Windows 2000 Network Security


1. Some information in Munchkin Land will need strong encryption. In addition, the company has asked that you specify the most secure type of technology to use in connecting Munchkin Land to headquarters. Which two of the following technologies will your design call for?

[view the scenario]

A. Your design will call for using strong encryption with SLIP related data.
B. Your design will call for using strong encryption with NetBIOS related data.
C. Your design will call for using strong encryption with all data.
D. Your design will call for using L2TP.
E. Your design will call for using PPTP.
F. Your design will call for using strong encryption with Sales and Marketing related data.
G. Your design will call for using strong encryption with Accounting related data.
H. Your design will call for using strong encryption with IPSec in ESP mode.
I. Your design will call for using strong encryption with IPSec in AH mode.
J. Your design will call for using strong encryption with IPSec in Tunnel mode.

>> !
Answer: D & H

The data that will need to be strongly encrypted in Munchkin Land will be that which flows on the WAN from that remote office to headquarters. Because it leaves the communications infrastructure that is owned and controlled by the company, the data is more at risk during transport. The network will be using Windows 2000. Therefore, L2TP can be used as the VPN technology. When used in conjunction with IPSec, L2TP is the most secure tunneling technology available in Windows 2000. ESP is the IPSec mode that encrypts data but does not provide a VPN tunnel for it. Because L2TP is the most desirable technology to use in creating the VPN tunnel, IPSec in tunnel mode is not an acceptable answer.Windows 2000 Help, Search for the articles entitled: Virtual private networks; Remote access VPN design considerations; Remote access VPN security; Remote access for employees; Internet-based VPNs; Remote access VPN connection; Data encryption; Point-to-Point Tunneling Protocol; Layer Two Tunneling Protocol; Network security; How IPSec works; and Understanding Internet Protocol Security.


2. The company has asked you to consult with the Active Directory design group to ensure that the companies' network designs are as secure as possible. Which of the following will you list as the criteria that will have the most impact on the design of the forest?

[view the scenario]

A. The fact that the two companies will be acting as independent entities.
B. The requirements placed on the design by the default Windows 2000 authentication method, Kerberos.
C. The need for high level managers to interact between the two companies.
D. The need for secure web access to occur for both the brokers and policy holders.

>> !
Answer: A

We know from the background information that the new subsidiary will act as a separate company from Corleon. Separate companies should have their own Forests. In addition, because of the type of business involved, security needs are paramount in the forest design. The strongest security boundary possible is two separate forests.Windows 2000 Help, Search for the articles entitled: Namespace planning for DNS; Explicit domain trusts; Understanding domain trusts; Planning your domain structure; Understanding domain trees and forests; and Planning organizational unit structure.


3. Gunter is using the IP Security Policies MMC snap-in to configure negotiation settings to establish secure communications. To initiate the first phase of the negotiation process (used to establish a secure communication channel between computers), what four mandatory parameters must Gunter specify? (Choose all that apply)

A. AH tunnel mode
B. Authentication method
C. Hash algorithm
D. IP address
E. Diffie-Hellman group
F. ESP tunnel mode
G. Encryption algorithm

>> !
Answer: B, C, E & G

The following four mandatory parameters are negotiated as part of the first phase of the negotiation process: -- The encryption algorithm (DES, 3DES) -- The hash algorithm (MD5 or SHA) -- The authentication method (Certificate, pre-shared key, Kerberos v5 authentication) -- The Diffie-Hellman (DH) group to be used for the base keying material Before secure data in an IPSec environment can be exchanged, a security association (SA) must be established between the source and target computers. The mechanism for enabling this process is provided through Internet Key Exchange (IKE). To ensure successful, secure communication, IKE performs a two-phase operation. Confidentiality and authentication during each phase is ensured by the use of encryption and authentication algorithms agreed on by the two computers during security negotiations. During the first phase, a secure, authenticated communication channel is created between the two computers. In the second phase, SAs are negotiated on behalf of IPSec. During this phase, there are three elements that must be negotiated before actual secure data may be transmitted: -- The IPSec protocol (AH or ESP) -- The hash algorithm (MD5 or SHA) -- The encryption algorithm (if requested) (DES, 3DES) As you can see, there is a degree of overlap between the requirements of the first and second phase of negotiations.
The following incorrect responses are not associated with the IPSec negotiation process: The IP address is not a negotiated feature, but comes into play when you are configuring IP filters to control the application of your policies. The tunneling modes would apply to phase two of the negotiations. An Encapsulating Security Payload (ESP) tunnel encrypts the encapsulated data. An Authorization Header (AH) tunnel provides authentication and integrity, just like ESP, but not the encryption. You must specify the tunnel endpoint while using the Security Rule Wizard for an IP tunnel to be activated. Both computers must be configured for tunneling if there is to be an IP tunnel. Automatic Security Negotiation Internet Key Exchange (IKE) services dynamically negotiate a mutual set of security requirements between communicating computers, eliminating the need for both computers to have identical policies.


4. You know from your discussions with the company that they are very concerned that brokers need secure authentication and data encryption when accessing the website. Which three of the following will your design specify to accomplish this?

[view the scenario]

A. Your design will specify basic authentication.
B. Your design will specify SSL encryption.
C. Your design will specify L2TP.
D. Your design will specify IPSec.
E. Your design will specify the Internet Authentication Service (IAS).
F. Your design will specify digital certificates.
G. Your design will specify Directory Service mapping.
H. Your design will specify PPTP.
I. Your design will specify MPPE.

>> !
Answer: B, F & G

SSL is a standard technology that is used to encrypt information as it is transferred between a web browser and a website. It is the logical choice to use in this situation because it requires no education on the part of the user. All of the other solutions mentioned such as PPTP and L2TP would require specific operating systems and user configuration. We also know from the scenario that the company wants to use a PKI infrastructure and wishes to give each broker a certificate. These certificates will be used to authenticate brokers when they visit the website. Because the company uses Active Directory, each certificate must correspond to a user account. This is called a Directory Service mapping. Once mapped, the account and any groups it is a member of can be used to control what the broker can and cannot see on the site. It can also be used to audit their access to the site and its information.Windows 2000 Help, Search for the article entitled: Secure Socket Layer/Transport Layer Security (SSL/TLS) authentication.IIS 5.0 Documentation, Search for the articles entitled: Mapping Client Certificates to User Accounts; and About Certificates.


5. Mbutu is supervising the Windows 2000 upgrade of his existing Windows NT 4.0 network. Before the upgrade, Mbutu had a Headquarters domain located in Atlanta and two resource domains in Chattanooga and Savannah. After the upgrade, Mbutu retained the Headquarters domain and merged the resource domains into OUs under Headquarters. No users accounts will be in the resource OUs. How should Mbutu define his security group strategy to allow authorized users access to resources in Chattanooga and Savannah?

A. Create global groups in the resource OUs and grant them appropriate permissions to the resources located within. Create the necessary local groups at Headquarters containing the logical groupings of users. Place the local groups into the appropriate global groups.
B. Create local groups in the resource OUs and grant them appropriate permissions to the resources located within. Create universal groups at Headquarters containing predefined global groups. Add the appropriate universal groups to the local groups.
C. Create local groups in the resource OUs and grant them appropriate permissions to the resources located within. Create global groups at Headquarters containing logical groupings of users. Place the appropriate global groups into the appropriate local groups.
D. Modify the Access Control Lists of the resources in the OUs granting the appropriate permissions to the Users, the Power Users, and the Administrators groups. Create a transitive, two-way trust between the OUs and Headquarters.

>> !
Answer: C

Windows 2000 supports four types of built-in security groups, differentiated by scope. Those groups are: -- Domain Local Groups. These groups are typically used to assign permissions to specific resources, such as printers and file systems. -- Global Groups. These groups are used to logically organize users by function or resource access needs. The preferred method to grant user access is assign global groups to the appropriate local groups that define the access. In Windows 2000, you can nest global groups to make administration simpler. -- Universal Groups. These groups are used in larger, multi-domain environments where you have users in different domains requiring similar levels of access to resources. The normal technique is to place global groups into universal groups, then add the universal group to the local group. Note: A single domain model does not support universal groups. -- Computer Local Group. This group exists for access control that is specific to one computer that is not recognized elsewhere in the domain.
In Mbutu's situation, the correct approach would be to create Domain local groups, and add the global groups. Although you can add a global group to a domain local group, you cannot add a domain local group to a global group. Trusts are created between domains, not within a single domain. Also, granting access permissions to only the Users, Power Users and Administrators groups would not give you granular enough control over domain resources.


6. Cornelius needs to configure secure communications between the Quality Assurance manager and the Quality Assurance server, QA1. Although these computers are located on the same subnet, it is imperative that communications be secured and encrypted against network attacks. How should Cornelius proceed?

A. VPN with PPTP
B. VPN with L2TP
C. IPSec with ESP
D. IPSec with AH

>> !
Answer: C

n this case, the endpoint computers are in the same network. The appropriate strategy would be to employ IPSec policies. IPSec allows you to secure communications within the same network. To provide encryption services, use Encapsulating Security Payload (ESP). This will provide the transmitted data with authentication, integrity, and confidentiality. The Authentication Header (AH) protocol provides authentication and integrity, but not encryption, so it would not be sufficient for our scenario. A virtual private network (VPN) is the extension of a private network that incorporates links across shared or public networks like the Internet. Virtual Private Networking (VPN) is designed to connect remote clients to a private network or connect together two private networks. Since our computers are on the same network, a VPN is not indicated.


7. Heather is configuring laptop computers for use by the sales force. The company sells proprietary products and services to a niche audience in a very competitive market. Heather's sales representatives need access to up-to-date company databases while on sales calls, and they need to be able to communicate securely with the home office. The company is extremely sensitive to the potential risk of having laptop computers stolen, yielding proprietary company information to thieves. Also, Heather is concerned that any data transmitted be absolutely secure from network hacker attacks. How can Heather allay management concerns about risk of loss and exposure while maximizing productivity and security for her deployed sales force?

A. Configure a VPN server at the home office. Create a VPN tunnel using encryption features. Configure EFS on all laptop computers.
B. Configure a VPN server at the home office. Create a VPN tunnel using encryption features. Configure DFS on all laptop computers and servers.
C. Configure RRAS on a remote access server at the home office. Configure RRAS callback to use a predefined number. Use Kerberos v5 authentication. Configure EFS, providing a unique recovery key to each laptop user.
D. Configure RRAS on a remote access server at the home office. Configure RRAS callback to use a specified number. Use Kerberos v5 authentication. Configure DFS; do not specify a recovery agent.

>> !
Answer: A

To address the issue of secure data transmission, Heather should use virtual private networking (VPN) features. By encrypting the payload, she ensures that, even if a malicious network user intercepts the transmission, the data integrity and confidentiality is assured. Creating a VPN tunnel indicates that data encryption features are enabled. For the laptop theft issue, Heather should use Encrypting File System (EFS) features on the laptop computers. This is a technology that encrypts data on Windows 2000 NTFS-configured computers. Now, even if a laptop does get stolen, the data on that laptop will remain confidential. For safety, EFS will not function if a recovery agent is not designated. This protects the administrator from the disgruntled sales representative who decides to encrypt files before exiting the building. Distributed File System (DFS) is a technology that takes parts of multiple file systems, and integrates them into a single hierarchical structure. This is primarily an ease of use issue, and does not provide encryption services as dictated by our scenario. Configuring Routing and Remote Access Service (RRAS) with callback security allows the administrator to regulate access to the dial-in server. This is a good thing to do, but does not address the issues of securing the communication channel the way a VPN does.


8. Corleon is concerned that the VPN server may facilitate unauthorized access to its network. What will your design call for to minimize the possibility of unauthorized access involving the VPN server?

[view the scenario]

A. Your design will call for blocking dynamic DNS updates from passing through the Internet interface of the VPN server.
B. Your design will call for the use of Routing and Remote Access filters on the public interface of the VPN server.
C. Your design will call for the use of Routing and Remote Access filters on the private interface of the VPN server.
D. Your design will call for the use of demand dial filters on the public interface of the VPN server.
E. Your design will call for the use of demand dial filters on the private interface of the VPN server.
F. Your design will call for the use of Routing and Remote Access port filtering on the private interface of the VPN server.

>> !
Answer: B

TCP/IP filters can be set in Routing and Remote Access (RRAS). There are two types of filters Input and Output. Input filters are applied to incoming traffic and output filters are applied to traffic that is leaving the router. Filters can be applied to block all traffic except for what is specified in the filter, or allow all traffic except what is specified in the filter.In this case, the filters should be applied to incoming traffic on the public interface of the VPN server. This is because any malicious traffic will be coming from the public network, into the VPN server. By filtering this incoming traffic carefully a stronger level of network security can be achieved.Windows 2000 Help, Search for the articles entitled: Packet filtering; To add a packet filter; Virtual private networks; Remote access VPN design considerations; Remote access VPN security; Remote access for employees; Internet-based VPNs; Remote access VPN connection; Data encryption; Point-to-Point Tunneling Protocol; Layer Two Tunneling Protocol; Network security; How IPSec works; and Understanding Internet Protocol Security.


9. Juliette is configuring laptop computers for a small army of traveling sales representatives. She must configure these computers to comply with the baseline specifications for laptop security, as directed by the network security administrator. The following guidelines have been established:
  • All laptop computers will run Windows 2000 Professional.
  • Sensitive data on disk will be secured.
  • All communications to the company RRAS server will be secure and encrypted.
  • Installed Web browsers must be configured to access company sites securely.
Which security components meet Juliette's requirements for her laptop security design?

A. EFS, PPTP, SSL
B. NTFS, PPP, HTTPS
C. EFS, SSL, MPPE
D. NTFS, PPTP, SSL

>> !
Answer: A

You can use Encrypting File System (EFS) to encrypt NTFS files to provide confidentiality for the file contents. EFS uses symmetric key encryption in conjunction with public key technology to protect the file and ensure that only the owner of the file can access the file. A virtual private network (VPN) enables you to send data between two computers across a shared or public internetwork in a way that emulates a point-to-point private link. To ensure confidentiality of the data, it is encrypted by the sender and decrypted by the receiver. Point-to-Point Tunneling Protocol (PPTP) takes the existing Point-to-Point Protocol (PPP) frames, encapsulates them into an IP datagram, and provides encryption services. The Secure Sockets Layer (SSL) protocol provides communications privacy, authentication, and message integrity by using a combination of public-key and symmetric encryption. By using this protocol, clients and servers can communicate in a way that prevents eavesdropping, tampering, or message forgery.
In the case of an SSL connection between a Web browser and Web server, you must enter HTTPS rather than HTTP as the protocol type in the URL. This will instruct the Web browser to use a different port for the communication; the Web server will be listening on this port for SSL requests. By default, Web data (HTTP) uses Transmission Control Protocol (TCP) port 80, while SSL (HTTPS) uses TCP port 443. In this scenario, Juliette needs to configure EFS, PPTP, and SSL. Microsoft Point-to-Point Encryption (MPPE) is the encryption method used by PPTP. By itself, MPPE does not satisfy the requirement for secure communications. The Point-to-Point Protocol (PPP) is an industry standard method of utilizing point-to-point links to transport multi-protocol datagrams. PPP is normally used over dial-up modem connections. It does not provide the encryption capabilities required by our scenario. NT File System (NTFS) is required for EFS to work, but does not provide the required data encryption services by itself. HTTPS is the protocol you use with an SSL-enabled connection. You do not configure the browser specifically to support HTTPS, you configure the browser to enable SSL, which allows you to use the HTTPS protocol for secure Web site access.


10. Jorge is the network administrator for StuffYouNeed, Inc. His company manufactures lots of stuff you need. The company's products are sold through a network of job lot wholesalers and warehouse-style club stores. At last count, StuffYouNeed merchandise is being sold in over 8000 retail outlets worldwide. The individual retail locations periodically need to check inventory status with their wholesaler. Each wholesaler has an inventory software program provided to them by StuffYouNeed for this purpose. When they need to check order status, the program dials up a server at StuffYouNeed, authenticates, and downloads the information. Each wholesaler location has been allocated a generic ID and password with which to contact StuffYouNeed. Jorge wants to maintain centralized management of remote access due to the large numbers of external remote users involved. What scheme should Jorge employ to handle the communication needs of the wholesalers?

A. RRAS with Windows 2000 authentication
B. VPN with RADIUS authentication
C. VPN with Windows 2000 authentication
D. RRAS with RADIUS authentication

>> !
Answer: D

There are two dial-up scenarios Jorge might consider in this case: RRAS and VPN. Routing Remote Access Service (RRAS) provides the ability to handle incoming calls from clients without the overhead of a Virtual Private Networking (VPN) connection. Security and encryption were not specified in our requirements, so a VPN is not indicated. There are two ways for our dial-in clients to authenticate: Windows 2000 authentication and RADIUS authentication. Since we have provided network server access to users outside our network, RADIUS is the better choice. The RADIUS server has access to user account information and can check remote access authentication credentials. If the user’s credentials are authentic and the connection attempt is authorized, the RADIUS server authorizes the user’s access based on specified conditions and logs the remote access connections as accounting events. Remote access policies provide a more powerful and flexible way to manage remote access permission.
An example is support for callback functionality. By establishing a remote access policy that expects a client to be at a certain phone number, you can guard against that type of unauthorized access attempt. In small network situations with no requirements for centralized management of remote access, the Routing and Remote Access service can be configured to use Windows authentication. However, in situations like ours, greater control and flexibility are achieved through centralized authentication using RADIUS.


11. Margot is the network administrator for her company's network. Margot has configured the laptop computers for the sales department to allow access to the intranet through a VPN connection. These users dial up a local ISP prior to establishing a VPN connection. Margot's DHCP server assigns intranet addresses within the 172.16.0.0 range. Routing Information Protocol (RIP) version 1 is not being used. Margot's remote users report that they are unable to access the Internet while their VPN connection is established. What two tasks must Margot complete to solve this problem? (Choose all that apply)

A. Add dynamic routes for the private network IDs of the intranet using the Route Listening Service.
B. Add static persistent routes for the public network IDs of the intranet using the IP address of the VPN server’s virtual interface as the gateway IP address.
C. Add static persistent routes for the private network IDs of the intranet using the IP address of the VPN server’s virtual interface as the gateway IP address.
D. In the properties of the TCP/IP protocol of the dial-up connection object, in the Advanced TCP/IP Settings dialog box, click the General tab, and then select the Use default gateway on remote network check box.
E. In the properties of the TCP/IP protocol of the dial-up connection object, in the Advanced TCP/IP Settings dialog box, click the General tab, and then clear the Use default gateway on remote network check box.

>> !
Answer: C & E

When a dial-up client calls the ISP, a default route is added allowing the client to access all Internet addresses through the ISP. However, when a VPN is established, a new default route is added, pointing to the VPN server, only allowing access to the IP address of the VPN server. The original route is retained, but assigned a higher metric, rendering it unavailable. For most Internet VPN clients, this is not a problem because they are either engaged in Internet communications or intranet communications, but not both. If the user needs Internet access while the VPN connection is active, there are a couple of things the administrator must do. In all cases, configure the VPN connection NOT to create a default gateway. This leaves the default route to the ISP intact, allowing Internet access. Accomplish this by clearing the ' Use default gateway on remote network' check box in the Advanced TCP/IP Settings dialog box.
The next thing you must do depends on the network addressing scheme in use on your company's intranet. In our scenario, we are using addresses in the 172.16.0.0 range. This is a reserved private address, and is not used to assign Internet addresses. Therefore, you would add static persistent routes for the private network IDs of the intranet using the IP address of the VPN server’s virtual interface as the gateway IP address. Static routes can be added using the 'ROUTE' utility. For each route, type the following route utility syntax at a Windows 2000 command prompt: ROUTE ADD MASK.p Since we are not using RIP, we have no way of dynamically adding intranet routes.


12. Luther is supervising a Windows 2000 migration. The company organizational structure consists of five departments: Marketing, Sales, Production, Operations, and Administration. Five corresponding OUs will be created, containing the appropriate user accounts. With the exception of Operations, all servers, printers, and other hardware assets will also be placed into their respective OUs. Due to higher security requirements for the servers in Operations, they will be placed into a separate OU--Ops_SVR. All communications with servers in Operations must be secured and encrypted to protect against network attacks. How should Luther implement security for the Operations department?

A. Assign the Secure Server (Require Security) and the Client (Respond Only) IPSec policies to the Marketing, Sales, Operations, Production, and Administration OUs.
B. Assign the Secure Server (Require Security) IPSec policy at the Ops_SVR OU and the Client (Respond Only) IPSec policy at the domain level.
C. Assign the Server (Request Security) IPSec policy at the Operations OU and the Client (Respond Only) IPSec policy at the domain level.
D. Assign the Server (Request Security) IPSec policy at the Ops_SVR OU and the Client (Respond Only) IPSec policy at the Operations OU.

>> !
Answer: B

Due to the requirement for all Operations servers to communicate securely at all times, the Secure Server (Require Security) IPSec policy should be implemented. Placing the high security servers into a separate OU allows for ease of administration, as well as enhanced security. By applying this IPSec policy to the Ops_SVR OU, all servers in the OU are affected. To ensure that client computers are properly configured to respond securely if attempting communications with Operations department servers, employ the Client (Respond Only) IPSec policy at the domain level. The policy will propagate down through the Active Directory structure to all client computers in all subordinate OUs. In this way, if changes are made to the AD structure (like adding a new OU), the security policy would not be affected.
Applying the Secure Server (Require Security) policy to the Marketing, Sales, Operations, Production, and Administration OUs would have the unfortunate effect of requiring secure communications for servers that do not need it, and not requiring them for servers that do.
Applying the Client (Respond Only) policy to those same OUs would work, but applying this policy at the domain level is better for reasons stated earlier. The Server (Request Security) IPSec policy is not strict enough. In our scenario, all communications from Operations servers must be secure. With this policy, the server can fall back to non-secure if the client cannot respond securely.


