PrepAway - Latest Free Exam Questions & Answers

Category: EX0-107

Exam EX0-107: SCNP Strategic Infrastructure Security

which of the following?

Logging is critical when you want to determine whether or not your server is being attacked. You
must enable logging on your Web servers. To help prevent malicious users from deleting files to
cover their tracks, you should make sure the ACLs on the IIS-generated log files
(%systemroot%\system32\LogFiles) are set to Administrators (Full Control) and System (Full
Control). The ACL for the Everyone group should not be greater than which of the following?

what will the permissions be for this file?

You have recently hired an assistant to help you with managing the security of your network. You
are currently running an all Windows environment, and are describing NTFS permission issues.
You are using some demonstration files to help with your discussion. You have two NTFS
partitions, C:\ and D:\ There is a test file, C:\DIR1\test.txt that is currently set so that only
Administrators have Full Control. If you move this file to the C:\DIR2 folder, what will the
permissions be for this file?

What is the function of The Security Configuration and Analysis snap-in?

You have just become the senior security professional in your office. After you have taken a
complete inventory of the network and resources, you begin to work on planning for a successful
security implementation in the network. You are aware of the many tools provided for securing
Windows 2003 machines in your network. What is the function of The Security Configuration and
Analysis snap-in?

which of the following computers must implement IPSec method 3?

In Windows 2003, there are four methods of implementing IPSec. They are:
1 – Require Security
2 – Request Security
3 – Respond Only
4 – No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations
in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic
security.
-You have servers numbered 10-19, which have a policy stating they are not required to be
secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure
and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are
required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers
must implement IPSec method 3?

What is the SAM?

You are the main person responsible for the security of a mid-sized company. To have control
over all the aspects of the security of the network, you study and analyze each component
thoroughly. Your network is running all Windows 2003 servers, and you are studying the logon
process. You know there are many components of the process, and are now at the point where
you are analyzing the Security Accounts Manager (SAM). What is the SAM?


Page 19 of 23« First...10...1718192021...Last »