &1 Win 2K desktop
T1 connection to the internet
Frame relay to HQ

Copenhagen: Sets up & administrates there own network
No connection to HQ
MS Exchange Server
DC
RAS2
Will implement PKI to issue certs to its employees
Will use secure tunneling.

Security:
HQ – Password polices are established network resources are secure
**Implement a PKI to encrypt data transmission

HR:
Uses a network file server

Sales:
Save info to there laptops and \\sales\documents

 

 

START OF QUESTIONS:

 

1. What are the four most important security priorities for EL? (Choose four)

 

A. Providing secure communications between Copenhagen and headquarters.

B. Ensure secure authentication.

C. Implementing two-factor authentication for the IT department.

D. Preventing denial-of-service attacks.

E. Implementing certificate services for Omaha.

F. Protecting employee data on portable computers.

G. Preventing unauthorized network access.

 

Answer: A,B,F,G

 

2. What are the two primary security risks for EL? (Choose two)

 

A. Incorrect authentication of network users.

B. Data stolen from portable computers.

C. Unauthorized network access by employees.

D. Unauthorized network access by intruders.

E. A denial-of-service attack on OWA1.

 

Answer: B,C

 

3. Which data from Copenhagen should you encrypt?

 

A. All data.

B. Slip data

C. Net/bios data

D. L2TP data

 

Answer: D

 

4. How should you encrypt the sales department's files?

 

A. Encrypt all folders that contain sales documents.

B. Encrypt only shared folders that contain sales documents.

C. Encrypt only personal sales documents individually.

D. Encrypt only shared sales documents individually.

 

Answer: C

 

5. How should you implement certificate services for the Omaha office?

 

A. Use a third-party certificate services vendor.

B. Use the certificate services from the Minneapolis office.

C. Install certificate services on the Omaha office.

D. Share certificate services with the Des Moines office.

 

Answer: B

 

6. Which two technologies should you implement to provide additional security for portable computers? (choose 2)

 

A. Distributed file system (DFS)

B. Encrypted file system (EFS)

C. Digital certificates.

D. IPSec

E. Kerberos authentication

 

Answer: B,C

 

7. How should you configure OWA1 and TIME1 to allow secure access for remote employees? (Choose all that apply)

 

A. Place TIME1 in a DMZ.

B. Place OWA1 in a DMZ.

C. Place TIME1 on the internal network.

D. Place OWA1 on the internal network.

E. Enable all connections from the external network.

F. Allow only TCP port 80 connections from the external network.

G. Allow only TCP port 443 connections from the external network.

 

Answer: A,B,G

 

8. Which type of CA should you implement at headquarters? (Choose one)

 

A. An online enterprise root CA with an online enterprise subordinate CA.

B. An offline enterprise root CA with an online enterprise subordinate CA.

C. An offline enterprise root CA with an offline enterprise subordinate CA.

D. An online enterprise root CA with an offline enterprise subordinate CA.

 

Answer: B

 

9. Which permissions should you grant for the TIPS folder? (Choose one)

 

A. IT department Full ControlSales department Full ControlAuthenticated users Modify

B. IT department Full ControlSales department Full ControlEveryone Read

C. IT department Full ControlSales department ReadAuthenticated users Read

D. IT department Full ControlSales department Full ControlEveryone Modify

 

Answer: A

 

10. Which type of CA should you implement for the Copenhagen office after it is connected to the WAN? (1)

 

A. Enterprise Subordinate CA.

B. Enterprise root CA.

C. Stand-alone subordinate CA.

D. Stand-alone root CA.

 

Answer: A

 

*****Contoso***** (Case Study #9 – 10 Questions)

 

CL) Contoso LTD. Subsidiary of AD, selling life insurance
Creating a web site –> allow insurance brokers to configure a insurance policy
–>Receive a quotation for the policy
–>Purchase the policy
–>If the policy is ordered a third party will handle it
–>General area, area for brokers and policy holders
–>Brokers must register before they are allowed to use it
–>Policyholders can make changes online with accordance to rules (every 3 months)
–>Policyholders can not buy or terminate without aid of a broker
–>AD can gain access to the site, must create reports for AD
–>Only 6 server
–>Primary focus = Secure & audit who is using it
–>3 categories of users 1)Brokers 2)Policyholders 3)CL & AD employees
–>PKI to be used
–>5000 brokers, 2 people to manage membership
–>Offline Certification and membership (Either by phone or in person)
–>Certificate delivered securely to broker on a CD or floppy