13. Luke must secure all internal communications between the IT department and the HR department. TCP/IP is Luke's network protocol. All servers in these departments are Windows 2000 Servers, and all workstations are running Windows 2000 Professional. A single router separates the two departments. Company policy requires secure internal communications to use 3DES encryption. For testing and troubleshooting purposes only, before the transmission of any live data, Luke wants to defeat the default authentication mechanism and use an alternative form of authentication. If his tests are successful, he will reinstate the default authentication scheme. Which two methods apply to Luke's lab scenario? (Choose all that apply)

A. Kerberos authentication using ESP
B. Preshared key using ESP
C. Preshared key authorization using AH
D. Kerberos authentication using AH
E. Certificate-based authentication using AH
F. Certificate-based authentication using ESP

>> !
Answer: B & F

The method for providing secure internal communications with 3DES encryption is IPSec. A well-implemented public key infrastructure, in which security credentials can be presented without compromising those credentials in the process, resolves many security problems. IPSec works with your public key infrastructure to allow certificate-based authentication of computers. This is, in fact, the default authentication scheme for IPSec communications. There are two "flavors" of IPSec -- plain and encrypted. The Authentication Header protocol (AH) provides integrity and authentication, but not encryption. Encapsulating Security Payload (ESP) adds the encryption element. An alternate, and not generally recommended, involves using a pre-shared key. Pre-shared means there must be agreement on a shared, secret key that becomes part of the IPSec policy.
During security negotiation, information is encrypted before transmission using the shared key, and decrypted on the other end using the same key. If the receiver can decrypt the information, authentication is successful. The problem is that the authentication key is stored, unprotected, in the IPSec policy. This mode can be useful for troubleshooting, but it is really provided to ensure interoperability. As before, the ESP protocol is required. Kerberos authentication is not supported by IPSec.


14. Karl is the administrator for the Finance department. He is responsible for his department's server, and he would like to apply security settings to this server. This server has a freshly installed version of Windows 2000 and is not a domain controller. Karl wants to ensure that all inbound and outbound server and client communication traffic is digitally signed, and he wants to ensure that no unsigned device drivers may be installed. What should Karl do?

A. Import the hisecdc.inf security template into the Security Templates snap-in of the Microsoft Management Console.
B. Import the hisecws.inf security template into the Security Configuration and Analysis snap-in of the Microsoft Management Console.
C. Import the securews.inf security template into the Group Policy snap-in of the Microsoft Management Console.
D. Import the compatws.inf security template into the Security Templates snap-in of the Microsoft Management Console.

>> !
Answer: B

Once you have placed your users into the appropriate groups to allow access to supported applications, you can further define security settings by applying security templates. Windows 2000 provides a collection of security templates for setting up your network security environment. Security templates can be imported into the Security Configuration and Analysis or the Group Policy snap-in modules of the Microsoft Management Console. Templates may be edited in the Security Templates snap-in, but they may not be imported. Security templates are inactive until they are imported into the Security Configuration and Analysis snap-in or the Group Policy snap-in.
There are four classes of security templates, which provide varying levels of security. These classes are Basic, Compatible, Secure, and High Secure. Within these classes are templates specifically designed for domain controllers, and templates for other computers. Note the usage of "ws" and "dc" in the filenames: "dc" indicates a template designed for use on a domain controller, and "ws" for other computers. The Basic template (which was not one of our potential answers) contains the default settings that Windows 2000 incorporates during a clean install. This template is normally used when upgrading from Windows NT 4.0 to ensure the settings are consistent. The Compatible template is designed for those situations where you have legacy applications, and you want your users to be able to run them without making your users Power Users. Be aware that a computer that incorporates this template, compatws.inf, is not considered secure. This would not work for our situation.
The Secure template modifies certain settings that would not have an impact on application functionality, but more of an impact on operating system and network behavior. For example, this template incorporates settings that enable digital signing of communications, but does not require it. The securews.inf template would not apply in our scenario. The High Secure template takes some of the settings from the Secure template, and applies their extreme values to favor security over performance, ease of use, or connectivity. With this template, digital signing of communications is mandated, and unsigned device drivers are blocked. The template file hisecws.inf is the appropriate choice for us. Hisecdc.inf is designed for domain controllers.


15. Cornelius needs to configure secure communications between the Production manager and the Production server, PROD1. PROD1 contains such sensitive material that it is on an isolated subnet, not communicating directly with the company intranet. However, Vladimir, the Production manager, IS on the company intranet. Most of his communications take place through normal intranet channels, but he does periodically need secure, confidential access to PROD1. How should Cornelius proceed?

A. VPN with L2TP
B. IPSec with AH
C. IPSec with ESP
D. RRAS with RADIUS

>> !
Answer: A

In Cornelius's case, server data is so sensitive that the department’s network segment is physically disconnected from the rest of the intranet. While this protects the server's data, it creates accessibility problems for those users not physically connected to the separate network segment. VPN connections allow a network segment to be physically connected to the intranet but separated by a VPN server. The VPN server does not provide a direct routed connection between the corporate intranet and the separate network segment. Authorized intranet users can establish a VPN connection with the VPN server and can gain access to the sensitive resource. Additionally, all communication across the VPN connection is encrypted for data confidentiality. For those users who do not have permissions to establish a VPN connection, the separate network segment remains hidden.
L2TP is a tunneling protocol that a VPN uses to provide the encryption services. Oddly enough, L2TP uses Internet Protocol Security (IPSec) to provide the actual encryption using Encapsulated Security Payload (ESP). However, IPSec with ESP by itself does not meet the requirements of our scenario. IPSec with AH provides authentication and integrity, but not encryption. Either way, IPSec by itself is not appropriate, given the network infrastructure. Routing Remote Access Service (RRAS) is a dial-up solution. Technically, nothing is stopping you from putting a RRAS server on the Production subnet and dialing in there, but this solution still would not supply the necessary encryption.


16. The company is concerned about data recovery in conjunction with EFS. Specifically they want to be assured that a file can be unencrypted when a user leaves the company and has his or her user account deleted. What will your design include to facilitate the centralized recovery of EFS encrypted data?

[view the scenario]

A. Your design will call for placing an enterprise root CA at headquarters and specifying the recovery agent at the domain level.
B. Your design will call for placing a stand alone root CA at headquarters and specifying the recovery agent at the domain level.
C. Your design will call for the use of a third-party CA and recovery agent.
D. Your design will call for the use of self signed certificates with the local administrator of each system acting as the recovery agent.

>> !
Answer: A

EFS is Windows 2000's built in file encryption technology. It is a certificate based technology that is designed to prevent data theft. Only the user that encrypted the data, and a file recovery agent (for administrative purposes), can open a file once it is encrypted. The encryption is based in part on a certificate that is unique to the user's Active Directory account. The encryption is transparent meaning that files are opened and closed normally by the user.Because the company requires centralized recovery it makes sense to locate the recovery efforts at headquarters. Likewise, because the company only has one domain, it makes sense to specify the file recovery agent at the domain level. This will be the person that is responsible for decrypting files. More than one person can perform this task if necessary. For security purposes, the root CA should always be offline and located in a secure location at headquarters. Enterprise CA's should be used any time that users need to have certificates that will be used in conjunction with Active Directory, which is obviously the case here. Stand-alone CA's are not integrated with Active Directory. Third party CA's are used to sign publicly available webservers and other accounts that require a high degree of public trust.
Windows 2000 Help, Search for the articles entitled: Certificate Services overview; Stand-alone certification authorities; Certification authorities; Enterprise certification authorities; Establishing a certification hierarchy; Encrypting File System (EFS); File encryption overview; Encrypting File System and data recovery; and Encrypting and decrypting data with Encrypting File System.


17. You have decided to use encryption to protect the files in the Sales and Marketing department. Which of the following will your design specify using for this purpose?

[view the scenario]

A. Your design will specify the use of encryption for all FAT folders that contain Marketing documents.
B. Your design will specify having Sales and Marketing employees encrypt only their documents that they do not share with others.
C. Your design will specify having Sales and Marketing employees individually encrypt only their shared Marketing documents.
D. Your design will specify the use of encryption for all NTFS folders that contain Marketing documents.
E. Your design will specify the use of encryption for only the NTFS shared folders that contain Marketing documents.
F. Your design will specify the use of encryption for only the FAT shared folders that contain Marketing documents.
G. Your design will specify the use of encryption for either the NTFS or FAT shared folders that contain Marketing documents.

>> !
Answer: B

The scenario clearly calls for sales and marketing people to only encrypt their own documents. If they encrypted documents that were shared with others, no one else would be able to view them. This is because documents are encrypted by and for the user account that requests the encryption to be placed on the file. Files can only be encrypted on NTFS volumes.Windows 2000 Help, Search for the articles entitled: Encrypting File System (EFS); File encryption overview; Encrypting File System and data recovery; and Encrypting and decrypting data with Encrypting File System.


18. Lourdes is the network administrator. She has a small group of managers who often work from home and need access to the corporate intranet. Lourdes has installed and configured a remote access server for this purpose. Other remote users can access everything they need from Lourdes's Web site. Lourdes needs to allow her designated users to dial in to the network, but she also needs to put a mechanism in place to ensure that ONLY those users can dial in. How should she configure her network?

A. Configure RRAS on the remote access server to use callback. Configure callback to dial a predefined number.
B. Set up proxy server on the private side of the remote access server. Configure proxy server to accept appropriate IP addresses.
C. Set up proxy server on the public side of the remote access server. Configure proxy server to accept appropriate IP addresses.
D. Configure RRAS on the remote access server to use callback. Configure callback to dial the specified number.

>> !
Answer: A

Lourdes should configure her remote access server to use callback. When you use the callback feature, the user initiates a call and connects with the remote access server. After authentication and authorization, the remote access server then drops the call and calls back a moment later to a negotiated or preassigned callback number. There are three callback options to choose from: -- No callback (the default) -- Set by caller (specified by caller) -- Always call back to (predefined by administrator) For additional security, select the 'Always call back to' option and type the number of the phone at the user's home (or whatever). When the user's call reaches the remote access server, the following events occur: -- After authentication and authorization of the connection attempt, the server sends a message announcing that the user will be called back. -- The server disconnects and calls the user back at the preset number. -- Once reconnected, the client and server continue the connection negotiation. You should set this option for stationary remote computers, such as those used by the managers in our scenario. The 'Set by caller' option is not really a security feature, because any old number can be specified by the caller. This increases your exposure to a malicious user who has appropriated the identity of an authorized user. So, for the sake of security, you would want to use the 'Always call back to' option.
A proxy server acts as an intermediary between your computer and the Internet. It is most frequently used when there is a corporate intranet and users are connected to a LAN. It can also work with a firewall to provide a security barrier between your internal network and the Internet. Neither proxy server answer would work in Lourdes's situation. Once the user authenticates with the remote access server, the proxy server is not necessary. If the user is unable to authenticate with the remote access server, the proxy server is not necessary again! Besides, proxy server would filter on IP addresses but, in all likelihood, the IP address of the client machine is going to be dynamically assigned by a DHCP server anyway.


19. Leilani is analyzing potential security risks to her network. Her mobile users have Windows 2000 Professional installed on their laptops. These users need access to sensitive client and company information while at client sites making sales and support calls. These users dial in to a remote access server twice a day in order to access public and private data on the company intranet. Her remote access server is also the company Web server--the sole connection point to the Internet. The intranet uses a proxy server to regulate access to the Internet, and there is a firewall in place on the private side of the proxy. Identify Leilani's primary threat, and suggest strategies to counter the threat.

A. The primary threat is external. Secure laptop data with EFS. Secure laptop communications with a VPN.
B. The primary threat is a combination of internal and external factors. Secure laptop data with NTFS permissions. Secure external communications with S/MIME. Authenticate external users with database verification. Authenticate internal users with Kerberos. Secure internal communications with SSL.
C. The primary threat is internal. Secure server-to-server communications with IPSec policies. Authenticate all users with Kerberos.
D. The primary threat is external. Authenticate laptop users with RADIUS. Establish callback security with RRAS.

>> !
Answer: A

Network administrators should carefully analyze their networks in order to assess potential security risks. Security risks manifest themselves in a variety of forms, but a thorough understanding of the different types of network attacks that may be attempted should assist the administrator in minimizing these risks. Any security plan is, by necessity, a compromise between flexibility and security. Prioritizing any perceived threats will help in determining the levels of risk, and those areas that require special attention. In Leilani's situation, the primary threat is external. Sensitive material resides on laptop computers, and sensitive communications take place originating from those computers. To combat attacks against our mobile workforce, we must perform a number of tasks. We must protect the data residing on the disk structure of the laptop, we must ensure we know the identity of the laptop users, and we must be able to transmit secure data over an unsecure channel. To do this requires the use of a couple of technologies. The encrypting file system (EFS) provides confidentiality for the sensitive client and company data on the laptop computers. Using public key technology, we can be assured that only the owner of a file has access to it. Unauthorized access attempts result in an 'Access Denied' message. For safety, recovery agents are specified in case the authorized user has technical problems rendering him or her unable to open a protected file. Virtual private networking (VPN) provides a simple answer to the problem of data integrity and confidentiality.
A VPN is the extension of a private network that encompasses links over public networks like the Internet. A VPN enables you to send data between two computers in a way that appears to be a point-to-point private link. To emulate a point-to-point link, data is encapsulated, or wrapped, with routing information allowing it to cross the public network to reach its endpoint. The data being sent is encrypted for confidentiality. Packets that are intercepted are unreadable without the encryption keys. The link in which the private data is encapsulated and encrypted is known as a virtual private network (VPN) connection. The answer suggesting RADIUS authentication and callback security is only partially viable. Routing and Remote Access (RRAS) supports Remote Authentication Dial-In User Service (RADIUS), which makes it possible to manage remote user authentication through a variety of authentication protocols. Callback security ensures that you can control the phone number the server is instructed to call, reducing the threat of an identity thief compromising a valid user account.
However, both of these techniques address only the issue of authentication. The encryption requirement for hard disk data was not addressed, nor was the necessity for confidential communications. In the absence of any amplifying data, it cannot be safely surmised that any threat to the internal network could be considered primary. Securing server-to-server communications with IPSec policies and using Kerberos to authenticate users is probably a good idea, but not warranted by our scenario. The answer suggesting a combination of factors is likewise incorrect. NTFS permissions do not go far enough in securing physical data. There are ways for a malicious user to bypass NTFS to get at the underlying (unencrypted) text. The Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol ensures the integrity, origin, and confidentiality of e-mail messages. Other communications are unaffected. Secure Sockets Layer (SSL) is normally associated with providing secure access to a Web site. Applications must be SSL-enabled to benefit from SSL. Kerberos is the Windows 2000 standard user authentication mechanism. This can be used for both internal and external authentication purposes.


20. While going over your plans regarding network access from the consultant's laptops, the company reminds you that they will also need to perform file transfers. You had assumed this would take place using public folders in OWA and realize that you have been at this long enough to know nothing should be assumed. As it turns out the company wants to use VPN's from the laptops to the regional office that the consultant is assigned to. Which of the following technologies will you add to your implementation plan to accommodate this access requirement?

[view the scenario]

A. Remote Authentication Dial-In User Service (RADIUS)
B. PPTP over IPSec
C. L2TP over IPSec
D. PPTP over MPPE
E. L2TP over MPPE
F. Internet Authentication Service (IAS)

>> !
Answer: C

We know from the background information provided that both the laptops and VPN servers will be running Windows 2000. There are two different types of VPN access possible using Windows 2000. The most secure of these is L2TP in conjunction with IPSec. L2TP provides the VPN tunnel but does not have native encryption support. Because of this, it must be used in conjunction with IPSec to secure the data on the wire. Both L2TP and IPSec must be configured on both ends of the connection.L2TP is only supported as a communication link between two Windows 2000 computers. If communication is required between Windows 2000 and older clients such as Windows NT or 9x, PPTP and MPPE should be used.Windows 2000 Help, Search for the articles entitled: Virtual private networks; Remote access VPN design considerations; Remote access VPN security; Remote access for employees; Internet-based VPNs; Remote access VPN connection; Data encryption; Point-to-Point Tunneling Protocol; Layer Two Tunneling Protocol; Network security; How IPSec works; and Understanding Internet Protocol Security.


21. Siobhan has two users in different departments who need to communicate securely. These users need their communications on the LAN to each other to be both mutually authenticated and encrypted. However, they both need to communicate in the clear with other users on the LAN. How should Siobhan proceed?

A. Use VPN features to create a PPTP tunnel between the users computers.
B. Secure the shared resources on both users' computers with local groups and restrict access to the shared resources to the two users.
C. Put the two users on an isolated subnet. Enable packet filtering at the switch.
D. Define and implement an IPSec policy for both users computers.

>> !
Answer: D

In this case, both users are on the same LAN and have different communication needs with different users. The best way for Siobhan to accomplish her objective would be for her to implement IPSec policies. This way, she can configure communications between their computers to require mutual authentication and provide encryption based on IP filters in the policy. Likewise, communications to other users would be unaffected by this policy because there would be no matching filter. A Virtual Private Network (VPN) is designed to provide secure communication for remote users, and users on different networks. In our scenario, the users are on the same physical network.
Securing resources with access control is good practice, but does not address the issues of authentication and encryption. Segmenting the users on an isolated subnet may be a good idea, but it does not address the issues of authentication and encryption either. Also, packet filtering would control the flow of communication from one side of the switch to the other, but this would not be necessary if they were both on the same side, and it might negatively affect their ability to communicate in the clear with other users.


22. Kristin is configuring VPN connectivity for her small army of mobile sales representatives. They require the ability to transmit data using 128-bit encryption techniques. Because some of the laptop computers are older and are not scheduled to be upgraded in the near future, Kristin has elected to configure the VPN to use PPTP tunneling. For extra security, Kristin requires that both the client and the server mutually verify their identities. Which authentication methods can Kristin implement? (Choose all that apply)

A. Smart card and other certificate authentication
B. Extensible Authentication Protocol (EAP-MD5 CHAP)
C. Extensible Authentication Protocol (EAP-TLS)
D. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
E. Shiva Password Authentication Protocol (SPAP)
F. Challenge Handshake Authentication Protocol (CHAP)
G. Password Authentication Protocol (PAP)
H. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)

>> !
Answer: C & H

Network and Dial-up Connections supports two types of encryption: Microsoft Point-to-Point Encryption (MPPE), which uses RSA RC4 encryption, and an implementation of Internet Protocol security (IPSec) that uses Data Encryption Standard (DES) encryption. Virtual Private Networks (VPNs) use encryption depending on the type of server they are connecting to. If the VPN connection is configured to connect to a PPTP server, then MPPE encryption is used. Strong (128-bit key) and standard (40-bit key) MPPE encryption schemes are supported. To enable MPPE-based data encryption for VPN connections, you must select the MS-CHAP, MS-CHAP v2, or EAP-TLS authentication methods.
These authentication methods generate the keys used in the encryption process. However, our scenario specifies mutual client/server verification, which eliminates MS-CHAP. If a certificate is installed either in the certificate store on your computer or on a smart card, and the Extensible Authentication Protocol (EAP) is enabled, you can use certificate-based authentication in a single network logon process. EAP-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) uses the same challenge handshake protocol as PPP-based CHAP, but the challenges and responses are sent as EAP messages. Challenge Handshake Authentication Protocol (CHAP) is an industry-standard authentication protocol used by many non-Microsoft clients. Shiva Password Authentication Protocol (SPAP) is a vendor solution for use when connected to Shiva LAN Rover hardware. It is more secure than plaintext, but less secure than CHAP. Finally, Password Authentication Protocol (PAP) uses plaintext passwords, and is the least sophisticated authentication method. Normally, PAP would only be used if the client and the remote access server were unable to negotiate anything better.


23. The company has expressed a strong desire to ensure that all appropriate events are audited on the company's domain controllers. Which of the following will your design specify for inclusion in the audit policy (Choose all that apply)

[view the scenario]

A. Your design will specify inclusion of Policy changes: success audits.
B. Your design will specify inclusion of Account management: success audits.
C. Your design will specify inclusion of Directory service access: success audits.
D. Your design will specify inclusion of Account logon events: success audits.
E. Your design will specify inclusion of Object access: success audits.
F. Your design will specify inclusion of Policy changes: failure audits.
G. Your design will specify inclusion of Account management: failure audits.
H. Your design will specify inclusion of Directory service access: failure audits.
I. Your design will specify inclusion of Account logon events: failure audits.
J. Your design will specify inclusion of Object access: failure audits.

