What should you do?
You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
Your company uses the lnternet to sell products. Customers place and view the status of orders by using a Web application named App1. App1 is hosted on a Windows Server 2003 computer that runs IIS. Users access App1 by using various Web browsers. You configure SSL for connections to App1.
The company’s written security policy states the following requirements:
All users must enter a user name and password when they access App1.
All users must use the same authentication method.
All users must use credentials in the company’s domain.
You need to configure IIS to support the required authentication.
exhibit What should you do?
To answer, configure the appropriate option or options in the dialog box in the work area.
Hotspot question. Click on the correct location or locations in the exhibit.
Which three types of groups should you choose?
You are a security administrator for your company. The network consists of two Active Directory domains named adatum.com and proseware.com. These domains are in the same Active Directory forest. The adatum.com Active Directory domain operates at a Windows 2000 mixed mode domain functional level. The proseware.com Active Directory domain operates at a Windows 2000 native mode domain functional level.
An application runs on four Windows Server 2003 computers. These computers are domain member servers in the adatum.com Active Directory domain. Authorized users in both the adatum.com and the proseware.com domains require access to this application. The network is depicted in the exhibit. (Click the Exhibit button.)
You need to plan an authorization model to control user access to the application. You will place adatum.com user accounts in a group named Adatum AppUsers. You will place proseware.com user accounts in a group named Proseware AppUsers. You will use a group named AppResources to assign permissions that allow access to the application.
You need to choose the appropriate types of groups to implement your plan. Which three types of groups should you choose?(Each correct answer presents part of the solution. Choose three.)
What should you do?
You are a security administrator for your company. The network consists of two Active Directory forests.
The first forest is named tailspintoys.com and contains domain controllers that run either Windows Server 2003 or Windows 2000 Server. The second forest is named wingtiptoys.com and contains domain controllers that run Windows Server 2003. No trust relationships are established.
A certification authority (CA) running Windows Server 2003 Certificate Services is deployed and all computers are issued a Computer certificate. A Windows Server 2003 computer named Server1 is a member of the wingtiptoys.com Active Directory domain. Server1 provides users in both domains access to a payroll application. You decide to implement IPSec to encrypt the payroll application data during transmission. You configure a custom IPSec policy named Payroll App on Server1 using the rules shown in the exhibit. (Click the Exhibit button.)
You configure an IPSec default Client policy on the client computers in both Active Directory domains. During testing, you notice that client computers in the wingtiptoys.com Active Directory domain use IPSec when communicating with Server1. However, client computers in the tailspintoys.com Active Directory domain cannot communicate with Server1.
You need to enable all client computers to use IPSec when communicating with Server1. What should you do?
What should you do?
You are the security administrator of your network. The network consists of an Active Directory domain. All computers on the network are in the domain. The domain controllers and file servers on the network run Windows Server 2003. The client computers run Windows XP Professional.
The file servers use a custom IPSec policy named Server Traffic. The Server Traffic policy contains rules to encrypt Telnet and SNMP traffic, as shown in the exhibit. (Click the Exhibit button.) All client computers use the Client (Respond Only) IPSec policy. The default exemptions to IPSec filtering are disabled on the client computer. You want to configure the network so that Telnet, SNMP, and Kerberos traffic is encrypted by IPSec.
You do not want to encrypt other network protocols. What should you do? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You are a security administrator for your company. All servers run Windows Server 2003. All client computers run Windows XP Professional. The network is configured as shown in the Network Diagram exhibit. (Click the Exhibit button.)
Users in the sales department use portable computers that are not connected to the company network. Each week sales users travel to the company’s main office and connect to the IEEE 802.11b wireless LAN (WLAN). The WLAN is configured as shown in the Wireless Configuration exhibit. (Click the Exhibit button.) The WLAN hardware does not support IEEE 802.1x. Once a Week, sales users connect to the WLAN to retrieve confidential sales documents from file servers on the network.
You discover that unauthorized users intercepted data in sales documents while the documents were transmitted over the WLAN. You need to protect sales documents from being intercepted by unauthorized users. What should you do?
What should you do?
You are a security administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 computers.
Twelve of the Windows Server 2003 computers are configured as Web servers.
You need to produce a report that identifies which Microsoft security patches are not installed on the Web servers. What should you do?
What should you do?
You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
The company’s written security policy states that security patches must be manually installed on servers by administrators. You need to configure the network to comply with the written security policy.
You need to maintain security patches by using the minimum amount of administrative effort. What should you do?
What should you do?
You are a security administrator for your company. The network contains a Windows Server 2003 computer that runs IIS.
You use this server to host an lnternet Web site for customer product purchasing. You plan to use SSL on this server. You do not want customers to receive a certificate-related security alert when they use SSL to connect to your Web site.
You need to select an appropriate certification authority (CA) to serve as the issuer for your Web server SSL certificate. What should you do?
What should you do?
You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.
A server named Server1 is not a member of the domain. All other computers are members of the domain. The network contains an enterprise certification authority (CA). All computers on the network trust the CA. The company’s written security policy states that all network traffic from the computers in the domain to Server1 must be encrypted. Server1 must not be added to the domain. You configure a Group Policy object (GPO) that assigns the predefined IPSec policy named Client (Respond Only). You link the GPO to the domain. You configure Server1 to use the predefined IPSec policy named Secure Server (Require Security). When you test this configuration, you cannot connect to Server1 from the computers in the domain.
You need to implement the written security policy. What should you do?
What should you do?
You are a security administrator for Contoso, Ltd. The network consists of two Active Directory forests named contoso.com and public.contoso.com. All servers run Windows Server 2003. All client computers run Windows XP Professional.
The network consists of an IEEE 802.11b wireless LAN (WLAN). Employees and external users use the WLAN. User accounts for employees are located in the contoso.com forest. User accounts for external users are located in the public.contoso.com forest. External users, computers do not have computer accounts in the public.contoso.com forest. To increase security, you upgrade the network hardware to support IEEE 802.1x. You configure a public key infrastructure (PKI). You issue Client Authentication certificates to employees, to client computers used by employees, and to external users.
You need to configure the WLAN to authenticate employees and external users. What should you do?