Envisioned Certificate:
Single domain
CONTWEB1 Web Server (IIS)
CONTDATA Database Server (SQL 7.0)
CONTDC DC, Certificate server, DNS, WINS, DHCP
CONTVPN Multi-homed VPN server, Create a VPN through the Internet to AD
CONTWEB2 Intranet server, DC, File & Print server
CONTFIRE Firewall server

5 Laptops who need to dial in
Netscape and IE4.0 (or latter)
2 Class C addresses have been bought (One for the Intranet, one for the Public network)

 

START OF QUESTIONS:

 

 

1. What is CL's tolerance for risk? (Choose one)

 

A. CL is willing to try some new approaches.
B. CL is comfortable with a high level of risk.
C. CL is willing to risk the entire company for large rewards.
D. CL is willing to try only those approaches that they have successfully implemented before.
E. CL is very conservative and does not take any chances.

Answer: A

2. What is the primary security risk for the desktop computers at CL? (Choose one)


A. Another CL employee connected to a desktop computer via the LAN.
B. Denial-of-service attack launched from the internet targeting a desktop computer.
C. Remote hackers directly connected to a desktop computer via the internet.
D. Remote hackers directly connected to a desktop computer via modem.

Answer: A
                     
Once Again who knows where these graphics came from? But they might be helpful…

3. Design an authentication strategy for the web site after certificates have been issued to the brokers. Use only computers and authentication methods that apply.

 

 

Computer Authentication method
A. Kerberos
B. Basic authentication with SSL
C. SSL and directory services (DS) mapping
D. HTTP and directory services (DS) mapping

1. Broker
2. CONTDC
3.
CONTDATA
4.
CONTWEB1
5.
CONTVPN
6.
CL



 

 

4. How should you design the active directory structure for CL? (Choose one)

A. Create a single domain in its own forest. Do not establish trust relationships.
B. Create a single domain in its own forest. Establish a one-way trust relationship with Adatum
C. Create one child domain. Place the child domain in the same forest as AD's domain tree.
D. Create one domain in its own domain tree. Place the domain tree within the same forest as AD's domain tree.

Answer: B

5. Which three options should you include in a security template for CONTWEB1? (Choose three)


A. Rename the administrator account.
B. Allow CD-ROM access to all users.
C. Limit CD-ROM access to users who are logged on locally.
D. Enforce strong passwords.
E. Set the NTLM authentication level to LM and NTLM.
F. Disable account lockout.

Answer: ADE

6. Which technology or technologies should you implement to provide the highest level of security for communications between employees of AD and CL? (Choose one)


A. Internet authentication services (IAS) and NTLM authentication.
B. PPTPC. SSL, digital certificates, and directory services (DS) mapping.
D. Basic authentication with SSL.
E. L2TP over IPSec

Answer: E

7. How should you separate intranet resources from publicly visible internet servers? (Choose one)


A. Use a private IP address space. Configure both the internal DNS and the authoritive internet based DNS server to resolve both internal and external names.
B. Use corp.contoso.com as a suffix for all internal sites. Configure both the internal DNS and the authoritive internet based DNS server to resolve both internal and external names.
C. Use corp.contoso.com as a suffix for all internal sites. Configure the internal DNS to resolve internal names, but do not include these names in the authoritive internet based DNS server.
D. Use a private IP address space. Configure the authoritive internet based DNS server to resolve internal names, but do not include these names on the internal DNS server.

Answer: C

8. Which technology or technologies should you include in your security strategy to secure broker access to the web site? (Choose one)


A. Basic authentication with SSL.
B. SSL, digital certificates, and directory services (DS) mapping.
C. Internet authentication services (IAS) and an ODBC database.
D. L2TP over IPSec

Answer: B

9. How should you implement a Public Key Infrastructure (PKI) for CL? (Choose one)


A. Install an online enterprise root CA. Install an online enterprise subordinate CA. Import a self signed server certificate on the subordinate CA. Issue client certificates on the subordinate CA.
B. Install an offline stand alone root CA. Install an online stand alone subordinate CA. Issue client certificates on the root CA.
C. Install an online stand alone root CA. Import a server certificate from a third party CA to the root CA certificate trust list. Use client certificates from third party CA.

D. Install an offline enterprise root CA. Install an online enterprise subordinate CA. Issue client certificates on the subordinate CA.

Answer: D

10. What should you include in an audit policy for CONTDC? (Choose all that apply)


A. Success and failure audit for object access.
B. Success and failure audit for directory services access.
C. Success and failure audit for policy change.
D. Success and failure audit for account management.
E. Success and failure audit for account logon events.

Answer: BE