>> !
Answer: A, B, D, F, G & I

It is important to strike a balance between what needs to be audited and what does not. The most important thing when it comes to auditing is to audit only as much as your can routinely monitor. If you audit a great deal of information, but never review any of it, you might as well not be auditing it at all. New administrators need to be very careful that they do not fall into the trap of auditing too much, and thus never wind up looking at the security log.This servår is a domain controller. Because of this it may be used to manage directory service information, as well as accept user logons. It might also be called upon during routine directory access or search events. If you choose to monitor those routine events (such as Directory service access Success or Failure) it will likely generate too much information in the logs. In addition, although the information will tell you who is accessing what, it will most likely not be all that helpful. Object access relates to folder, file and printer access and is not relevant on a domain controller.
The most important things to monitor on a domain controller are logons and logoffs, policy changes, and directory management events. The corresponding access events are officially called Account logon, Account management, and Policy changes. Account management and Policy changes are administrative events that are critical to monitor as they can affect security on the network. It is important to monitor failures so that you can see who is attempting to change them but should not be. It is equally if not more important to track successes for these events so that you will have a log of who changed what. Such accountability is critical on the network and also allows for inappropriate changes to be caught.Account logon events should also be monitored to track who is coming and going on the network. They should be monitored in an effort to catch people trying to break into the network. It should be noted that seasoned administrators do not only audit failed logon events. Information about successful logons can be just as helpful. For instance, if you have a manager that only works from 9 a.m. to 5 p.m. and never logs in from home, yet you see a successful logon from them at 3 a.m. it is likely that someone has obtained their username and password and is accessing the network in an unauthorized fashion.Windows 2000 Help, Search for the articles entitled: Auditing policies; Auditing security events; Audit settings on objects; Auditing; Monitoring Windows 2000 security events; and Auditing access to objects.


24. Joaquin is the network administrator for the southeast region of his company. His LAN consists of a mix of Windows 2000 and non-Windows 2000 computers. He has several Windows 2000 DHCP servers installed for fault tolerance and securing dynamic updates. One of his DHCP servers (DHCPMAIN) failed. Three days later, a user informed Joaquin that he was having problems with DNS addressing. Joaquin pieced together the following facts: -- DHCPMAIN registered the name 'bob.marketing.megacorp.com' on behalf of a non-Windows 2000 client. -- DHCPMAIN went down. -- An administrator upgraded the user's computer to Windows 2000. -- The user can no longer dynamically update his host (A) record in DNS. Joaquin called Tech Support for assistance, and was instructed to add all of his DHCP servers to the security group DnsUpdateProxy. How will this solve Joaquin's problem?

A. Membership in this group causes the DHCP servers to emulate the DHCP/DNS interaction behavior for non-Windows 2000 clients.
B. By default, the DHCP server sends updates for clients that do not support the Client FQDN option (option 81). Members of this group will NOT send updates for these clients.
C. Membership in this group enables full control over all DNS objects stored in Active Directory.
D. Any object created by a member of this group has no security and the first user (who is not a member of the DnsProxyUpdate group) to modify the set of DNS records becomes the owner.

>> !
Answer: D

You can configure a Windows 2000 DHCP server to dynamically register host (A) and pointer (PTR) resource records on behalf of DHCP clients. Using secure dynamic update with Windows 2000 DNS servers might cause problems with this configuration. Consider the following sequence of events: -- A Windows 2000 DHCP server performs a secure dynamic update on behalf of a client for a specific DNS name. -- The DHCP server becomes the owner of the name (that's the way it works). -- Now, only that DHCP server can update the DNS name. The problem comes when the DHCP server fails, and a subsequent update request from the original client will fail because the failed DHCP server owns the name. To solve this problem, a new security group called DnsProxyUpdate is provided. Any object (DNS record) created by a member of this group has no security. The first client who comes along (who is not a member of this group) and requests an update becomes the owner. Note: If you are using multiple DHCP servers, add them all to the DnsProxyUpdate group. The DnsProxyUpdate group has a couple of security issues to deal with. First off, any DNS names registered by the computer running the DHCP service are not secure. This is important if the DHCP server is on a domain controller.
Also, the DHCP server has full control over all DNS objects stored in the Active Directory because the DHCP server runs under the computer (in this case, the domain controller) account. Therefore, it is highly recommended that you not run DHCP servers on domain controllers. One of the incorrect responses says, very truthfully, that membership in the DnsProxyUpdate group enables full control over all DNS objects stored in Active Directory. The reason it is incorrect is because this is a problem, not a solution! Membership in this group DOES NOT cause the DHCP servers to emulate the interaction behavior for non-Windows 2000 clients. By default, the DHCP server does indeed send updates for clients that do not support the Client FQDN option (option 81). This allows the server to perform proxy updates in DNS for all of its non-Windows 2000 DHCP clients. This does not, however, have anything to do with the DnsProxyUpdate security group.


25. Ignatz has just performed a clean installation of Windows 2000 Server onto an NTFS partition. This server will function as a file server and will not be a domain controller. Barbara, a user in the department, has been identified to help Ignatz support and maintain the file server. She needs sufficient access to install and maintain applications that will be used by all users in the department, but does not need broad administrative powers. Barbara has not been assigned to any groups. How can Ignatz accomplish his objective with minimum administrative overhead?

A. Assign Barbara Full Control to the %UserProfile% file system object.
B. Assign Barbara to the Server Operators group.
C. Assign Barbara to the Power Users group.
D. Assign Barbara to the Power Users group. Assign the Power Users group Full Control to the All Users, All Users/Documents, and All Users/Application Data file system objects.

>> !
Answer: C

With a clean installation of Windows 2000, certain default access control settings are assigned to the Power Users and the Users groups on an NTFS partition. The primary difference is that the Power Users group is given sufficient access to install computer-wide applications. Specifically, this group is given the following permission structure for the relevant file system objects: -- All Users: Modify -- All Users/Documents: Modify -- All Users/Application Data: Modify The Users group is given Read access to these same objects (plus Create File for the All Users/Documents object). All that needs to be done to satisfy the conditions of our scenario is to assign Barbara to the Power Users group. Further assigning the Power Users group Full Control permissions to these objects would not be correct. This would give this group more power than is required by our scenario. Also, it would require Ignatz to make these changes, adding to the administrative burden. Barbara, and every other user, already has Full Control to the %UserProfile% object. This object represents user-specific settings that each user has complete control over (unless that control is revoked by the administrator).
The use of the '%' character represents a system variable that is interpreted at login time by the system, and applied to the appropriate user. The Server Operators group is to domain controllers what the Power Users group is to member servers. Membership in the Server Operators group would give you similar abilities at the domain level that the Power User enjoys at the local computer level. Since Ignatz's server is not a domain controller, it does not have a Server Operators group.


26. Garth is assigning access permissions to the folder structure on his Windows 2000 NTFS file server. Garth has created three groups to help him regulate access to the Research department folder and subfolders. The ResearchAdmins group needs unrestricted access to the Research department folder. The ResearchManagers group needs the capability to read, modify, and delete files and execute programs in the Research folder. The ResearchUsers group needs to be able to read files and execute programs in the Research folder. How should Garth assign file access permissions to provide the appropriate level of access?

A. ResearchAdmins - Full Control ResearchManagers - Modify ResearchUsers - Read & Execute
B. ResearchAdmins - Full Control ResearchManagers - Full Control ResearchUsers - Read
C. ResearchAdmins - Full Control ResearchManagers - Full Control ResearchUsers - Read & Execute
D. ResearchAdmins - Modify ResearchManagers - Modify ResearchUsers - Read & Execute

>> !
Answer: A

File permissions include Full Control, Modify, Read & Execute, Read, and Write. Each of these permissions consists of a logical group of special permissions. These permissions are summarized in the following table: (FC. Full Control, M - Modify, RX - Read & Execute, R - Read, W - Write) Special Permissions: FC M RX R W
Traverse Folder/Execute File X X X List Folder/Read Data X X X X Read Attributes X X X X Read Extended Attributes X X X X Create Files/Write Data X X X Create Folders/Append Data X X X Write Attributes X X X Write Extended Attributes X X X Delete Subfolders and Files X Delete X X Read Permissions X X X X X Change Permissions X Take Ownership X Synchronize X X X X X
In our scenario, the ResearchAdmins group requires unlimited access. This equates to Full Control. The Modify permission for this group does not give them the required degree of control. The ResearchManagers group needs to read, write and delete files, as well as execute programs. For them, the appropriate permission level is Modify. Notice that Modify does not allow for the deletion of subfolders and files. The Delete special permission allows them to delete the files in the Research folder. The permissions required for the ResearchUsers group is pretty straightforward -- Read & Execute. The Read permission itself does not include the special permission Traverse Folder/Execute File, which is necessary to allow the execution of programs.


27. Cletus is designing his company's network to accommodate future growth with minimal impact. Currently, his company is small but is growing rapidly through acquisitions and mergers. Cletus wants to allow for efficient Active Directory updates but also wants to ensure his Domain Name System (DNS) entries are updated securely and efficiently as well. How should Cletus design his DNS structure to allow for secure, efficient updates, while accommodating future growth strategies?

A. Use Directory-integrated zone storage, using the Active Directory database.
B. Use standard zone storage on the DNS server for zone storage and replication, using text-based files.
C. Store DNS zone files in .Dns files that are stored in the %SystemRoot%\System32\Dns folder on each computer operating a DNS server.
D. Store DNS zone files in .Dns files that are stored in the %SystemRoot%\System32\Dns folder on each computer operating a DNS server. Install support for UTF-8 to ensure interoperability with Active Directory.

>> !
Answer: A

A DNS server is required to support the use of Active Directory and for Windows 2000 computers to locate this server or other domain controllers for the domain. Once you have installed Active Directory, you have two options for storing and replicating your zones when operating the DNS server at the new domain controller: -- Standard zone storage, using a text-based file. -- Directory-integrated zone storage, using the Active Directory database. For networks deploying DNS to support Active Directory, directory-integrated primary zones are strongly recommended and provide the following benefits: -- Multi-master update and enhanced security based on the capabilities of Active Directory. -- Zones are replicated and synchronized to new domain controllers automatically whenever a new one is added to an Active Directory domain. -- By integrating storage of your DNS zone databases in Active Directory, you can streamline database replication planning for your network. -- Directory replication is faster and more efficient than standard DNS replication. Using standard zone storage on the DNS server for zone storage and replication, using text-based files is not recommended.
For example, when using standard DNS zone storage and Active Directory together, you would need to design, implement, test, and maintain two different database replication topologies. One replication topology would be needed for replicating directory data between domain controllers, and another topology would be needed for replicating zone databases between DNS servers. This can create additional administrative overhead and effort for planning and designing your network and allowing for its eventual growtH - Storing DNS zone files in .Dns files in the %SystemRoot%\System23\Dns folder is an example of using standard zone storage. In Windows 2000, DNS service provides enhanced default support for UTF-8, a Unicode transformation format. UTF-8 has no effect on integrating DNS into Active Directory.


28. Floyd is designing a security policy for his departmental server. This server contains material of a highly sensitive nature, and Floyd wants to ensure that appropriate measures are in place to protect the confidentiality and integrity of this data. Floyd has evidence that his network communications have been the subject of a variety of network attacks by sophisticated individuals with powerful computers, and he is specifically concerned by the possibility of a compromised-key attack. In order to maintain the highest integrity of his encryption keys, Floyd wants to ensure that session keys or keying material are not reused. What should Floyd do?

A. From within the Create IP Security Rule wizard, select the Session Key Perfect Forward Secrecy checkbox on the Security Methods tab.
B. From the IKE Security Algorithms dialog box, specify 3DES in the Encryption Algorithm: drop-down list.
C. From the IKE Security Algorithms dialog box, specify a level of Medium (2) in the Diffie-Hellman Group: drop-down list.
D. From within the Create IP Security Rule wizard, select or create the appropriate filter from the IP Filter List and specify the IP address of the "bad" computer. Then select the Block option button on the Security Methods tab.

>> !
Answer: A

Perfect Forward Secrecy (PFS) determines how a new key is generated. In the event of a key compromise by a determined hacker, PFS ensures that compromise of a single key permits access only to data protected by that single key. To achieve this, PFS ensures that a key used to protect a transmission cannot be used to generate any additional keys. Setting up a filter to block traffic from a known address is a viable technique only if you know the address to block. From our scenario, there was no way to determine if this was possible. A Diffie-Hellman level of Medium (2) provides keying material for creating 128-bit keys as opposed to 96-bit keys. This is more secure, but does not guarantee that this material will not be reused at a later time to create more keys. 3DES is a strong encryption algorithm, but is independent of the keys used to encrypt and decrypt the data.


29. Casper is configuring Terminal Services on a newly upgraded Windows 2000 server. He has created his folder structure, and applied shared folder permissions to the FAT partition and a combination of shared folder and NTFS permissions to the NTFS partition. User testing, however, shows unauthorized access to certain parts of the file system. What is the most likely cause of the problem?

A. The FAT partition does not offer user or directory security.
B. The FAT partition does not offer user or directory security; and, because this is an upgraded server, an older version of NTFS may be installed. NTFS5 is required.
C. The Terminal Server is in Remote Administration mode, which allows Administrator access.
D. Users are executing runas from a command prompt to start applications under a different context without having to log off first.

>> !
Answer: A

Terminal Services provides access to Windows 2000 and the latest Windows-based applications for client computers.It also provides access to your desktop and installed applications anywhere, from any supported client. Because of the multi-user nature of Terminal Services, it is strongly recommended you use the Windows 2000 version of NTFS as the only file system on the server, rather than file allocation table (FAT). FAT does not offer any user and directory security, whereas with NTFS you can limit subdirectories to certain users or groups of users. Even though NTFS5 is strongly recommended, an NTFS installation from an upgraded server will still provide the level of access control you need. If the Terminal Server were in Remote Administration mode, only Administrators would have access. This mode would prevent ordinary users from accessing the file system. The 'runas' command allows you to change context without requiring you to log off first, but, since you must supply valid login credentials to use this technique, this is not a likely cause of our access problem.


30. Desdemona is supervising the migration to Windows 2000. Her current network consists of Windows NT 4.0 servers, UNIX servers, and a few NetWare servers. The UNIX servers run mission-critical applications that must be retained. The NetWare servers are primarily file and print servers and will not make the move. A limited number of NT 4.0 servers will be retained for several months. Currently, she manages file systems on 35 different servers with more being added all the time. Users often must map 10 or 12 drive letters in order to be able to easily access file system resources. File systems reside on a mix of FAT and NTFS partitions. As there is sensitive material located on these servers, Desdemona must ensure that access permissions are appropriate for the user or group involved. Desdemona wants to streamline file system access after the migration. She wants to make file system access more "user-friendly" without compromising security. What strategy should Desdemona employ?

A. Migrate or upgrade all FAT volumes to NTFS. Organize the file system resources using EFS.
B. Rename all shared resources to better reflect their function. Place all file servers into the same OU. Apply security at the OU level.
C. Organize the file system resources using DFS. To the maximum extent possible, migrate or upgrade FAT volumes to NTFS.
D. Publish the file systems to the company's intranet Web server. Instruct the users to add file system resources to their Favorites folder, circumventing the limited number of drive mappings available.

>> !
Answer: C

Based on our scenario, Desdemona wants to use the Distributed File System (DFS). DFS consists of software residing on network servers and clients that transparently links shared folders located on different file servers into a single namespace for improved load sharing and data availability. DFS organizes these resources in a tree structure, starting with a root located on a Windows 2000 server. From the root, you can define links to shared folders distributed throughout your organization’s local or wide area networks, without regard to their physical location. And, with Network File System (NFS) for UNIX installed, a file system on a UNIX server can be a Dfs target. NetWare Core Protocol (NCP) for NetWare extends DFS to NetWare volumes, although this is not necessary in our scenario. DFS does not add an additional layer of security. The underlying permission structure remains in effect. Migrating or upgrading FAT volumes to NTFS is not required for DFS to work, but it allows a more granular approach to file system security and allows for other capabilities, such as EFS. Encrypting File System (EFS) will not do what Desdemona wants. It has no organizational capabilities. EFS will still provide file encryption on NTFS volumes within a DFS tree. Renaming resources and placing all file servers into the same OU is an unworkable solution. Disparate file systems can reside in servers throughout the enterprise, and it would not be practical or desirable to group them all together.
Also, applying security at the OU level would not give you sufficient control to regulate access to individual files and folders. Publishing the data to a Web server will not solve Desdemona's problem. Additionally, this type of publishing effort would be an administratively prohibitive procedure. Besides, you can already use your browser to access file system data with a Web-style interface. Employing DFS would make this process even more user-friendly.


31. Bob, the network administrator, wants to enable encrypted communications between members of the executive steering committee. He is concerned about email and other communications being subject to eavesdropping and sniffer attacks. Bob would like to address these concerns without requiring existing applications to be replaced or modified. What mechanism should Bob employ to address these concerns?

A. IPSec
B. Kerberos v5
C. Smart Cards
D. SSL

>> !
Answer: A

IPSec (IP Security) enables encrypted network communication. IPSec uses cryptography-based protection services, security protocols, and dynamic key management to accomplish two goals: protect IP packets and provide a defense against network attacks. IPSec is based on an end-to-end security model, meaning that the sending computer encrypts the packet before it is ever placed on the wire, and the receiving computer decrypts the packet only after it has been received. The underlying assumption is that the communication media is inherently insecure. A primary benefit of IPSec is the fact that it operates at the Network Layer of the TCP/IP protocol stack, and any upper layer protocols or applications do not have to be concerned with IPSec. The SSL (Secure Sockets Layer) protocol provides communications privacy, authentication, and message integrity by using a combination of public-key and symmetric encryption. SSL requires that applications be specifically written to support SSL. Kerberos v5 and Smart Cards both have to do with authentication, but neither approach encrypts network traffic.


32. Fred is the network administrator, and his task is to determine the appropriate security posture for various Active Directory groups and OUs. Fred's Windows 2000 domain contains the following:

An OU called HighFinance containing servers that store and exchange sensitive information
An OU called LowFinance containing servers that might need to exchange data with non-Windows 2000 computers in the domain
An OU called Computers containing clients that are expected to respond securely when requested to do so.

Fred would like to apply appropriate IPSec policies with the minimum amount of administrative overhead. What combination of IPSec policies will meet Fred's criteria?

A. Computers - Client (Request Security); LowFinancE. Server (Request Security); HighFinancE. Server (Request Security) with custom settings
B. Computers - Client (Respond Only); LowFinancE. Server (Respond Only); HighFinancE. Server (Request Security)
C. Computers - Client (Respond Only); LowFinancE. Server (Respond Only); HighFinancE. Server (Request Security)
D. Computers - Client (Respond Only); LowFinancE. Server (Request Security); HighFinancE. Secure Server (Require Security)

>> !
Answer: D

Windows 2000 provides a set of predefined IPSec configurations. Although these policies are intended to be used as starting points around which to build your IPSec policies, they can be used as-is in certain straightforward situations, such as defined in our scenario. The three predefined policies (and the correct answer) are: -- Client (Respond Only) -- Server (Request Security) -- Secure Server (Require Security) Client (Respond Only) is designed for computers that do not normally use secure communications, but contains what is called a Default Response rule, which enables negotiation with computers requesting IPSec. Only the requested protocol and port traffic for the communication is secured. Server (Request Security) is for computers that normally use secure communications. This policy enables the computer to accept unsecured traffic, such as would originate from a non-Windows 2000 computer, but always attempt to secure additional communications by requesting security from the original sender. This policy allows the entire communication to be unsecured, if the other computer is not IPSec-enabled. Secure Server (Require Security) is for computers that always require secure communications, such as the HighFinance servers in our example. This policy allows unsecured, incoming communications, but always secures outgoing traffic. Therefore, if you are not IPSec-enabled, negotiation will fail, and two-way traffic will not be established.


33. Gunter has finished using the IP Security Policies MMC snap-in to configure negotiation settings to establish secure communications. Gunter then attempts to establish a secure communication session between two IPSec-enabled computers and is unable to make the connection. The client computer, CLIENT1, is on a remote subnet behind router ROUTER1. The server, SERVER1, contains sensitive information and is behind a router, ROUTER2, and a firewall, FIREWALL1. What is the probable solution to Gunter's inability to connect?

A. Ensure the negotiation settings match exactly on CLIENT1 and SERVER1.
B. Enable IP Forwarding on FIREWALL1.
C. Enable IP Forwarding on ROUTER1 and ROUTER2. Disable Packet Filtering on FIREWALL1.
D. Install a Network Address Translator (NAT) between FIREWALL1 and ROUTER2.

>> !
Answer: B

Gunter should enable IP Forwarding on FIREWALL1 Any routers or switches in the data path simply forward the encrypted IP packets to their destination. However, if your network design includes a firewall, security server, or proxy server, IP Forwarding must be enabled to prevent the packet from being rejected. IPSec uses IP packet filtering for determining whether communication is allowed, secured, or blocked, according to the IP address ranges, protocols, or specific protocol ports. But, in our scenario, FIREWALL1 is not one of our IPSec-enabled computers, reducing the likelihood of this being the problem. Also, disabling packet filtering would affect other communications that relied on it. Also, it is not necessary to enable IP Forwarding on the routers. You cannot use IPSec with a NAT. Security negotiations are not able to pass through. The IKE negotiation contains IP addresses in the encrypted messages that cannot be changed by a NAT because the integrity hash will be broken, or because the packets are encrypted. It is not necessary or desirable to match the negotiation settings exactly between the two communicating computers. The whole idea of negotiation is to allow two computers with different settings to agree on the lowest common denominator as far as secure communications go. Even if you did match up the negotiation settings, you would still not solve the IP Forwarding problem.


34. You are the security administrator for your mMixed mMode Windows 2000 Active Directory domains in the gunderville.com forest. The three domains are gunderville.com, northamerica.gunderville.com, and usa.northamerica.gunderville.com. You have responded to a call from the help desk. They have reported that a number of users in the usa.northamerica.gunderville.com cannot log on to their domain accounts and that they are receiving a locked out message. You were contacted because there has been a higher than normal number of calls. Upon further investigation you discover that over 25% of the users across the enterprise are locked out and need to be administratively reset. You are convinced that this was a brute force attack on your user account database. To ease the workload of the help desk on future incidents, you decide to set parameters on the lock out policy so that accounts reset after a certain period of time after an attack like this takes place so the help desk doesn't have to do it manually.

Your primary objective is to perform the necessary changes so that they are universal throughout the enterprise.

Your secondary objectives are to perform this action with the least amount of administrative effort and configure the settings so that accounts will reset themselves after 30 minutes, allowing the users to log on again after the number of bad password attempts has been breached.

You decide to reset your domain policy GPO so that the following settings were configured.

Account Lockout Duration - 30 minutes
Account Lockout Threshold - 5
Reset Account Lockout counter after - 5 Minutes

You then link this policy to usa.northamerica.gunderville.com.

What is the end result of your actions?

A. The primary and both secondary objectives have been satisfied.
B. The primary and one of the secondary objectives has been satisfied.
C. Only the primary objective has been satisfied.
D. Only one of the secondary objectives has been satisfied.
E. None of the available choices listed is correct.

>> !
Answer: E

By linking the policy to usa.northamerica.gunderville.com, you are limiting the changes to only that domain, not the entire enterprise; therefore, the primary objective has not been met. Because you used the Account Lockout Duration - 30 minutes, Account Lockout Threshold - 5, and Reset Account Lockout counter after - 5 Minutes settings you have successfully met both secondary objectives.


35. Agnetha is the IT manager of a large, geographically dispersed company. She is supervising the managed migration from a Windows NT 4.0 network to a Windows 2000 network. Some machines will receive Windows 2000 Professional, while others receive Windows 2000 Server. For security reasons, Agnetha must maintain centralized control of the upgrade process. She must control when upgrades take place, which computers will be upgraded, and how network constraints will be applied. She has a small staff, and it would be far too costly to individually visit each upgrade candidate personally. Which upgrade technique or techniques meets Agnetha's requirements?

A. Remote Operating System Installation
B. Bootable CD
C. SMS, Syspart, Sysprep
D. SMS

>> !
Answer: D

In the enterprise environment, it is not cost effective to install Windows 2000 using the standard interactive setup on each computer. To greatly lower the total cost of ownership (TCO), you can perform automated installations of Windows 2000 Server or Professional on multiple computers. Before you can automate the installation of Windows 2000, you must decide whether the installation will be an upgrade from Windows NT or a clean installation. The following two items will help you determine whether to upgrade or to perform a clean installation: -- If your organization is currently running a Windows operating system and your IT department is centrally managed, you will want to perform an upgrade. If you are planning to create a managed environment but you do not currently have one, then you will want to perform a clean installation so that you can implement standard configurations as you perform your installation. -- If you plan to use existing hardware and existing software applications, perform an upgrade.
Alternatively, if you plan to purchase new hardware and install new software applications, you will need to perform a clean installation. In our scenario, an upgrade was expressly required. Of the five methods mentioned in the answers, only Systems Management Server (SMS) allows Agnetha the upgrade option she requires. All the others will only work in a clean installation environment. Additionally, Remote Operating System Installation works only with Windows 2000 Professional.


36. Elvis is in the process of evaluating Internet Service Providers (ISPs). A sales representative for one of them, ReallySecureNet, informs Elvis that his ISP offers an encrypted PPP dial-up connection for no additional charge. None of the other providers Elvis is considering offers this feature. Also, ReallySecureNet is running a promotion and is offering the whole package for a substantial discount. Elvis must support several remote users that require secure communications to the company intranet, and these users require user authentication and encryption features. Given the circumstances, what action should Elvis take regarding ReallySecureNet?

A. Sign up with the encrypted PPP connection feature enabled, even though PPTP is the only tunneling protocol supported.
B. Sign up with the encrypted PPP connection feature enabled, even though L2TP over IPSec is the only tunneling protocol supported.
C. Sign up, but do not employ the encrypted PPP connection feature.
D. Sign up with the encrypted PPP connection feature enabled. All tunneling protocols are supported.

>> !
Answer: C

Elvis should not use the encrypted PPP connection feature. While it is possible to negotiate an encrypted PPP connection for the dial-up connection with an ISP, this is not necessary and not recommended because the private data being sent, the tunneled PPP frame, is already encrypted. The additional level of encryption is not needed and can impact performance. Even though both tunneling protocols, PPTP and L2TP over IPSec, are compatible with the encrypted PPP connection feature, you still should not use it for the reason detailed above.


37. Harry is the network administrator for the College of Knowledge Computer Learning Centers. Harry is responsible for maintaining the network labs reserved for student use, as well as the college administrative network. The lab consists of a mix of NT 4.0 Server and Workstation computers. Every five weeks, Harry must reconfigure the lab for the next crop of students; and every day, Harry must ensure the computers are configured properly for that day's events. The students store their lab files on floppy disks, and each student has his own home folder on an NTFS partition on the lab server. They run a variety of applications, both server-based and desktop. Lab computers have Internet access. Access to resources is controlled through the Users group, of which all students are members.
This has proven to be a suitable arrangement from a security standpoint, even though the occasional over-zealous student might tamper with, and sometimes delete, critical files on lab workstations. This is not a major problem because the damage is limited to the workstation, and Harry can easily rebuild a lab workstation from a server-based image in about 15 minutes. (This is why students maintain their lab files on floppy disk!) Harry has been tasked with upgrading the lab to Windows 2000. He plans on performing fresh installs on all machines. Most applications are not Windows 2000-certified. Harry knows he will need to make some changes to the existing security posture to allow the students to have sufficient access to run legacy applications. Harry has identified four courses of action, each one allowing the students to function in the proposed lab environment. Which choice gives the students the most freedom with minimal likelihood of getting Harry into trouble?

A. Ensure the lab is physically isolated from the college administrative network. Add the Users group to the Administrators group.
B. Leave the students in the Users group. Use the Security Configuration Toolset to apply the compatibility security template.
C. Put the students into the Power Users group.
D. Leave the students in the Users group. Use only Windows 2000-certified applications, even if this means that there is no direct replacement for some programs currently in use.

>> !
Answer: C

The correct answer for our scenario is to put the students into the Power Users group. This is generally required to allow legacy applications to run. For a moment, let us consider the downside of this choicE.- Power Users have far more capabilities than Users, making them potentially far more dangerous. In addition to the capabilities of the Users group, Power Users can: -- Create local users and groups. -- Modify users and groups that they have created. -- Create and delete non-admin file shares. -- Create, manage, delete and share local printers. In a production environment, these may be more capabilities than you want to grant. However, even if a student with these rights failed to exercise prudence and good judgment, any damage would be limited to the local machine. Harry already contends with this issue. If you did not want the students to have Power User rights, the next step would be to use the Security Configuration Toolset to apply the compatibility security template. In effect, this technique "dumbs-down" Windows 2000 security to the equivalent level of an NT 4.0 system. What makes this an incorrect choice is that, although it keeps Harry out of trouble, it is more restrictive for the students than our correct answer.
The option of not using legacy applications would technically be perfect, but this option is not fully supported by the facts of our scenario. It would be wrong to assume that replacements are readily available, or that you could simply eliminate a given application from the curriculum. Putting the users into the Administrators group gives the students virtually unlimited access within the lab network. If one student changed the administrator's password, Harry would be effectively locked out.


38. Geri, the network administrator, is concerned about laptop security for her small army of traveling sales representatives. Just last year, 12 laptop computers were stolen from airports or client sites. Recognizing this as likely to continue in the future, Geri wants to protect the integrity of the stolen data, rendering it useless to the thief. She has recently upgraded all client computers to Windows 2000 Professional. Geri wants to accomplish the following: -- Protect files and folders with encryption -- Prevent unauthorized users from accessing encrypted files -- Provide recovery capability for administrators To accomplish the stated objectives, what should Geri incorporate into her security plan? (Choose all that apply)

A. NTFS5
B. Kerberos v5
C. NTLM
D. PPTP
E. IPSec
F. EFS
G. L2TP

>> !
Answer: A & F

Geri needs to implement the Encrypting File System (EFS). EFS protects sensitive data on disk using the NTFS5 (new Windows 2000 version of NTFS) file system. You cannot implement EFS on a non-NTFS formatted drive. EFS uses symmetric key encryption and public key technology to provide confidentiality for files. EFS runs as a system service, meaning it is easy to manage, difficult to attack, and transparent to the owner of the file and to applications the user is running. Only the owner of a protected file can access the file, just like a normal document. Other users simply receive an 'Access Denied' message. However, recovery administrators (whom you can designate) have the ability to recover protected files if that becomes necessary. This protects the user in case the user loses their key, or it becomes corrupted in some way. IP Security (IPSec), Layer Two Tunneling Protocol (L2TP), and Point-to-Point Tunneling Protocol (PPTP) are all technologies that incorporate data encryption, but they involve encrypted transmissions, not encrypted files. Windows NT Lan Manager authentication (NTLM) and Kerberos v5 are authentication technologies. They verify a user's identity, but do not encrypt their files.


39. Clint is the network administrator for MegaWallet, Inc., a rapidly expanding financial services company. MegaWallet is headquartered in Muskogee, Oklahoma, and has 58,000 users at that location. It has three regional offices: Bend, Oregon, with 37,000 users; Skeeter Flats, Louisiana, with 8,500 users; and Tundra, Maine, with 14,500 users. Each of these offices is connected to Muskogee by a T1 connection. Bandwidth utilization on all three lines is heavy to very heavy, with the Bend connection consistently running above ninety percent of capacity. MegaWallet operates a single Active Directory Tree, with Muskogee on top and the three regional offices configured as OUs under that. Each satellite office is organized as an OU under the appropriate regional office. Many dynamic events take place at MegaWallet throughout the day, and replication traffic is a significant percentage of the total traffic.
Some administrative control is delegated to the regional offices, but Clint maintains centralized control from Muskogee. He makes extensive use of group policies to help him conform to the many requirements that govern MegaWallet's business. All domain controllers are 500 Mhz quad-processor Pentium III computers with 512 MB RAM. As more users and services are added, the bandwidth problem is exacerbated. The entire network is affected, but symptoms are first felt at the Bend office. The Bend office services approximately 350 satellite offices with 15-25 users per satellite. All computers in the satellite offices are equipped with Windows 2000 Professional. The satellites are connected to the regional offices via 256 kbps WAN links. Users in the satellite offices are starting to complain about long delays during logon.
The Bend office has a Windows 2000 Server configured as a domain controller. Clint must maintain an acceptable level of network performance while continuing to provide the necessary security posture. What strategy should Clint employ to meet his goals?

A. Add domain controllers to the satellite offices to facilitate logging on locally. Adjust the Group Policy slow link settings to set Administrative Templates to OFF.
B. Adjust the Group Policy slow link settings to set Administrative Templates, Folder Redirection, and Internet Explorer Maintenance to OFF.
C. Add an additional domain controller to the Bend office.
D. Disable background refresh of Group Policy.

>> !
Answer: C

Clint's biggest problem is an inadequate number of domain controllers available to facilitate logons. Based on testing, domain controllers configured as in our scenario should be able to handle up to 17,000 interactive user logons within a 10 minute period. In fact, MegaWallet should only need 8 domain controllers in the entire organization. For our scenario, adding an additional domain controller to the Bend office should do the trick. Given the large number of satellite offices (and the associated administrative overhead) it would not be prudent to place domain controllers in each satellite. The increase in replication traffic would more than offset any benefit received. Adjusting the Group Policy slow link settings would be ineffective. The true bottleneck in the system is a shortage of domain controllers. Besides, you are not able to set the 'Administrative Templates' setting to OFF. Unless purposely misconfigured, background refresh of Group Policy should not significantly affect network traffic. By default, this is done every 90 minutes with a randomized offset of up to 30 minutes.


40. Gilderoy is reviewing his company's security baseline information as it applies to file and print servers. Routine print jobs are serviced by the central printer pool. All printers in this pool are grouped into the same OU within Active Directory to facilitate administration and ease of use. This OU is located directly under the root domain. All user accounts are in the root domain. Resources associated with each functional department are located in OUs under the root domain. The Legal department prints to secured printers in a separate OU directly under the Legal OU. All communications with the Legal department server are secure and encrypted using IPSec policies. Printer administration must be organized as follows: -- The Domain Admins group can administer all printers. -- Printing is limited to authenticated users. -- Furthermore, printing to the Legal printers is limited to the Legal department. -- Users are allowed to submit, delete, and purge their own print jobs. -- Printer management may be delegated. -- Printer management for Legal printers may only be delegated to the Legal Admins group. What can Gilderoy do to be in compliance with established guidelines with the least amount of administrative effort?

A. Remove the group Everyone from the ACL of all printers. Add the group Domain Users to the ACL for all printers in the printing pool. Give the group the Print permission. Create a group called Legal Users and add it to the ACL for all Legal printers. Give the group the Print permission. Add one or more users to the Print Operators group. Remove the Print Operators group from all Legal printers. Add the Legal Admins group to all Legal printers. Give the group the Manage Printers permission.
B. Create a group called Legal Users and add it to the ACL for all Legal printers. Give the group the Manage Documents permission. Add one or more users to the Print Operators group. Add the Legal Admins group to all Legal printers. Give the group the Manage Printers permission.
C. Remove the group Everyone from the ACL of all printers. Add the group Power Users to the ACL for all printers in the printing pool. Create a group called Legal Users and add it to the ACL for all Legal printers. Give the group the Print permission. Add one or more users to the Print Operators group. Remove the Print Operators group from all Legal printers. Add the Legal Admins group to all Legal printers. Give the group the Manage Printers permission. Give the CreatorOwner group the Manage Printers permission.
D. Add the group Domain Users to the ACL for all printers in the printing pool. Give the group the Print permission. Create a group called Legal Users and add it to the ACL for all Legal printers. Give the group the Print permission. Add one or more users to the Print Operators group. Remove the Everyone and Print Operators groups from all Legal printers. Add the Legal Admins group to all Legal printers. Give the group the Manage Printers permission.

>> !
Answer: A

Managing printing security can be tricky. Based on our scenario, the correct answer is: 'Remove the group 'Everyone' from the ACL of all printers. Add the group 'Domain Users' to the ACL for all printers in the printing pool. Give the group the 'Print' permission. Create a group called 'Legal Users' and add it to the ACL for all Legal printers. Give the group the 'Print' permission. Add one or more users to the 'Print Operators' group. Remove the 'Print Operators' group from all Legal printers. Add the 'Legal Admins' group to all Legal printers. Give the group the 'Manage Printers' permission.' Let's take it point by point. -- Printing is limited to authenticated users. By default, the 'Everyone' group has the 'Print' permission. We must remove this group from all printer ACLs because it includes all users, not just authenticated users. To solve this, we add the 'Domain Users' group to the printers in the printing pool and assign them the 'Print' permission. -- Furthermore, printing to the Legal printers is limited to the Legal department. For the Legal department, we must create a new group containing just those users, and give them 'Print' permission, also. -- Users are allowed to submit, delete, and purge their own print jobs. By default, any user who creates a print job has membership in the special system group 'CreatorOwner'. Membership is beyond your control, but this group has all the abilities we need by default. There is not usually any reason to change anything associated with the 'CreatorOwner' group. -- Printer management may be delegated. In a domain environment, there is a built-in group called 'Print Operators', and this group is assigned the 'Manage Printers' permission. This is just what we need for the printing pool, but not for the Legal printers. -- Printer management for Legal printers may only be delegated to the 'Legal Admins' group. For the Legal printers, we must restrict delegation of administration to a specific group.
Just remove the 'Print Operators' group from the Legal printers, and add the 'Legal Admins' group instead, assigning them the 'Manage Printers' permission. Now let's examine the incorrect answers: 'Create a group called 'Legal Users' and add it to the ACL for all Legal printers. Give the group the 'Manage Documents' permission. Add one or more users to the 'Print Operators' group. Add the 'Legal Admins' group to all Legal printers. Give the group the 'Manage Printers' permission.' First, this answer does not remove the 'Everyone' group, opening the printers up to unauthenticated users. Second, giving the 'Legal Users' group the 'Manage Documents' permission gives the members of the group undesired access to other users print jobs. Third, by not removing the 'Print Operators' group from the Legal printers, you have extended administrative capabilities beyond the desired group. 'Remove the group 'Everyone' from the ACL of all printers. Add the group 'Power Users' to the ACL for all printers in the printing pool. Create a group called 'Legal Users' and add it to the ACL for all Legal printers. Give the group the 'Print' permission. Add one or more users to the 'Print Operators' group. Remove the 'Print Operators' group from all Legal printers.'
First, domain controllers do not have a 'Power Users' group. On non-domain controllers, this group has the same permissions as the 'Print Operators' group. Second, we have not provided the required administration for the Legal printers. 'Add the group 'Domain Users' to the ACL for all printers in the printing pool. Give the group the 'Print' permission. Create a group called 'Legal Users' and add it to the ACL for all Legal printers. Give the group the 'Print' permission. Add one or more users to the 'Print Operators' group. Remove the 'Everyone' and 'Print Operators' groups from all Legal printers. Add the 'Legal Admins' group to all Legal printers. Give the group the 'Manage Printers' permission.' About the only thing wrong with this answer is that we also need to remove the 'Everyone' group from the printing pool printers to eliminate access by unauthenticated users.


41. Frahnz is the network administrator for a toy manufacturer based in Atlanta. His company, BubbaToys, has three manufacturing facilities located in geographically dispersed regions throughout the southeast United States. These facilities are connected to the home office via 256 kbps dedicated WAN links. BubbaToys has recently entered into a partnership agreement with LederHosen toys in Vienna, in order to expand internationally. LederHosen has several manufacturing plants located throughout Europe; all are connected to the main office in Vienna via an X.25 network. Both companies have standardized on Windows 2000. BubbaToys and LederHosen each have a handful of designated users who require access to both networks. Most of these users are traveling sales representatives who require dial-up access. Frahnz's strategy is to set up a VPN server at each location. Each VPN server will have three interfaces: one connected to the internal network, one set up as an on-demand router-to-router VPN connection (to handle home office to home office traffic), and one exposed to the Internet (to handle dial-up traffic). How should Frahnz protect the Internet interface of the VPN servers from unauthorized users?

A. Ensure there is a routing protocol bound to the interface. Regulate access to the Internet through static routing. Use IPSec filtering to set input and output permit filters for L2TP and IKE. Configure packet filtering in the remote access policy profile for user groups, permitting or denying certain types of IP traffic.
B. Ensure there is no routing protocol bound to the interface. Regulate access to the corporate network through static routing. Use dynamic DNS updates to ensure dial-up clients are properly registered. Configure packet filtering in the remote access policy profile for user groups, permitting or denying certain types of IP traffic.
C. Ensure there is no routing protocol bound to the interface. Regulate access to the Internet through static routing. Use IPSec filtering to set input and output permit filters for L2TP and PPTP. Configure packet filtering in the remote access policy profile for user groups, permitting or denying certain types of IP traffic.
D. Ensure there is no routing protocol bound to the interface. Regulate access to the corporate network through static routing. Use RRAS filters to set input and output permit filters for L2TP and IKE. Configure packet filtering in the remote access policy profile for user groups, permitting or denying certain types of IP traffic.

>> !
Answer: D

Frahnz can protect the Internet-exposed interface on the VPN server from unauthorized users as follows: -- Ensure that there is not a routing protocol on the interface. The corporate network needs to be accessed through static routes. -- Have a routing protocol running on the corporate network interface. -- Use Routing and Remote Access filters (not IPSec filtering) on the Internet interface to set input and output permit filters for Layer Two Tunneling Protocol (L2TP) and the Internet Key Exchange protocol (IKE), prohibiting everything but L2TP over IPSec traffic. Then, configure packet filtering in the remote access policy profile for user groups, permitting or denying certain types of IP traffic. These filters are configured when you use the Routing and Remote Access setup wizard. No configuration by the user is required.
Do not bind a routing protocol to the Internet interface, as this will potentially allow access to internal routers that should not be visible from the Internet. Static routing would not be appropriate for Internet access. A routing protocol is required. Dynamic DNS updates allow for your DNS zone records to be updated dynamically, freeing the administrator from the overhead of trying to manually update DNS records when clients are dynamically assigned IP addresses. This does not protect an Internet-exposed VPN server interface. As stated above, you would use RRAS filters, not IPSec filtering, to secure the interface. Also, you would not be using both L2TP and PPTP. These are different tunneling protocols. L2TP provides higher security, and is the standard for Windows 2000 installations.


42. Gordon is running his Windows 2000 test lab in order to determine appropriate security baseline settings. He is currently testing his IPSec policies to accurately determine what policies and policy structures are actually necessary. Gordon is running normal workloads on applications to gain realistic feedback. During testing, he wants to view the packet contents with Network Monitor. What can Gordon do to accomplish this? (Choose all that apply)

A. Set the security zone level for the intranet zone to Medium.
B. Use the Secure Server (Require Security) template to implement the IPSec policy.
C. Create a custom IPSec policy. From the Security Method tab, select Medium (AH).
D. Use the Server (Request Security) template to implement the IPSec policy.
E. Create a custom IPSec policy. From the Security Method tab, select High (ESP).

>> !
Answer: C & D

Administrators often need to test their IPSec policies to determine what policies are truly necessary. During lab testing of deployment scenarios, it is important to simulate normal traffic as closely as possible to the "real thing" to gain important performance and security feedback. Gordon wants to monitor his IPSec traffic during the tests, and view the packet contents with Network Monitor. To accomplish this, the security method of the policy must be set to Medium security. This setting uses the Authentication Header (AH) protocol, which provides authentication, integrity, and anti-replay for the entire packet (both the IP header and the data payload carried in the packet). Network Monitor can then view the unencrypted payload of the AH packet. The two ways to accomplish this goal are: -- Use the predefined IPSec policy Server (Request Security) -- Create a custom IPSec policy. From the Security Method tab, select 'Medium (AH)'. Using the predefined IPSec policy Secure Server (Require Security) uses Encapsulating Security Payload (ESP) which provides confidentiality (encryption) in addition to the AH services. Creating a custom policy, and setting the Security Method to High (ESP) does the same thing. In both of these situations, Network Monitor would not be able to view the payload because it would be encrypted. The security zone level setting for different browser zones is a security mechanism employed by Microsoft Internet Explorer, and does not relate directly to IPSec policy.


43. Clive manages a rapidly growing network, with users distributed across the globe. Clive is responsible for several Web servers and many secure sites accessible only through Secure Sockets Layer (SSL). These secure sites all have one thing in common: users who access these sites need to gain access to their own personal, confidential information. Clive wants to meet the needs of his expanding population with a minimum of administrative overhead and make the authentication process transparent to authorized users. These users will access the sites using a wide variety of browser products from different vendors. Which methods should Clive employ?

A. Implement certificate-based authentication. Establish one-to-one certificate mapping to specific user accounts through Internet Information Server 5.0.
B. Implement certificate-based authentication. Establish many-to-one certificate mapping to a designated user account created specifically to allow secure access using Internet Information Server 5.0.
C. Incorporate ActiveX technology into Active Server Pages. Using COM, a Microsoft SQL Server database can be queried securely, verifying the user's identity.
D. Implement Kerberos v5 authentication via Smart Cards.

>> !
Answer: A

Traditional methods of remote user authentication have often involved the use of a centralized database to manage users, privileges, and access control. As the network scales and the users become more distributed, this method can become unwieldy and difficult to administer. Creating a public key infrastructure using certificates can help simplify these problems. Certificates have several advantages: -- They can be widely distributeD.- They can be issued by numerous parties -- They can be verified by simply examining the certificate, without having to refer to a centralized database. However, existing operating systems and account-based administration tools do not really know how to use certificates. The solution is to create a mapping between a certificate and a user account. This allows the operating system to continue using accounts while everybody else uses certificates. When a user presents a certificate, the system looks at the mapping to determine which user account should be logged on.
Mapping a certificate to a Windows 2000 user can be done in one of two ways: the mapping can be done either by the Windows 2000 Active Directory service or it can be done by Microsoft Internet Information Services (IIS). The correct approach for Clive would be to use certificates and establish one-to-one mapping through IIS. This would be appropriate since each user must access specific account information. Establishing a many-to-one mapping would not work in our scenario. If you had multiple users who needed secure access to the same information, then this would be viable. Using Smart Cards, while technologically feasible, does not meet our criteria of minimum administrative overhead and transparent user access. The ActiveX solution is wrong for two reasons: ActiveX technology only works with Microsoft browsers, and our scenario specifies browsers from various vendors. Also, we want to get away from validating an expanding user base against a database.


44. Dexter is the network administrator for Widgets International (WI). WI has its main office in Atlanta, with regional offices in San Diego and Pensacola. The regional offices connect to the company intranet via a demand-dial VPN connection. Dexter also has a remote access server in Atlanta to accommodate several dial-in clients. The remote access server, RAS1, and the VPN server, VPN1, are located in Atlanta on the public side of a router, ROUTER1. Dexter wants to handle authentication for VPN1 and RAS1 as efficiently as possible. How should Dexter configure his network to accomplish this goal?

A. Administer the remote access policies for RAS1 and VPN1 separately. Configure RAS1 to use MS-CHAP v2, MS-CHAP, CHAP, and PAP. Configure VPN1 to use Extensible Authentication Protocol (EAP) and Smart Card or other certificate (TLS)
B. Install a firewall, FIREWALL1, on the public side of ROUTER1. Enable PPTP packet filtering on FIREWALL1. Install a proxy, PROXY1, on the private side of ROUTER1. Configure PROXY1 as a Kerberos v5 client. Configure RAS1 to use SSL. Enable MS-CHAP v2, MS-CHAP, CHAP, and PAP on RAS1.
C. Install a Windows 2000 server as a RADIUS server running IAS on the private side of ROUTER1. Call this server IAS1. Copy the remote access policies from VPN1 to IAS1. Add a new remote access policy for dial-up clients on IAS1. RAS1 and VPN1 serve as RADIUS clients. Enable PPTP packet filtering on IAS1 and SSL on RAS1.
D. Install a Windows 2000 server as a RADIUS server running IAS in the DMZ. Call this server IAS1. Copy the remote access policies from VPN1 to IAS1. Add a new remote access policy for dial-up clients on IAS1. RAS1 and VPN1 serve as RADIUS clients.

>> !
Answer: D

In this scenario, it would be both efficient and desirable to handle authentication at one source. Remote Authentication Dial-in User Service (RADIUS) is a client-server protocol, which enables remote access equipment acting as RADIUS clients to submit authentication requests to a RADIUS server. Dexter should install a RADIUS server running Internet Authentication Service (IAS) to handle all external authentication. Place this server on the public side of the router, in the Demilitarized Zone (DMZ). Copy the remote access policies from the VPN server to the IAS server. Since the VPN server will be acting as a RADIUS client, authentication will now take place at the RADIUS server.
Also, configure remote access policy on the RADIUS server to handle authentication requests from the remote access server. You would not want to place your RADIUS server on the private (intranet) side of the router to avoid unauthenticated access to the private network. By authenticating client requests outside the private network, in the DMZ, these issues are eliminated. Installing a firewall and using PPTP packet filtering is an extra security measure, but it does not address the authentication issue. You would not configure a proxy server as a Kerberos client. Kerberos is integrated within Windows 2000, and cannot be configured in this manner. Administering authentication separately does not meet our criteria of the most efficient design.


45. The company has specified that onsite employees must be able to authenticate into the company's main network. Given what you know about the company's requirements for this access, which of the following authentication methods could be specified in your design (Choose all that apply)

[view the scenario]

A. Your design could specify NTLM authentication.
B. Your design could specify Kerberos authentication.
C. Your design could specify SSL encryption in conjunction with Basic Authentication.
D. Your design could specify MS-CHAP authentication.
E. Your design could specify CHAP authentication.
F. Your design could specify PAP authentication.
G. Your design could specify SPAP authentication.
H. Your design could specify MS-CHAPv2 authentication.
I. Your design could specify EAP-TLS authentication.

>> !
Answer: A & C

The onsite employees access the network (get their mail) through the OWA server. No other type of network access is mentioned in the scenario regarding them. OWA is a web based technology. In Windows 2000 there are only a handful of ways to authenticate someone using web based technology. Only two of those methods are mentioned here. One is basic authentication. Basic authentication sends the user's password to the webserver in clear text. Because of this SSL can be used in conjunction with it to encrypt the communication channel and protect the password. NTLM can also be used for authentication. This type of authentication does not require SSL because it automatically protects the user's password during authentication. A third type of authentication, digest, is also possible if the user is accessing OWA with Internet Explorer 5 or later. This type of authentication also protects the user's password.Windows 2000 Help, Search for the articles entitled: Secure Socket Layer/Transport Layer Security (SSL/TLS) authentication.


46. You are the security administrator for your mixed mode Windows 2000 Active Directory domains in the gunderville.com forest. You are reviewing the Event Viewer logs for your IIS servers. Your IIS servers currently reside in your DMZ. You are also reviewing log files on one of the network intrusion detection scanners for the DMZ subnet. Both logs show an increase in ICMP echo packets coming into the DMZ through your Internet Security and Acceleration (ISA) server. Your network response is slowing and you need to act quickly to stop this attack.

What is the correct action to take that will cause you the least amount of administrative effort and not interfere with network access?

A. Change the external IP address of the ISA server.
B. Identify the source IP address and block it.
C. Reboot the ISA Server to break the sessions.
D. Create a packet filter that discards ICMP packets.
E. Create a packet filter that returns the ICMP packets.

>> !
Answer: D

The best action to take that will cause you the least amount of administrative effort and not interfere with network access is to create a packet filter that discards ICMP packets.

[A: This would stop the attack, but it would also prevent incoming connections until DNS could be updated; therefore, it is not the best action.]

[B: This would have limited effect. If this was a distributed denial-of-service attack, it would come from many source IP addresses, not just a single one. Blocking each IP address would require a lot of administrative effort.]

[C: This would not have any effect. The server would come back up and continue to be attacked in this manner.]

[E: There is no way to create a packet filter that returns the ICMP packets. Even if that was possible, this would not be the best action to take because it would only cause more network traffic.]


47. In preparation for a migration from a Windows NT 4.0 network to a Windows 2000 network, Liesl has spent several weeks analyzing key processes. These processes include communications flow, information flow, and the decision-making infrastructure. Currently, there exists a Headquarters domain containing user accounts for the New York office. There are two resource domains containing mostly file and print services in support of the New York staff. These are located in White Plains and Hackensack. The Sales domain is in Philadelphia, and this domain contains user accounts in support of the company's nationwide network of retail stores. Each retail location is set up as a separate resource domain, containing the file and print services needed by the users that work in a given store. Trust relationships exist that allow members of the Sales domain access to resources in the Headquarters domain. The users in Headquarters do not need access to the resources in the Sales domain, nor do they need access to the resources in the retail locations. Administrators in both master user domains need full administrative control over their own resources. Communications between Headquarters and Sales take place over a VPN over the Internet. These communications are secure and encrypted. How should Liesl design her Windows 2000 domain and OU structure to best accommodate the information flow requirements?

A. Create one account domain, migrate the resource domains into OUs under the Headquarters domain.
B. Create two account domains, migrate the resource domains into OUs under the Sales domain.
C. Create two account domains, migrate the existing retail stores resource domains into OUs under Sales, migrate White Plains and Hackensack into OUs under Headquarters.
D. Create two account domains, migrate the existing retail stores resource domains into OUs under Headquarters, migrate White Plains and Hackensack into OUs under Headquarters.

>> !
Answer: C

The basic design process for Windows 2000 domains is different from the design process for Windows NT domains. In Windows NT networks, your domain structure is guided by the relationship between master user domains and resource domains. Your existing Windows NT domain model should not be the basis for your Windows 2000 domains. Instead, you should consider your company’s physical and operational structure, as well as the requirements of your network administrators. One major reason to use multiple Windows 2000 domains is to support decentralized administration. Your company's administrative units may not accept a domain design that gives them limited administrative control over their own resources. This is the case in our scenario, where the resource access limitations are clearly defined. Two account domains is the right choice for Liesl. After you establish the number of domains that is appropriate for your company, you must consider how to organize them into a useful hierarchy. As one of your essential Windows 2000 design tasks, you need to decide whether to arrange your company’s domains into a Tree or a Forest.
Some companies, such as ours, need a single Tree to support their enterprise. All domains forming a Tree or Forest can share their resources globally. After your domain design strategy, you must determine how your company will arrange its organizational units (OUs). Your company can use OUs to organize its resources in a more meaningful hierarchy. OUs form a meaningful structure for the various objects in a domain. Your primary goal in forming this structure is to make your OUs useful for users and administrators. In our scenario, it makes sense to migrate the retail resource domains into OUs under the Sales domain. This allows for efficient administration and ease of use. The same would apply for the New York resource domains. Migrating them into OUs under Headquarters would serve the same purpose. Creating a single account domain would be incorrect for our situation as outlined above. Migrating the resource domains into OUs under the Headquarters domain is an inefficient design. This is appropriate for the White Plains and Hackensack resource domains, but not the retail resource domains. Administration of the retail OUs should fall under Sales, where the resources are managed and controlled. A similar argument exists against migrating all resource domains into OUs under the Sales domain. Migrating the existing retail stores resource domains into OUs is correct, but placing them under the Headquarters domain is not.


48. Gwyneth is the network administrator for SuperDuper Entertainment. She has just migrated to a native-mode Windows 2000 environment. Company headquarters is in Albuquerque, New Mexico with 14 regional distribution centers located throughout the United States and Europe. SuperDuper is organized in a single domain tree structure with superduper.com as the root domain. Below this are OUs for each of the distribution centers. One problem Gwyneth has struggled with is desktop wallpaper. Not everyone is displaying the company-mandated wallpaper on all computers throughout the company's distribution centers. The CEO has pointed out that somebody spent a lot of money coming up with the SuperDuper wallpaper design, and she wants it uniformly applied quickly, efficiently, and with a minimum of administrative overhead. Gwyneth feels pressure to come up with a solution. Can you help her?

A. Create a Group Policy object for each distribution center. Apply Group Policy at the superduper.com domain level.
B. Create a Group Policy object for each distribution center. Apply Group Policy at each distribution center OU.
C. Create a single Group Policy object for all distribution centers. Apply Group Policy at the superduper.com domain level.
D. Create a single Group Policy object for all distribution centers. Apply Group Policy at each distribution center OU.

>> !
Answer: C

There are four places where you can apply Group Policy: the local computer, the site, the domain, and the OU. The local Group Policy object is applied first. Then site-linked policies are applied in administrator-specified order, followed by domain-linked policies, also in specified order. Finally, OU-linked policies, starting at the top of the Active Directory hierarchy and ending with the OU actually containing the user or computer. Help Gwyneth save her job in the following way: create a single Group Policy object for all distribution centers, and apply it at the domain level. A Group Policy object applied to a domain applies to all users and computers in the domain AND, by inheritance, to all users and computers in OUs and generic Active Directory containers farther down the tree. An additional benefit of this approach is ease of maintenance. If the policy needed to be modified, you would only have to go one place to modify it, not 14. Creating a single Group Policy for all distribution centers and applying it at each distribution center is incorrect because it requires Gwyneth to link the policy 14 times instead of just once, greatly increasing the administrative burden. Creating separate Group Policy objects for each distribution center, as suggested in two of the answers, would be incorrect for the same reason -- increased administrative burden.


49. Hogarth is the network administrator for the law firm of Dewey, Cheatham, and Howe. Extremely sensitive data resides on DCH1, a file server in the Current Litigation department. The only people ever authorized to view this data are the three managing partners--each one from a designated workstation in a physically secure space. There must be absolute confidentiality maintained any time these files are transmitted across the LAN. Hogarth has been tasked with developing a solution that addresses this issue. What should be the key element of Hogarth's strategy?

A. EFS
B. Group Policy for shared folders on DCH1
C. IPSec with AH
D. IPSec with ESP

>> !
Answer: D

Confidentiality is the issue, and encryption is the answer. Since the problem involves transmission of data, an Internet Protocol Security (IPSec) policy should be employed. IPSec is the future of secure networking. The two goals of IPSec, packet security and defense against network attacks, are realized through a combination of cryptography-based protection services, security protocols, and dynamic key management. IPSec is an end-to-end security model, meaning that only the computers on the sending and receiving ends of the transmission need to be "IPSec aware." IPSec works equally well in LAN, WAN, and remote access situations. IPSec comes in two flavors -- with or without payload encryption. With encryption, as specified by the particulars of the scenario, is handled by Encapsulating Security Payload (ESP). IPSec with ESP provides confidentiality, authentication, integrity, and anti-replay. Authentication Header (AH) is essentially the same thing, only without the actual data being encrypted. You would use IPSec with AH if you required authentication, integrity, and anti-replay, but not data encryption.
Encrypting File System (EFS) encrypts files and folders on an NTFS file system. This is an incorrect choice because in does not provide for confidentiality while the data is in transit. EFS encrypts the files at the computer. Even though EFS was not the right answer for our scenario, Dewey, Cheatham, and Howe should use EFS for even greater protection. Group Policy allows you to regulate users' access control very effectively, but nothing in Group Policy allows for the encryption of network data.


50. Chuey is using the Windows 2000 IP Security Policy Management snap-in to assist him in setting IPSec policy for his network. Chuey's network is divided into several discrete subnets. Most internal communications require no special security, but any traffic originating from HR1, a server in the Admin department, must be secured. HR1 must block any attempt at insecure communication. John, Human Resources Manager, routinely communicates with HR1. John's workstation is not on the same subnet as HR1, and all traffic between them must route through ROUTER1, a router. Using Windows 2000 predefined IPSec policies as his guideline, how should Chuey configure these computers to meet his security requirements?

A. HR1 -- Secure Server (Require Security); ROUTER1 -- Secure Server (Require Security); John's workstation - Client (Respond Only)
B. HR1 -- Secure Server (Require Security); ROUTER1 -- Server (Request Security); John's workstation - Client (Respond Only)
C. HR1 -- Secure Server (Require Security); ROUTER1 -- Secure Server (Require Security)
D. HR1 -- Secure Server (Require Security); John's workstation - Client (Respond Only)

>> !
Answer: D

Here are the descriptions of the Windows 2000 predefined policies: -- Client (Respond Only) This policy is for computers that normally do not secure communications. This policy enables John's computer to respond to requests for secured communications. It contains a Default Response rule, which enables negotiation with computers requesting IPSec. Only the requested protocol and port traffic for the communication is secured. -- Server (Request Security) This policy is for computers that normally do secure communications, such as servers that transmit sensitive data. This policy enables the computer to accept unsecured traffic, but always requests security from the sender. This policy allows the entire communication to be unsecured if the other computer is not IPSec-enabled, thus violating the rules of our scenario. -- Secure Server (Require Security) This policy is for computers that always require secure communications, such as a server that transmits highly sensitive data. This policy allows unsecured, incoming communications, but always secures outgoing traffic. This is the configuration we need for HR1. IPSec is based on an end-to-end security model, meaning that the only computers that must know about the traffic being secured are the sending and receiving computers. Each handles security at its respective end, assuming the transmission media is inherently insecure. Any computers that only route data from source to destination are not required to support IPSec. In our scenario, ROUTER1 does not need to be configured for IPSec, rendering any answer including ROUTER1 incorrect. Also, one of the questions fails to address a required configuration for John's workstation, which is also incorrect. To recap, HR1 needs Secure Server (Require Security) and John's workstation needs Client (Respond Only).


51. You are the network administrator for your mixed mode Windows 2000 Active Directory domains in the gunderville.com forest. You need to export the Encrypting File System (EFS) certificate for the Domain Recovery Agent for the EFS to decrypt a critical document that was owned and encrypted by an employee who is no longer with the company.

What is the default file extension for exported certificates?

A. CRT
B. KMS
C. REK
D. PFX
E. KEY
F. CER

>> !
Answer: D

The default file extension for certificates and private keys stored in a password-protected file is PFX.


52. Mongo is planning on using Remote Operating System Installation to install Windows 2000 Professional on 500 new PXE-enabled client systems. To provide for additional flexibility and security, Mongo wants to configure one Remote Installation Service (RIS) server (Server1) to answer all client service requests, and four RIS servers (Server2 - Server5) to host the distribution files and actually perform the installations. How should Mongo configure his environment to accomplish this?

A. Prestage all client computers in Active Directory, and configure each one to use a specific RIS server (Server2, Server3, Server4, or Server5). Configure Server1 with the options Respond to Clients Requesting Service and Do Not Respond to Unknown Client Computers selected. Configure the other RIS servers with the option Do Not Respond to Unknown Client Computers selected.
B. Configure each client computer to use Server1 to request installation. Configure Server1 with the options Respond to Clients Requesting Service and Do Not Respond to Unknown Client Computers selected. Configure the other RIS servers with the option Do Not Respond to Unknown Client Computers selected.
C. Prestage all RIS servers in Active Directory. Configure Server1 with the option Respond to Clients Requesting Service selected. Configure the other RIS servers with the option Do Not Respond to Unknown Client Computers selected.
D. Configure each client computer to use a specific RIS server (Server2, Server3, Server4, or Server5) to request installation. Configure Server1 with the option Do Not Respond to Unknown Client Computers selected. Configure the other RIS servers with the options Respond to Clients Requesting Service and Do Not Respond to Unknown Client Computers selected.

>> !
Answer: A

Remote Installation Service (RIS) is an efficient, cost-effective way for administrators to install Windows 2000 Professional on client computers. Using a process known as "prestaging," Active Directory objects representing the client computers are created and configured to request a specific RIS server for installation. When a RIS server receives a request from a client, it checks Active Directory for a match. If a match is found, the specified RIS server is provided to the client, even if it is a different one than answered the initial request. This process is called 'server referral' and gives the administrator the flexibility to control which server provides service to specific clients, regardless of who answered the original request. To allow additional flexibility and security, the prestaging and referral concepts can also be combined with RIS server settings that control how servers respond to clients. Given the scenario, we must "prestage" our clients in Active Directory.
Then we configure the client accounts to request a specific server to download from. We would specify Server2, Server3, Server4, or Server5 because these are the servers that will perform the installations. But we want Server1 to answer all client requests, and refer them to the appropriate server. To accomplish this, we configure Server1 with both options selected. We also configure the other servers with the option 'Do not respond to unknown client computers'. This ensures that Server1 responds to all requests, and also ensures that only prestaged clients are serviced. If the 'Do not respond to unknown client computers' option is not selected for the other RIS servers, they will reply to service requests from nonprestaged clients, offering themselves as the remote boot server. This answer: 'Configure each client computer to use Server1 to request installation. Configure Server1 with the options 'Respond to Clients Requesting Service' and 'Do Not Respond to Unknown Client Computers' selected. Configure the other RIS servers with the option 'Do Not Respond to Unknown Client Computers' selected.' is wrong for two reasons.
First, the clients need to be prestaged in Active Directory. Second, the clients must be configured to request installation from the servers containing the distribution files, not Server 1. This answer: 'Configure each client computer to use a specific RIS server (Server2, Server3, Server4, or Server5) to request installation. Configure Server1 with the option 'Do Not Respond to Unknown Client Computers' selected. Configure the other RIS servers with the options 'Respond to Clients Requesting Service' and 'Do Not Respond to Unknown Client Computers' selected.' is also wrong for two reasons. One, we did not prestage our clients. Two, Server1 needs to be configured with the 'Respond to Clients Requesting Service', not the other RIS servers. You only prestage client computers in Active Directory, not servers.


53. You are the security administrator for your mMixed Mmode Windows 2000 Active Directory domains in the gunderville.com forest. You are reviewing the Eevent vViewer logs for your IIS servers. Your IIS servers currently reside in your DMZ. You are also reviewing log files on and one of the network intrusion detection scanners for the DMZ subnet. and yYou are notice seeing Both logs show an increase in ICMP echo packets coming into the DMZ.

What type of attack is taking place?

A. Smurf
B. Man-in-the-middle Server (Respond Only)
C. Teardrop Client (Respond Only)
D. Buffer Overflow System (Request Security)

>> !
Answer: A

Smurfing, or a Smurf IP attack, is generally considered a DoS attack and is implemented by swamping a network with replies to ICMP echo (PING) requests sent to broadcast addresses. [B: A Manman-in-the-middle attack is performed when an attacker intercepts messages in a public key exchange and then retransmits them, substituting their own public key for the requested one. As far as the two original parties are concerned, they are still communicating directly with each other. The attacker uses a program that makes the server think it's still talking to the client and the client believes it is still talking directly to the server.] [C: Teardrop attacks are IP layer attacks that use fragmentation, where the reassembly of the packet causes the problems that can cause systems to crash, by using a reassembly bug with overlapping fragments.] [D: Buffer Overflow attacks simply send more traffic to a network address than the data buffers for the program or system process can handle.]


54. The company has asked that onsite employees be able to send data in an encrypted form to and from the main company network. Which of the following technologies will your design include to ensure this?

[view the scenario]

A. Your design will include MPPE encryption in conjunction with basic authentication.
B. Your design will include SSL encryption in conjunction with basic authentication.
C. Your design will include PPTP encryption in conjunction with basic authentication.
D. Your design will include IPSec encryption in conjunction with an L2TP VPN.
E. Your design will include the use of Group Policies.
F. Your design will include SSL encryption in conjunction with anonymous authentication.
G. Your design will include SSL encryption in conjunction with strong authentication.
H. Your design will include SSL encryption in conjunction with encrypted authentication.
I. Your design will include SSL encryption in conjunction with SPAP authentication.

>> !
Answer: B

Secure communication requires encryption. The onsite employees in question will be accessing the OWA server. The background information provided by the company makes no mention of them being allowed VPN access to the network. Because of this, only one encryption technology is mentioned that works with web technology based access. SSL is designed to encrypt information between webservers and clients. Of the available answers, only basic authentication is an actual type of authentication possible with Windows 2000 web based technologies. Web services in Windows 2000 are made available through Internet Information Server (IIS) components.Windows 2000 Help, Search for the articles entitled: Secure Socket Layer/Transport Layer Security (SSL/TLS) authentication.IIS 5.0 Documentation: Search for the articles entitled: Enabling and Configuring Authentication About Authentication; and Authentication Overview.


55. Llewellyn manages the company's Web site. The company's top priorities are customer convenience and transaction security. The company's products are available for sale on this site, and a visitor has access to the public features of the site. Once a visitor purchases something, he or she is now considered a customer, giving them access to order status and history information. All information concerning a transaction is stored in a Microsoft SQL Server database, including name, email address, ID, password, order details, and order status. It is critical that unauthorized users are not granted access to private areas of the Web site, yet authorized users must be able to access their own transaction information easily and securely. What should Llewellyn do to enable authentication of visitors to his Web site?

A. Allow a visitor to place an order as a new or existing customer
B. Request ID and password
C. Enable anonymous login
D. Use cookies

>> !
Answer: B

In our scenario, a visitor to the Web site may or may not be an existing customer. Since each customer's data is stored securely in a SQL Server, requesting an ID and password allows a positive way to establish identity. This method requires the visitor to produce credentials to gain secure access. Cookies are stored on the user's computer, and are therefore out of the control of the Web site administrator. Since there is no way to guarantee that the user of the computer containing the cookie is the correct user, this would not do as our authentication method. In a situation where you needed to safeguard a customer's personal data, cookies would not provide you the level of positive identification required. In situations where you want remember preferences to provide a more personalized user experience, cookies give the network administrator a way of shifting the responsibility for remembering this information from the Web site database to the user's own computer.
Anonymous login treats every user in the Solar System as one specific user account in the operating system. Since we do not care who accesses the public areas of the site, but very much care who accesses the private areas, anonymous login would not be an appropriate choice. Allowing a visitor to place an order as a new or existing customer compromises the integrity of your database information. Allowing a single customer to create multiple accounts would negatively impact your primary mission of providing excellent customer service.


56. Clarice administers a Windows NT 4.0 network. She is preparing for a Windows 2000 migration and needs to assess security requirements for application access. Her new domain controllers will receive clean installs, but all other servers will be upgraded to Windows 2000 Server and all workstations will be upgraded to Windows 2000 Professional. Clarice needs to maintain several mission-critical legacy desktop applications that are not Windows 2000-certified. What two actions can Clarice take to enable existing users to run these legacy applications? (Choose all that apply)

A. Add the affected users to the Power Users group
B. Apply the compatibility security template as follows: secedit /configure /cfg compatws.inf /db compatws.sdb
C. Register the legacy applications at (http://www.microsoft.com/windows/compatible/) to enable the applications to run under the User context
D. Instruct the users to run the application as a service under the Local System context
E. Modify the security context on the upgraded workstations to default Windows 2000 security settings as follows: Secedit /configure /cfg basicwk.inf /db basicwk.sdb /log basicwk.log /verbose
F. Modify the security context on the upgraded servers to default Windows 2000 security settings as follows: Secedit /configure /cfg basicsv.inf /db basicsv.sdb /log basicsv.log /verbose

>> !
Answer: A & B

Legacy desktop applications that ran under a User context on Windows NT 4.0 will probably have to run under a Power User context on a Windows 2000-based system. In practice, members of the Users group will not be able to run most legacy applications because most legacy applications were not designed with operating system security in mind. Power Users are ranked between Administrators and Users in terms of system access. The default Windows 2000 security settings for Power Users are backward-compatible with the default security settings for Users in Windows NT 4.0. However, the Power Users group gives users more access than they had under NT 4.0. Specifically, members of this group can install and remove applications per computer that do not install system services, and customize system-wide resources (for example, System Time, Display Settings, Shares, Power Configuration, and Printers).
If you do not want your users to have this additional power, you can apply a security template that exists for just this purpose. The template can be applied to a system using the Security Configuration Toolset using the following syntax: secedit /configure /cfg compatws.inf /db compatws.sdb This has the effect of reducing the security posture of the system somewhat in order to allow the access required by some legacy applications. You can check to see if your applications meet the Windows 2000 criteria, and even find out what you need to do to have your application tested by going to the Web site in one of the answers, but you cannot register your legacy applications there. Running the application as a service is incorrect. Not all applications are designed to run as a service, and members of the Users or Power Users groups cannot install services. Only members of the Administrators group can do this. On machines that are upgraded from a previous operating system version, default Windows 2000 security settings are not applied. The administrator can run the 'secedit' executable to apply the Windows 2000 default security settings after the upgrade has been completed. However, this procedure does not provide the capability required by our scenario.


57. Bob's Discount Feed and Seed Warehouse is headquartered in New York City with four regional distribution centers located throughout the United States. Currently, all processing tasks take place on the mainframe computer in New York. This location has about 250 terminals scattered throughout the facility for access to all data and applications. The regional distribution centers each have 10 terminals connected through dedicated circuits to the mainframe for the purpose of entering sales data and accessing applications.
To improve efficiency, Bob is planning a Windows 2000 rollout throughout the company. All mainframe data will be placed on Windows 2000 servers, and existing applications will be upgraded as necessary to operate in a Windows 2000 environment. Active Directory will be used. Each regional distribution center will become an OU under the Headquarters domain. Through delegation, administration of each distribution center will be handled locally. Four administrative groups will be added to the Headquarters domain, and administrators in each region will be added to the appropriate group; those groups will be assigned appropriate permissions over the respective OUs. Each distribution center will perform all functions associated with supporting their network of retail outlets, including inventory control, sales, and marketing. Headquarters will support and coordinate their efforts. As Bob's Discount Feed and Seed Warehouse transitions to a Windows 2000 infrastructure, how would you describe the existing and the envisioned IT administrative models?

A. Existing -- Centralized/EnvisioneD.- Decentralized
B. Existing -- Decentralized/EnvisioneD.- Centralized
C. Existing -- Centralized/EnvisioneD.- Centralized
D. Existing -- Decentralized/EnvisioneD.- Decentralized

>> !
Answer: C

Any time a mainframe computer provides all processing power, you are constrained to operate within a centralized model. In our scenario, all processing and administration take place in New York, with the distribution centers doing little more than providing input. This is a classic centralized IT model. With the envisioned model, Active Directory provides the ability for higher level administrators to delegate control for specific elements within Active Directory to individuals or groups. This eliminates the need for multiple administrators to have authority over an entire domain. Do not be fooled by the relative autonomy afforded the distribution centers. IT functions remain centralized, while delegating authority to the local level. Neither one of the IT environments is an example of a decentralized model. The existing mainframe processing structure does not support a decentralized model, and the envisioned Windows 2000 model would have to be structured in such a way as to have separate IT departments in the different regions, which we do not have.


58. Margie suspects a virus outbreak on her network is imminent. She wants to protect network integrity and minimize downtime and inconvenience. She elects to modify the audit policy for her domain controllers and all public access servers. She plans on actively monitoring the system log for the next 48 to 72 hours. What events should she incorporate into her audit policy? (Choose all that apply)

A. Write access for program files (.exe and .dll extensions)
B. Process tracking
C. Privilege use
D. Policy change
E. Logon events

>> !
Answer: A & B

You can specify that an audit entry is written to the security event log whenever certain actions are performed or files are accessed. The audit entry shows the action performed, the user who performed it, and the date and time of the action. You can audit both successful and failed attempts at actions, so the audit trail can show who performed actions on the network and who tried to perform actions that are not permitted. You can view the security log in the Event Viewer. For Margie's situation, it would be most useful to track write access for program files and process tracking. She should run any suspect programs, then examine the security log for unexpected attempts to modify program files or create unexpected processes. While performing these audits, she should run them only when actively monitoring the system log, as our scenario specifies. Tracking privilege use would show Margie who was exercising various user rights.
User rights are different from permissions because user rights apply to user accounts and permissions are attached to objects. Examples of privilege use would be loading device drivers or taking ownership of objects. Auditing policy change events would give another indication of a possible misuse of privileges, but would not be useful in tracking a possible virus threat. Tracking logon events are most useful in fighting password attacks. This chart correlates a selection of common threats with the specific auditing events designed to help detect and counteract them: Audit Event Threat Detected Failure audit for logon/logoff. Random password hack Success audit for logon/logoff. Stolen password break-in Success audit for user rights, user and group management, security change policies, restart, shutdown, and system events. Misuse of privileges Success and failure audit for file-access and object-access events. Improper access to sensitive files Success and failure audit for file-access, printers and object-access events. Improper access to printers Success and failure write access auditing for program files (.exe and .dll extensions). Success and failure auditing for process tracking. Virus outbreak.


59. Buffy is the network administrator of her company. The Research department would like Buffy to implement a security policy that would allow for secure communications within the Research department, and both secure and confidential communications between the Research department and the rest of the company. Buffy creates a security policy called Research. How must she now configure the new security policy?

A. Create one negotiation policy, specifying both ESP and AH protocols. Create two IP filters and associate them with the negotiation policy.
B. Create two negotiation policies, one using ESP protocol, and the other using AH protocol. Create four IP filters (two inbound and two outbound) and associate each pair with a negotiation policy.
C. Create one negotiation policy, specifying ANY protocol. Create four IP filters (two inbound and two outbound) and associate each pair with the appropriate protocol, either ESP or AH.
D. Create two negotiation policies, one using ESP protocol, and the other using AH protocol. Create two IP filters and associate each with a negotiation policy.

>> !
Answer: D

This scenario calls for two negotiation policies and two IP filters. One negotiation policy is designed for Research department's internal communications. This one would use a security method of Medium (AH) "Data will be authentic and unmodified, but will not be encrypted." The other negotiation policy would be for external communications, and would use a security method of High (ESP) "Data will be encrypted, authentic and unmodified". Create an IP filter for each negotiation policy. Only one filter for both inbound and outbound communication is required because both the source and destination address information is specified in the filter. When a user in Research sends data, the source and destination addresses are checked against the IP filters in the Research security policy. If there is a match, the associated negotiation policy specifies the level of IP security for the session. When creating negotiation policies, ANY is not listed as one of the protocol choices.


60. Moonbeam has upgraded her network from Windows NT 4.0 to Windows 2000. After the upgrade, all domain controllers are running Windows 2000, but some member servers (application servers) are still running Windows NT 4.0 SP4. These servers are optimized for the applications running on them, and there is no plan to upgrade them. The forest structure for the upgraded network consists of multiple domains located in a single tree. Moonbeam would like her domain controllers to provide pass-through authentication to allow users and computers to be authenticated in any domain in the forest, thus enabling access to any resources for which they have the appropriate permissions. How should Moonbeam proceed?

A. All servers must be upgraded to Windows 2000 before this capability is available.
B. Install Kerberos v5 support on all domain controllers.
C. Take no action. After all domain controllers are upgraded, the switch from mixed-mode to native-mode happens automatically.
D. Manually switch from mixed-mode to native-mode using the Active Directory Domains and Trusts snap-in.

>> !
Answer: D

After you have upgraded all existing Windows NT domain controllers to Windows 2000, you can switch the domain from a mixed-mode to native-mode. The change from mixed-mode to native-mode is manually done by an administrator using the Active Directory Domains and Trusts snap-in. This is the action Moonbeam should take. Be aware that once you switch to native-mode, you cannot go back. This means that you cannot add an NT 4.0 domain controller in the future, although this is does not appear to be an issue in our scenario. In a mixed-mode environment, both Kerberos v5 and NTLM authentication protocols are in use. NTLM is provided for backwards compatibility. Once all domain controllers are running Windows 2000, you can elect to convert to native-mode. It does not happen automatically. The fact that Moonbeam still has member servers running NT 4.0 is of no consequence. Member servers are not involved in the authentication process. Kerberos v5 is integrated into Windows 2000. You cannot install it separately.


61. Raylene is the network administrator for her company. A Windows 2000 Professional workstation is located in the lobby; it is not connected to the company LAN. This computer kiosk allows users to access a company directory and limited information about the company. This kiosk is not Internet-active, nor can it be used to check email. Raylene wants to modify some of the settings to the local Group Policy Object. When she attempts to make the change, she is unable to access the Group Policy Object. Raylene is in the local Administrators group, and she can also log on as Administrator. She also notices that the local Group Policy applies to her when she is logged on as a member of the local Administrators group--even though it is not supposed to. What is the likely cause of Raylene's problem?

A. The Administrators group does not have Read access to the %SystemRoot%\System32\GroupPolicy folder.
B. The Administrative Templates node of the Group Policy snap-in is set to Not Configured.
C. The Administrators group has Read access to the %SystemRoot%\System32\GroupPolicy folder.
D. The Group Policy snap-in has been removed.

>> !
Answer: C

Local Group Policy does not allow you to apply security filters or to have multiple sets of Group Policy objects, unlike Active Directory-based Group Policy objects. You can, however, set Discretionary Access Control Lists (DACLs) on the GroupPolicy folder so that specified groups are either affected or are not affected by the local Group Policy object. This is useful if you have to administer computers that are used in situations such as kiosk environments, where the computer is not connected to a LAN. Local Group Policy object uses the Read attribute, which makes it possible for the local Group Policy object to affect ordinary users but not local administrators. The local administrator can first set the policy settings and then set the DACLs to the local Group Policy object folder so that administrators no longer have Read access. For the administrator to make subsequent changes to the local Group Policy object, he or she must first take ownership of the directory to give him or herself Read access, make the changes, and then remove Read access.
After you make changes to the Group Policy object, remember to remove Read access for the group in which you are a member. If you fail to remove Read access, you may not be able to gain access to the Group Policy object. Therefore, it appears that Raylene has Read access to the GroupPolicy folder. Not having Read access to this folder would have the effect of making you immune to the Group Policy settings contained within -- a good thing for an administrator. Removing the Group Policy snap-in would not be catastrophic. Simply add the snap-in back. The Administrative Templates node of the Group Policy snap-in can be extended by using custom .adm files. However, unlike other Group Policy snap-in extensions, it is not extensible by an MMC snap-in extension. The node itself would not be set to 'Not Configured'. The actual settings listed inside the .adm files would have that setting applied.


62. Rosebud is designing her PKI infrastructure. She is going to create a root certificate authority (CA) and establish several subordinate CAs to allow her to delegate many certificate-related tasks to local administrators. Rosebud has elected to have an isolated, offline root CA for security reasons in order to protect it from possible attacks by hackers or malicious individuals via the network. Given the offline nature of the root CA, what must Rosebud do before allowing issuance of any certificates from the subordinate CAs?

A. Manually publish the certificate revocation list.
B. Specify whether to make each incoming certificate request pending or automatically approved.
C. Ensure that the certification hierarchy does not extend more than ten levels deep.
D. Ensure that the certification hierarchy does not include multiple subordinate CAs in the same branch.

>> !
Answer: A

The Windows 2000 public key infrastructure supports a hierarchical certification authority (CA) trust model, called the certification hierarchy. You can deploy multiple CA hierarchies to meet your needs. The CA at the top of the hierarchy is called a root CA. This is the most trusted CA in your organization, and it is recommended that it have the highest level of security. A root CA may have one or more subordinate CAs. Subordinate CAs can be either an intermediate or an issuing CA. Intermediate CAs can also have subordinate CAs. An intermediate CA issues certificates only to subordinate CAs. An issuing CA issues certificates to users, computers, or services. In theory, there is no limit to the number of levels your certificate hierarchy can have. You might choose, as Rosebud did, to have an isolated, offline root CA for security reasons in order to protect it from possible attacks by hackers or malicious network users.
A major issue with an offline root certification authority is providing certificate verifiers with online certificate revocation checking. The root CA maintains something called the certificate revocation list (CRL). Normally, this list resides at a URL accessible to all users. In our scenario, the root CA is offline, requiring us to change the URL location of the CRL distribution point to a location that is accessible to all users. Rosebud must then physically copy the list from the location on the now isolated root CA (normally '\Systemroot\system32\CertEnroll\CAname.crl') to portable media for further distribution to the new distribution points. If this is not done, certificate revocation checking will fail. Specifying whether or not to make incoming certificate request pending or automatically approved is not directly related to the offline root CA issue. Besides, the default behavior, pending, is suitable for most situations. As stated above, there is no limit to the depth of your hierarchy.


63. Rosalyn has just performed a clean install of Windows 2000 Professional on all computers in her department. Currently, there is no Group Policy object that applies to her computers. As the company-wide Windows 2000 migration process accelerates, this will change. For now, she wants to apply some policies locally. Previously, in the Windows NT 4.0 domain, when a user attempted to logon to one of Rosalyn's machines, the message, "Warning! Access to this workstation limited to authorized Finance Department users. Violators are subject to termination!" used to appear. Rosalyn would like this message to reappear on her 14 workstation computers. What should she do?

A. Open the Group Policy snap-in in MMC and navigate through Local Computer Policy/Computer Configuration/Windows Settings/Security Settings/Account Policies/Security Options/Message text for users attempting to log on. Provide the desired message text. Perform this procedure on all 14 computers.
B. Open the Group Policy snap-in in MMC and navigate through Local Computer Policy/Computer Configuration/Windows Settings/Security Settings/Local Policies/Security Options/Message text for users attempting to log on. Provide the desired message text. Perform this procedure on all 14 computers.
C. Execute poledit.exe from the %systemroot% folder. Edit the .adm file from the %systemroot%\inf folder to add the message text. Perform this procedure on all 14 computers.
D. Open the Group Policy snap-in in MMC and navigate through Local Computer Policy/User Configuration/Windows Settings/Security Settings/Local Policies/Security Options/Message text for users attempting to log on. Provide the desired message text. Perform this procedure on all 14 computers.

>> !
Answer: B In Rosalyn's previous environment, the message was the result of manipulating the Logon Banner setting of NT 4.0 system policy. This capability has been moved in Windows 2000 to the Security Settings node of the Group Policy snap-in to MMC. To find the location to enable this message, navigate through Local Computer Policy/Computer Configuration/Windows Settings/Security Settings/Local Policies/Security Options/Message text for users attempting to log on. The Windows NT 4.0 System Policy Editor, Poledit.exe, is located in the %systemroot% folder. The Windows NT 4.0-style .adm files will be located in the %systemroot%\inf directory (the same location as in Windows NT 4.0). The System Policy Editor user interface is not available in Windows 2000 server. You would use Poledit.exe to create policies for pre-Windows 2000 clients.
This is not applicable in our situation, because all of Rosalyn's computers are running Windows 2000 Professional. The Account Policies section is where you would establish password and account lockout policies. You would not find the message text security option here. Likewise, our subject security option is found under the Computer Configuration hierarchy, not the User Configuration hierarchy. Displaying a message to users as they attempt to logon would be associated with the computer, not with specific user accounts.


64. Alyssa is assigning shared folder permissions to apply security to the folders on her file servers. One of her servers, MARKETING1, contains a FAT volume and an NTFS volume. Alyssa assigns the Change shared folder permission to the group Marketing Users for the Public folder on the FAT volume. She assigns the Read shared folder permission to the group Marketing Users for the MarketResearch folder on the NTFS volume. Joy, a member of the Marketing Users group, can connect to the Public share and can successfully perform all the activities associated with the Change permission. She can also connect to the MarketResearch share, but cannot successfully perform activities associated with the Read permission. What is the most likely reason that Joy is having this problem?

A. Shared folder permissions are sufficient to gain access to files and folders on a FAT volume but not on an NTFS volume.
B. Alyssa has moved the MarketResearch folder to a different location on the volume.
C. Joy is logged on using cached credentials.
D. Alyssa created the MarketResearch shared folder as an Administrative share by mistake.

>> !
Answer: A

Shared folders allow administrators to regulate access to folders over the network. There are three shared folder permissions that can be granted: Read, Change, and Full Control. It is important to note that these settings only apply if the folder is accessed from the network. If the user accesses these folders through another means (like logging on interactively), the permissions are not applied because the user did not go through the share in order to get there. Also, shared folder permissions are the only way to apply any sort of security to a FAT volume. In our scenario, it is most likely that the appropriate NTFS permissions have not been set to allow members of the Marketing Users group access.
As stated in the correct answer, shared folder permissions are sufficient to gain access to files and folders on a FAT volume, but not on an NTFS volume. If you move a shared folder to someplace else, it is no longer shared. However, we know this is not Joy's problem because she is able to attach to the share. If Joy is logged on using cached credentials, this means that a domain controller was not available to service her logon request. This results in her not having access to network resources, which she has in our scenario. Administrative shares are automatically created by Windows 2000, not the administrator. Unless Joy was an administrator, she would not be able to access administrative shares.


65. Bambi is supervising a migration from Windows NT Server 4.0 to Windows 2000. The company headquarters is in Denver, with nine regional distribution centers located throughout North America and Europe. All user accounts are maintained centrally, and various security mechanisms have been employed to ensure that users with access rights to resources in one region do not obtain rights to resources in another region. Servers in the distribution centers need to communicate securely with their outlet locations and with headquarters. Also, each region maintains a Web presence, handling a high volume of Web-based SSL-enabled transactions. Bambi has analyzed these and other factors and must create an efficient, effective forest design. Which security requirement will affect the design of the forest plan?

A. Organization of user accounts
B. Secure communication between servers
C. Secure Web transactions
D. Kerberos v5 authentication services

>> !
Answer: B

There are a couple of areas to keep in mind when you are creating forests and domains in a Windows 2000 environment: replication traffic and resource access. In our scenario, server security requirements have the most direct impact on our forest design. If you have servers that must communicate securely, it is generally advised to place them into their own OU, allowing you to apply the appropriate security policies at the OU level. User accounts are very flexible. You can put users where you want them for administrative purposes. For resource access considerations, use security groups to regulate access.
It does not matter where in the forest you place the security groups, and they can contain users from anywhere in the forest. Secure Web transactions involve Secure Sockets Layer (SSL) technology, and are not really dependent on placement within the forest. Typically, they can be plugged into the Active Directory structure where they are most convenient. Kerberos is the default Windows 2000 authentication mechanism. It will adapt to whatever forest structure you design.


66. Barney is managing certificate services for his department. Barney has installed and configured the certificate hierarchy as follows: -- The enterprise root certificate authority (CA) is maintained offline, and has a certificate end date of March 27, 2010. -- The enterprise subordinate CA has a certificate end date of March 27, 2006. -- The issuing CA has a certificate end date of March 27, 2005. On December 2, 2003, the issuing CA receives a two-year certification request. What is the result of this request?

A. A two year certificate is issued with an end date of December 2, 2005.
B. No certificate is issued.
C. A certificate is issued with a truncated end date of March 27, 2005.
D. A one year certificate is issued with an end date of December 2, 2004.

>> !
Answer: C

Windows 2000 enterprise CAs and stand-alone CAs require nested validity dates for all CA certificates and all issued certificates. No child CA can issue a certificate with a date past the root CA's end date. Also, an issuing CA cannot issue a certificate beyond its own end date. In our scenario, the issuing CA would respond to the two year request by doing the best it can -- issuing a truncated two year certificate with an end date of March 27, 2005. Barney should renew his Windows 2000 CAs with new CA certificates before they are constrained by nested validity dates. To avoid the constraints of nested validity dates, deep certification hierarchies with Windows 2000 Certificate Services might require frequent renewals for issuing CAs. The one year and two year certificate answers are incorrect because they do not reflect certificates services behavior. A certificate will be issued, but in no case will its end date exceed the end date of the issuing CA.


67. Bernardo is the network administrator for an international travel bureau specializing in vacation packages to Cuba, Libya, North Korea, Iran, Iraq, and Syria. The company's headquarters in Miami is connected to the local offices located in each of the destination countries via VPN connections over the Internet. All locations have Windows 2000 Professional installed. Bernardo is implementing IPSec policies for his company's network. To protect the integrity of all transactions, Bernardo has specified 3DES as the encryption algorithm in the IPSec policy to be applied to all computers. Given the status of US export laws, what are the ramifications of this encryption setting?

A. To use 3DES, the North American version of EFS must be installed. Due to export regulations, only the 40-bit version is available outside the United States and Canada. In these situations, 3DES encryption is not available.
B. To use 3DES, the High Encryption Pack must be installed. Due to export regulations, the High Encryption Pack is not available in all countries Bernardo's company services. In those situations, IPSec encryption is not available.
C. To use 3DES, the High Encryption Pack must be installed. Due to export regulations, the High Encryption Pack is not available in all countries that Bernardo's company services. In those situations, the encryption policy is set to DES.
D. To use 3DES, the North American version of EFS must be installed. Due to export regulations, only the 40-bit version is available outside the United States and Canada. The 40-bit version is exportable into the 56-bit North American version.

>> !
Answer: C

The availability of IPSec encryption features in Windows 2000 is subject to United States export regulations, and may also be subject to local and national regulations. IPSec policies allow the choice of a strong encryption algorithm, 3DES, that uses a longer key length than DES for higher security. Windows 2000 computers must have the High Encryption Pack installed to use 3DES. If a computer receives a 3DES setting, but does not have the High Encryption Pack installed, then the 3DES setting in encryption policy is set to the weaker DES. Therefore, the statement in one of the answers that IPSec encryption services are not available without the High Encryption Pack is incorrect. Encrypting File System (EFS) is designed to provide encryption services to files and folders on local computer systems. However, EFS does not fall under IPSec policy restrictions and 3DES is not an algorithm that is available to EFS, rendering both answers that reference EFS incorrect.


68. Boris must implement a procedure to ensure that internal communications between the production server, PRODUCTION1, and the research server, RESEARCH1, are secure and confidential. The data these servers contain is highly sensitive and must not be compromised by unauthorized or malicious network users. Boris's network is a native-mode Windows 2000 environment, with PRODUCTION1 and RESEARCH1 located on geographically separated subnets and a T1 connection linking the routers between the two. Which primary technology must Boris employ?

A. IPSec with ESP
B. IPSec with AH
C. DFS with CryptoAPI (CAPI)
D. EFS with centralized recovery agent

>> !
Answer: A

Boris has two concerns: integrity and encryption. The communications must be secure, meaning they must be verified and unchanged at the destination. Also, they must be confidential (encrypted). The primary technology which assures these requirements will be met is Internet Protocol Security (IPSec). IPSec policies allow secure, end-to-end communications between two computers on an IP network. Optionally, Boris can encrypt his IPSec traffic using Encapsulating Security Payload (ESP). Authentication Header (AH) provides authentication and integrity, but not encryption. Encrypting File System (EFS) provides encryption services for file systems, ensuring only authorized users may access these files. Although EFS is certainly a technology Boris should employ, it is not warranted in our scenario because it does not encrypt transmission of data. Distributed File System (DFS) is a service that combines elements from different file systems into a single, logical tree structure. DFS has no inherent security capabilities, but will incorporate EFS to provide encryption. EFS requires an NTFS partition to work, but DFS does not. However, no file system protection is available on any part of a DFS tree that is located on a FAT volume.


69. Bruce's company is in a partnering relationship with another, much larger company. Bruce needs to set up certificate-based secure email with the partner company. As it happens, the partner company is a certificate authority (CA) and is capable of issuing certificates for server authentication, client authentication, code signing, and secure e-mail. Bruce would like to use their certificates only for secure email. He wants to ensure that any certificates issued for another purpose are not accepted. Bruce's network houses internal CAs installed for other purposes--some on Windows 2000 servers and some on Windows NT 4.0 servers. Bruce's network uses Active Directory. How should Bruce proceed?

A. Bruce should use the enterprise trust policy to create certificate trust lists.
B. Bruce should use the trusted root certification authority policy to distribute the external root certificates.
C. Bruce should use the Using the Advanced Certificate Request Web page at the partner site, and set the following option: -- Under Intended purposes select Email.
D. Bruce should not use the partner's CA due to the increased security risks from the unwanted capabilities the external CA possesses. Bruce should find another external CA that can only issue certificates for secure email.

>> !
Answer: A

A certificate trust list (CTL) allows you to control trust of the purpose and validity period of certificates issued by external CAs. A CA can issue certificates for a wide variety of purposes, such as secure e-mail or client authentication. However, you want to limit the trust of certificates issued by a particular CA, especially if the CA is external. This is where creating a certificate trust list and using it via Group Policy is useful. In our scenario, the external CA is capable of issuing certificates for e-mail, server and client authentication, and code signing. Bruce only wants to trust certificates issued for the purpose of secure e-mail. He can create a certificate trust list and limit the purpose for which he trusts certificates issued by the external CA so that they are only valid for secure e-mail. Any certificates issued for another purpose will not be accepted for use by any computer or user in the scope of the Group Policy object to which the certificate trust list is applied. Trusted root certification authority policy only applies to internal CAs, not external. The 'Using the Advanced Certificate Request' Web page option is limited to internal stand-alone CAs. If the proper guidelines are followed, there should be no reason for Bruce to worry about increased security risks due to unnecessary capabilities of the external CA.


70. Buffy is the network administrator of her company. The Marketing department has special communication needs. Members of the Marketing department require 24/7 Internet access, and their primary communication tool is email, which is only used for routine correspondence. Internally, all data transmitted (excluding email) between the Product Managers and the Department Head must be secure, including data stored on MARKETING1, a file server in the department. Marketing department users access the Internet through a proxy server, PROXY1, which is behind a router, ROUTER1. Mobile users dial in to the network via RRAS, which is running on ROUTER1. ROUTER2 connects Marketing with the company's internal network. What should Buffy do to accommodate the needs of the Marketing department?

A. Install VPN features on ROUTER1. Configure callback security for RRAS to dial a predetermined number. Configure packet filtering on PROXY1 to permit PPTP packets. Implement EFS on MARKETING1. Make recovery keys available to only the Product Managers and the Department Head.
B. Implement EFS on MARKETING1. Make recovery keys available to only the Product Managers and the Department Head.
C. Install VPN features on ROUTER1. Configure callback security for RRAS to dial a predetermined number. Configure packet filtering on PROXY1 to permit PPTP packets.
D. Establish and implement an IPSec policy on MARKETING1 and the workstations belonging to the Product Managers and the Department Head. Include one negotiation policy using AH protocol. Create an IP filter and associate it with the negotiation policy.

>> !
Answer: D

Looking at the requirements of the Marketing department, we see that they require secure internal communications between some key players and their file server. Internet Protocol Security (IPSec) provides our solution. This scenario calls for one negotiation policy and two IP filters. The negotiation policy applies to the designated computers in the Marketing department. It would use a security method of Medium (AH) "Data will be authentic and unmodified, but will not be encrypted." Had we specified confidentiality, we would have needed to use a security method of High (ESP) "Data will be encrypted, authentic and unmodified". Buffy must then create an IP filter for the negotiation policy. Only one filter for both inbound and outbound communication is required if both the source and destination address information is specified in the filter. When one of our designated users sends data, the source and destination addresses are checked against the IP filter in the security policy. If there is a match, the associated negotiation policy specifies the level of IP security for the session. VPN features and RRAS callback security allow us to secure and authenticate communication originating from outside the LAN, which was not specified by our scenario. Plus, this answer did not address secure communication within the LAN, which was specified by our scenario. Encrypting File System (EFS) encrypts file system data, but not data transmissions. You would use IPSec for that, as detailed above.


71. Raoul is planning security for his company's Windows 2000 network. To minimize administrative cost and overhead, Raoul would like to limit his choices to one of the predefined security levels to form the basis of his Internet Protocol Security (IPSec) policy. After analyzing the company's existing organizational policies and infrastructure, Raoul has determined the following:

About 3000 clients access the network via the LAN.
About 150 clients routinely access the network through remote connections.
The majority of client communications do not require security, but some do - including remote client sessions.
Some computers (mostly file servers) contain valuable data that should be transmitted securely.
Bandwidth usage is high and maintaining an optimal level of network performance is critical.

Given these guidelines, what predefined security level best meets Raoul's needs?

A. Standard Security
B. Minimal Security
C. Custom Security
D. High Security

>> !
Answer: A

When you implement IP Security, you must strike a balance between ease of information retrieval for legitimate users, and protecting sensitive information from unauthorized access. To help administrators do just this, three security levels have been defined to provide a general basis for a security plan. These levels are Minimal Security, Standard Security, and High Security. Minimal Security is appropriate where no exchange of sensitive data takes place. In this case, IPSec is not even enabled. Our scenario requires more security than this. Standard Security is based on two predefined IPSec policies: Client (Respond Only) and Server (Request Security). These policies secure necessary data, but do not necessarily provide the highest level of security. This security level best meets the needs of an administrator like Raoul, who needs to balance performance issues with security needs. High Security is based on the Secure Server (Require Security) IPSec policy. This policy includes strong confidentiality and integrity algorithms, Perfect Forward Secrecy, key lifetimes and limits, and strong Diffie-Hellman Groups. Unsecured communication is blocked. This level of security is too restrictive to meet Raoul's needs, and it would impose sufficient administrative overhead to negatively impact network performance. If none of the predefined policies meet your needs, you create your own custom policies. Raoul is free to create custom policies to fine-tune his needs, but, based on the scenario, the Standard Security level does conform to the guidelines presented.


72. Rico is the project lead for his company's new Web-based financial services application. His programming staff has developed several custom ActiveX controls internally for use in the application. After the final QA audit, Rico is prepared to release the application to the Internet. The final step is to digitally sign the ActiveX controls prior to distributing the .cab files. Rico's company is small and relatively new. Which type of certificate authority (CA) should Rico use to digitally sign his ActiveX controls?

A. Commercial CA
B. Enterprise root CA
C. Stand-alone root CA
D. Enterprise subordinate CA

>> !
Answer: A

When you deploy custom code over the Internet, your customers are more likely to trust your active content if it has been digitally signed by a reputable third-party CA. Using commercial CAs also removes the liability faced by your organization when you sign your code internally for external software distribution. If you distribute software on the Internet, you should normally use a commercial CA to issue digital signing certificates to your external software developers. In an internal environment, you should have your code signed by trusted developers. An enterprise CA or a stand-alone CA could provide the digital signature, and you could configure your company's internal Internet Explorer browsers to automatically download the content without any indication to users. An enterprise subordinate CA is simply a member of a certification hierarchy, and would have the same inherent capabilities as the root CA.


73. Roswell Cogs is a manufacturing company. Products are assembled at multiple locations throughout the southeast United States, but they have business offices all over the country. Many product teams require varying levels of access to internal documents and customer records. Additionally, multiple vendors and subcontractors require network access; some access inside the firewall, some external. Network administrators need to apply security constraints based on each team's unique requirements. Currently, Roswell Cogs supports a mixed Windows NT Server 4.0 Service Pack (SP) 4 and UNIX network operating system environment and a mixed Windows 95/98, Windows NT Workstation 4.0, and UNIX client environment. Information technology (IT) is centrally managed with control of applications and resources distributed to lower level IT managers. An upgrade/migration to Windows 2000 is planned for this year. While there are many goals for the move, some of the primary goals include: - Install and support a single client operating system for ease of maintenance and rapid deployment. - Reduce deployment and management costs by using a single server image. - Create a centralized IT administrative model, allowing for distributed control to lower levels. - Provide interoperability with existing UNIX servers and use a common security protocol. Windows 2000 Professional provides the client operating system they need. Also, creating a single Windows 2000 Server image for rapid deployment will address that issue. What Windows 2000 features should be incorporated into the design to address the remaining goals?

A. Active Directory, DNS dynamic update, Kerberos
B. IntelliMirror, Remote Install Services, Systems Management Server
C. Active Directory, DNS, NTLM
D. Active Directory, IPSec, Kerberos

>> !
Answer: A

Active Directory allows administrators to delegate control for specific elements within Active Directory to individuals or groups. This eliminates the need for multiple administrators to have authority over an entire domain. Domain Name System (DNS) dynamic update protocol provides interoperability with existing UNIX servers. Dynamic update enables DNS client computers to register and dynamically update their resource records with a DNS server whenever changes occur. This reduces the need for manual administration of zone records, especially for clients that frequently move or change locations and use DHCP to obtain an IP address. Kerberos security, the default Windows 2000 authentication mechanism, works on both platforms. Kerberos is a multivendor standard, so it allows secure interoperability and the potential for single sign-on between Microsoft implementations and other vendor environments.
The Windows NTLM protocol was the default for authentication in Windows NT 4.0. It is retained in Windows 2000 for compatibility with clients and servers that are running Windows NT version 4.0 and earlier. It is also used to authenticate logons to stand-alone computers that are running Windows 2000. Windows 3.11, 95, 98, or Windows NT 4.0 must use the NTLM protocol for network authentication in Windows 2000 domains. Computers with Windows 2000 use NTLM when they are authenticating to servers that are running Windows NT 4.0 and when they are requesting access to resources in Windows NT 4.0 domains. NTLM is not UNIX-compatible. Domain Name System (DNS) by itself does not provide interoperability with existing UNIX servers. The dynamic update protocol is required. IntelliMirror, Remote Install Services, and Systems Management Server are client management features and automated client install and upgrade technologies. They do not address the requirements of the scenario. Internet Protocol Security (IPSec) is a Windows 2000 implementation allowing secure network communications. There is no UNIX interoperability with IPSec.


74. Ron, the network administrator, manages an Active Directory containing about 15,000 user objects distributed over 5 OUs. Ron has recently been assigned a project that consumes about 30 percent of his time. He, as well as his user population, has noticed that his response time for network support issues has increased, sometimes dramatically. Concerned about the level of service, Ron has analyzed the demands on his time and has discovered that he spends an inordinate amount of time responding to password change requests from users who have forgotten their passwords. Most of the requests come from the Distribution OU, which accounts for about 8000 users. Marlon, a shop supervisor in Distribution, has expressed interest in becoming a network administrator. Ron agrees to give Marlon a trial period as an assistant administrator. Initially, Ron wants to limit Marlon's activities to reading technical materials and responding to password change requests. Ron's first official act is to send email to everyone in the Distribution OU providing Marlon's name and phone extension as the contact point for password change request. What should Ron do next?

A. Create a Dist-Admins group. Delegate permissions for the Dist-Admins group to change properties on the Distribution OU. Add Marlon to the group.
B. Create a Dist-Admins group. Delegate permissions allowing the Dist-Admins group to update the password property on User objects in the Distribution OU. Delegate permissions at the User objects themselves. Add Marlon to the group.
C. Create a Dist-Admins group. Delegate permissions for creating and deleting user objects in the Distribution OU to the Dist-Admins group. Add Marlon to the group.
D. Create a Dist-Admins group. Delegate permissions allowing the Dist-Admins group to update the password property on User objects in the Distribution OU. Delegate permissions at the Distribution OU level. Add Marlon to the group.

>> !
Answer: D

By delegating authority to administer the rights for a container, you can decentralize administrative operations and minimize overhead. This reduces the cost of ownership by distributing administration closer to the resources. You define delegation of responsibility at the level of the organizational unit, or container, where the accounts are created. An organizational unit is the smallest scope or unit to which you can assign Group Policy settings or delegate administrative authority. However, policy settings that are domain-wide and permissions that are defined at higher levels in the directory tree can apply throughout the tree by using inheritance of permissions. You can delegate administration of a domain or organizational unit by using the Delegation of Control wizard available in Active Directory Users and Computers. In Ron's case, he should restrict the delegation of permissions for the Dist-Admins group to updating just the specific property, the password property, of User objects in the OU. This way, Marlon cannot inadvertently apply unsound administrative practices during his apprenticeship. Remember, the OU is the lowest level to which you can delegate authority. This means you cannot delegate authority all the way down to User objects, as suggested by one of the answers. Giving the group permissions to create and delete User objects would give Marlon too much control. Although he can change the password property of any user he creates, he can also perform other, less desirable, activities. Giving the group permissions to change properties of the OU would extend his reach beyond mere User objects.


75. Rufus is the network administrator for ReallySwellSoftware (RSS), an independent software vendor with a facility in Atlanta, Georgia. Rufus also provides tech support for about 50 computers at the facility, as well as answering technical support calls from customers. Rufus is very busy. Rufus's network currently consists of a Windows 2000 Active Directory tree with a single domain. Recently, RSS purchased AlmostAsGoodAsReallySwellSoftware (AAGARSS). Rufus created an OU under RSS for AAGARSS. AAGARSS has a similar setup to RSS, with about 50 users to manage, support calls, and so on. Rufus does not want to drive to Skeeter Flats, Louisiana, every time a user there has a technical support issue. Zlatko, the local administrator in Skeeter Flats, has many of the same job responsibilities as Rufus. Rufus wants Zlatko to handle day-to-day administrative issues for AAGARSS, but Rufus needs to retain centralized control for himself. Due to the competitive job market in the greater Skeeter Flats area, turnover in the IT field is quite high. It is unknown how long Zlatko will remain in his current job. What is the appropriate strategy for Rufus?

A. Add Zlatko to the Power Users group for the AAGARSS OU. Modify the ACL for the AAGARSS OU to include Allow Power Users Full Control of this object and all child objects.
B. Create the AAGARSS-admins group. Put Zlatko in the group. Modify the ACL for the AAGARSS OU to include Allow AAGARSS-admins Full Control of User objects, Allow AAGARSS-admins Full Control of Group objects, and Allow AAGARSS-admins Full Control of Computer objects.
C. Modify the ACL for the AAGARSS OU to include Allow Zlatko Full Control of User objects, Allow Zlatko Full Control of Group objects, and Allow Zlatko Full Control of Computer objects.
D. Create the AAGARSS-admins group. Put Zlatko in the group. Modify the ACL for the AAGARSS OU to include Allow AAGARSS-admins Full Control of this object and all child objects.

>> !
Answer: B

In Windows 2000, a common technique for the delegation of control is to create an OU and assign the appropriate permissions to create or modify objects or attributes of objects. In our scenario, by giving Zlatko (by way of his group membership) Full Control access to User, Group, and Computer objects, he can perform day-to-day administration for his OU, but at the same time, is prohibited from performing other administrative tasks such as creating OUs. It would be incorrect to assign access directly to Zlatko's user object. From our scenario, we know that his tenure at AAGARSS may soon be cut short. This would require Rufus to explicitly remove access from Zlatko and add access to his replacement. To avoid this, use security groups to provide access control. Giving Zlatko Full Control to the OU and all child objects would create the exact situation we are trying to avoid. Zlatko would become master of his OU, violating the concept of centralized control. The Power Users group does not appear by default in the Access Control List (ACL) for the AAGARSS OU. The Power Users group is associated with member servers and workstations and doesn't even appear in the list of available groups at the domain level.


76. Scheherezade is designing her company's Active Directory structure. She has certain sensitive materials and specialized hardware on her network that she wants to effectively "hide" from all but authorized users. She wants to ensure that a casual user will never become aware of their existence. How can Scheherezade accomplish her objective with the least amount of administrative overhead?

A. Create an OU. Move the sensitive objects into the OU. From the Security tab on the OU Properties sheet, remove the existing permissions from the OU and add new permissions as appropriate. In the Advanced dialog box, clear the Inherit permissions from parent check box.
B. Create a separate resource domain and move the sensitive objects to this new domain. Create local groups in the new domain for access control. Add users in the original domain to the appropriate global group and assign that global group to the new local groups.
C. Modify the ACL entries for each of the designated objects to remove the List Contents right from the Everyone group. Then, apply new ACL entries as appropriate.
D. Create a Security Group. Place the sensitive objects into the group. Define a Group Policy to apply to your new group and implement it at the domain level.

>> !
Answer: A

As part of your OU structure plan, you create OU's for three purposes: -- Delegation of authority -- Hiding objects -- Group Policy Even if a user does not have the right to read the attributes of an object, that user can still see that the object exists by viewing the contents of the parent container. The easiest and most efficient way to hide an object or set of objects is to create an OU for those objects and limit the set of users who have the List Contents right for that OU. In this way, you only have one group of ACL settings to manage, whether you need to hide one object or one thousand. You could create a separate resource domain, but there would be significantly more administrative overhead, not to mention additional hardware requirements, to implement that option. You could (eventually) accomplish the same goal by going to each and every object you want to "hide," and individually manipulating their ACLs. In addition, this incorrect response also referenced removing the List Contents right from the Everyone group. List Contents would only apply to container objects. If one of your objects was, say, a server, there would not be a List Contents right. A Security Group is designed to simplify providing access for large numbers of users. Examples of Security Groups include Local groups, Global groups, and Universal groups. You would not be able to place other random types of objects into a Security Group. (Note that List Contents only applies to container objects, not leaf objects.)


77. Sheila is supervising a migration from a predominantly Windows NT 4.0 environment to Windows 2000. The network contains some UNIX elements that will be retained and some Novell NetWare elements that will not. She has a geographically distributed network with 15,000 users. All remote locations are connected via dedicated T1 lines. All mission-critical applications have been identified and will run under Windows 2000. Most of the existing hardware will be upgraded. In only a few cases will new hardware be incorporated. Replacement hardware will be phased in gradually, over a number of years. A prime area of concern with the existing infrastructure concerns logon performance. Currently, it is labor-intensive to manage, difficult to troubleshoot, and inconvenient for users. What should Sheila do to address this performance issue?

A. Increase the number of domain controllers to facilitate user logons.
B. Physically isolate the UNIX elements into separate subnets. Implement Kerberos authentication for the UNIX elements. Continue to use NTLM authentication for the Windows elements for legacy purposes. Establish transitive, two-way trusts between the UNIX elements and the Windows elements.
C. Install a dedicated RADIUS server to handle all authentication traffic transparently.
D. Use Kerberos v5 as the only logon protocol in the enterprise.

>> !
Answer: D

To truly benefit from the performance enhancements available with Kerberos authentication, Kerberos v5 should be the only logon protocol in the enterprise. Windows 2000 implements the IETF standard version of Kerberos v5 authentication protocol for cross-platform interoperability. For example, users on UNIX systems can use Kerberos credentials to log on to UNIX systems and to securely connect to Windows 2000 services for applications that are Kerberos-enabled. Remember, the NetWare elements are not making the move. As described, the proposed network infrastructure can easily support 15,000 users with a single domain controller. Adding additional domain controllers will not significantly enhance logon performance. NTLM authentication is provided for backwards capability for those networks that are communicating with older versions of Windows. In our scenario, we are not retaining any NT boxes, so NTLM is not necessary. In all likelihood, the UNIX servers will be on separate subnets anyway, but this does not directly impact logon performance. A Remote Authentication Dial-in User Service (RADIUS) server performs centralized authentication, authorization, auditing, and accounting (AAAA) of connections for dial-up and virtual private network (VPN) remote access and demand-dial connections. This would not meet the requirements of the scenario.


78. Susie has structured her Active Directory tree with OUs representing each of the first-level departmental areas, such as Admin, HR, and Marketing. In addition to the Domain Admins group, which retains administrative control over the entire organization, local control of each OU will be delegated to local administrators for day-to-day administrative duties. The local administrators will have control only in their own OU. How can Susie most effectively implement this organizational structure?

A. Create an Admins group for each OU. Place one or more existing users into their respective Admins group. Grant permissions to each group.
B. Create a new Administrator account for each OU. Grant permissions to each Administrator account.
C. Create an Admins group for each OU. Add one or more existing users from each OU to each Admins group. Grant permissions to each group.
D. Create one Admins group for all OUs. Place one or more existing users from each OU to the Admins group. Grant permissions to the group.

>> !
Answer: A

In Windows 2000, there are two types of groups: security groups and distribution groups. Security groups are used to collect users, computers and other groups into manageable units. When assigning permissions for resources (file shares, printers, and so on), administrators should assign those permissions to a security group rather than to individual users. Distribution groups are designed to be used strictly for e-mail distribution. For Susie's situation, the appropriate response would be to create an Admins group for each OU. This allows the centralized IT staff to control who can administer each OU. Place designated users into the appropriate groups, and then assign access permissions to the group. This approach meets all of our prerequisites. Local administrators have administrative permissions only in their own OU, while the Domain Admins group (or Enterprise Admins, depending on your Active Directory structure) has administrative oversight over the entire organization. Also, if administrative privileges must be revoked from a particular user, simply remove the user from the Admins group.
Since permissions flow from the group, no ACL changes need to be made at the resource level to accommodate this change. One answer used the same approach, but added users from each OU to each Admins group. The problem here is that an administrator from the Marketing OU would have administrative privileges over the HR OU, and so on. This violates our scenario. Creating a single group in which to house all local administrators would also violate the scenario. Creating a new administrator account for each OU, then granting permissions to each new account would technically work, but this is the LEAST effective way to approach this problem. As stated earlier, it is most effective to create appropriate security groups, add users (and other groups, if necessary) to these groups, then assign permissions to groups.


79. Swanson manages the company's secure Web site. The site is organized by departmental function, with different administrators responsible for their specific area. Company employees require read access to the entire site. Contractors and selected business partners also require access to the site, but only to nonconfidential and selected proprietary information. How should Swanson configure his certificate mapping strategy to accomplish the stated goals with a minimum of administrative overhead?

A. Use one-to-one mapping for each administrator, associating specific privileges and permissions with each unique administrator user account. Use many-to-one mapping to associate all company employees with a specific user account granted Read permission to the site. Use many-to-one mapping to associate designated contractors and business partners with a different user account granted Read permission to only designated areas of the site.
B. Use many-to-one mapping for members of the Web_Admins group, associating them with a specific user account for administrative uses. Use many-to-one mapping to associate all company employees with a specific user account granted Read permission to the site. Use many-to-one mapping to associate designated contractors and business partners with a different user account granted Read permission to only designated areas of the site.
C. Use many-to-one mapping for members of the Web_Admins group, associating them with a specific user account for administrative uses. Use many-to-one mapping to associate all company employees with a specific user account granted Read permission to the site. Use one-to-one mapping to associate specific contractors and business partners with individually designated user accounts granted Read permission to only designated areas of the site.
D. Use one-to-one mapping to associate all company employees with an individual user account granting appropriate permissions to each account. Use many-to-one mapping to associate designated contractors and business partners with a different user account granted Read permission to only designated areas of the site.

>> !
Answer: A

You can map certificates to Windows 2000 user accounts to control access to selected Web resources. Certificate mapping provides for strong security that is based on the Web client ownership of a valid authentication certificate. When certificate mapping is enabled, Internet Information Services (IIS) authenticates users on the basis of mapped certificates, and it grants rights and permissions that are based on the mapped user account. Certificate mapping can be one-to-one or many-to-one. Swanson has three different access scenarios to manage. For the admins, it would be appropriate to apply one-to-one mapping, associating each administrator with a specific user account. This is necessary because the administrators have separate, non-overlapping areas of control. Many-to-one mapping would apply to the company employees. Since all employees require Read access to the site, it is administratively advisable to designate a single user account to match the authorized users to for access permissions. Note that the administrators would gain Read access as well. Each admin would have two certificates.
Since our contractors and business partners are limited to specific areas of the site, it would be advantageous administratively to create a many-to-one map to a different user account, one which only possessed the access required for our scenario. Creating a Web_Admins group probably makes sense from an administrative point of view, but, as far as certificate mapping, the solutions presented are incompatible with our scenario. Using many-to-one mapping to a single account would give each administrator broad control over the entire site. This is the situation we wished to eliminate by stating that each administrator was responsible for only a specific piece of the site. Conversely, using one-to-one mapping for our contractors and business partners would impose an unnecessary administrative burden on poor Swanson. There was no indication that these users had needs different from one another, so there is no reason to create and maintain separate user accounts for them. A single user account would be indicated.


80. Tanisha is considering how to implement VPN features on her network. She has several remote users who must establish VPN connections via an ISP and certain LAN users who must communicate securely with users on a different company LAN. Her requirements include: -- 128-bit encryption capability -- MS-CHAP user authentication -- 128-bit hashing of the encrypted payload -- Packet filtering at the firewall. Which VPN tunneling technology meets Tanisha's requirements?

A. PPTP
B. PPP
C. MPPE
D. L2TP over IPSec

>> !
Answer: D

There are two VPN tunneling technologies: L2TP over IPSec and PPTP. Point-to-Point Protocol (PPP) is a serial-line communication protocol commonly used to establish a dial-up connection with an Internet Service Provider (ISP). Microsoft Point-to-Point Encryption (MPPE) is the encryption engine used with PPTP. PPTP (Point-to-Point Tunneling Protocol) offers user authentication and encryption. L2TP over IPSec offers user authentication, mutual computer authentication, encryption, data authentication, and data integrity. Since Tanisha's requirements include 128-bit hashing, a data integrity feature, L2TP over IPSec is the correct answer for our scenario. Both tunneling methods support 128-bit encryption, Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), and packet filtering.


81. Tara is designing a security plan for her Windows 2000 remote access users. Her network contains highly sensitive information, and all users, even remote users, must use Smart Cards in order to authenticate. Tara's remote access server is in a Windows 2000 native mode domain. What authentication method must Tara select?

A. CHAP
B. PAP
C. SPAP
D. MS-CHAP v2
E. EAP-TLS
F. EAP-MD5 CHAP
G. MS-CHAP

>> !
Answer: E

If you are using smart cards for remote access authentication, you must use the EAP-TLS authentication method. With the Extensible Authentication Protocol (EAP), an arbitrary authentication mechanism validates a remote access connection. The exact authentication scheme to be used is negotiated by the remote access client and the authenticator. EAP in Windows 2000 is a set of internal components that provide architectural support in the form of a plug-in module. For successful authentication, both the remote access client and authenticator must have the same EAP authentication module installed. Windows 2000 provides two EAP types: EAP-MD5 CHAP and EAP-TLS. The components for an EAP type must be installed on every remote access client and every authenticator. EAP-Transport Level Security (EAP-TLS) is an EAP type that is used in certificate-based security environments. EAP-TLS is only supported on a remote access server running Windows 2000 that is a member of a Windows 2000 mixed-mode or native-mode domain. A remote access server running stand-alone Windows 2000 does not support EAP-TLS. EAP-TLS provides the strongest authentication and key exchange method.
The other protocols listed provide authentication services, in decreasing levels of strength. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) is normally used in conjunction with Microsoft Point-to-Point Encryption (MPPE) to encrypt data sent via a PPP or PPTP connection. Windows 2000 adds support for MS-CHAP v2, which addresses some shortcomings in MS-CHAP. Challenge Handshake Authentication Protocol (CHAP) is an industry-standard authentication protocol used by many non-Microsoft clients. Shiva Password Authentication Protocol (SPAP) is a vendor solution for use when connected to Shiva LAN Rover hardware. It is more secure than plaintext, but less secure than CHAP. Finally, Password Authentication Protocol (PAP) uses plaintext passwords, and is the least sophisticated authentication method. Normally, PAP would only be used if the client and the remote access server were unable to negotiate anything better.


82. The Aspen location for the 3D-Graphics unit of the WeBlowStuffUp Game Software company contains two Windows NT 4.0 resource domains - Backgrounds, and Explosions. As part of a planned Windows 2000 upgrade, these domains will be consolidated into the WeBlowStuffUp.com domain. The Backgrounds and Explosions administrators currently use their domains for two main purposes: -- Creating computer accounts for new designers -- Share file system space on Windows NT 4.0 member servers, where access to the file system and shares are controlled by local group membership. Carlotta, the administrator for the 3D-Graphics unit, created the directory structure within Active Directory to reflect the new hierarchy. The Backgrounds and Explosions OUs are peers, each directly below the 3dgraphics OU. Carlotta assigns all subordinate administrators. How should Carlotta structure security so that the administrators for Backgrounds and Explosions can continue to function as they had before, without giving them administrative access to objects outside their span of control?

A. Create the 3d-admins local group in the 3dgraphics OU. Add the administrators for the Backgrounds and Explosions OUs to 3d-admins. In the Backgrounds OU, make two Access Control List entries: Allow 3d-admins Full Control of group objects and Allow 3d-admins Full Control of computer objects. Make similar entries for the Explosions OU.
B. Create the following local groups in the Backgrounds OU: BG-grp-admins and BG-comp-admins. Place the appropriate administrators in the appropriate groups. In the Backgrounds OU, make two Access Control List entries: Allow BG-grp-admins Full Control of group objects and Allow BG-comp-admins Full Control of computer objects. Repeat the process for the Explosions OU.
C. Create the following local groups in the 3dgraphics OU: BG-grp-admins, BG-comp-admins, EX-grp-admins, and EX-comp-admins. Place the appropriate administrators in the appropriate groups. In the Backgrounds OU, make two Access Control List entries: Allow BG-grp-admins Full Control of group objects and Allow BG-comp-admins Full Control of computer objects. Make similar entries for the Explosions OU.
D. Create the following local groups in the 3dgraphics OU: BG-admins and EX-admins. Place the appropriate administrators in the appropriate groups. In the Backgrounds OU, make one Access Control List entries: Allow BG-grp-admins Full Control of this object and all child objects. Make a similar entry for the Explosions OU.

>> !
Answer: C

In Windows 2000, delegation of administration is more powerful and flexible than it was with it's predecessor, Windows NT 4.0. This is achieved through a combination of organizational units, per-attribute access control, and access control inheritance. Administration can be delegated arbitrarily by granting a set of users the ability to create specific objects, or modify attributes of objects. In our scenario, the appropriate choice was for Carlotta to create four groups in the 3dgraphics OU, and make ACL entries in the child OUs limiting the administrators capabilities to full control over groups, and full control over computers. This solution has several advantages. By creating the groups in the 3dgraphics OU, their span of control is limited to OUs in only this portion of the hierarchy. By creating separate groups to administer groups and computers, she is able to exercise a more granular level of control than she would easily be able to otherwise. One example creates just two groups: BG-admins and EX-admins. We've already established that this is not optimal, but let's look at the remainder of the response. It also gives those groups full control over the OU and all child objects. This is the real issue.
In addition to controlling file access with groups and creating computer accounts, these administrators would now be able to create and modify any object at all, including additional OUs. Too much control. One solution was to put all the admins in a group at the 3dgraphics level, then create ACL entries at the child OUs. This would work, but it would allow the Backgrounds admins to make changes to the Explosions OU, and vice versa. This violates our scenario. Creating the admin groups in the child OU violates our scenario also. In our situation, Carlotta makes all the administrator assignments. The guideline is, if the OU is allowed to set its administrative membership, place the OU's admins group into the OU (did you get all that?). If the OU is not allowed to set its own administrative membership, leave the group outside of the OU.


83. Theodore owns a successful franchise consisting of 83 Pizza-In-A-Cup restaurants. Each location manager is responsible for complying with franchise rules, filing and maintaining required paperwork, and managing budgets and marketing collateral. Each location has one or two computers, a fax machine, and other random bits of office equipment. Twice a month, Theodore is inundated with bi-weekly progress reports delivered via FedEx, multiple e-mails, and enormous piles of faxes. Theodore senses that his operation has outgrown the original business model and feels the need for a change. Theodore rents some office space in Kalamazoo and gets down to business. He envisions standardizing all locations on Windows 2000. He will create four regional offices responsible for 20-25 restaurants apiece. He plans a single Windows 2000 domain he will call Headquarters, with four OUs underneath representing the regional offices. Each restaurant will communicate with the regional office via a dial-up connection through the Internet.
The manager of each location will establish an account with a local Internet Service Provider (ISP). Each regional office will communicate with Headquarters via a dedicated WAN link. He hires an IT staff in Kalamazoo and an on-site administrator for each of the regional offices. Most IT functions will remain in Kalamazoo, but he will delegate authority for user and computer maintenance to the on-site administrator in each region. Also, he wants to ensure that the local administrator has no administrative privileges outside of her own region. Given the highly competitive nature of the pizza-in-a-cup industry, Theodore wants to ensure that all data exposed over public communication channels maintain confidentiality and integrity at all times. What type of communication security model should Theodore employ?

A. Establish a VPN connection between the restaurants and the regional offices.
B. Establish a VPN connection between the restaurants and the regional offices. Establish an IPSec policy between the regional offices and Headquarters.
C. Establish an IPSec policy between the restaurants and the regional offices. Secure communications between the regional offices and Headquarters with EFS. Give the unique recovery key to the corresponding regional offices.
D. Establish a VPN connection between the restaurants and the regional offices. Secure communications between the regional offices and Headquarters with EFS. Give the unique recovery key to the corresponding regional offices.

>> !
Answer: A

In our scenario, the only public network is the link between the restaurants and the regional offices. Virtual private networking (VPN) provides a simple answer to the problem of data integrity and confidentiality. A VPN is the extension of a private network that encompasses links over public networks like the Internet. A VPN enables you to send data between two computers in a way that appears to be a point-to-point private link. To emulate a point-to-point link, data is encapsulated, or wrapped, with routing information allowing it to cross the public network to reach its endpoint. The data being sent is encrypted for confidentiality. Packets that are intercepted are unreadable without the encryption keys. The link in which the private data is encapsulated and encrypted is known as a virtual private network (VPN) connection. Internet Protocol security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. IPSec is a key component to an integrated network security solution. Establishing an IPSec policy between the regional offices and Headquarters is an excellent idea, but our scenario specifically required communications security only over public networks, i.e. the Internet. Encrypting File System (EFS) is used to provide security for data on disk, but does nothing to provide communication security.


84. Toshiro is a member of the Administrators group. To guard against improper access to sensitive files, Toshiro wants to establish an audit policy for his local application server. When he uses Windows Explorer to navigate to a folder containing sensitive material, Toshiro navigates to the Auditing tab, but is unable to set auditing options for the folder. What is the likely cause of the problem?

A. He must first enable the Audit Object Access setting in the audit policy.
B. He must first be granted the Manage auditing and security log right in Group Policy.
C. The folder is on a FAT32 volume.
D. He must be a member of the Server Operators group.

>> !
Answer: A

An auditing policy specifies categories of security-related events that you want to track. When Windows 2000 is first installed, auditing is disabled by default. By enabling various auditing event categories, you can implement an auditing policy that suits your security needs. If you choose to audit access to objects as part of your audit policy, you must turn on either the audit directory service access category (for auditing objects on a domain controller), or the audit object access category (for auditing objects on a member server). Once you have turned on the correct object access category, you can use each individual object's Properties to specify whether to audit successes or failures for the permissions granted to each group or user. In our scenario, Toshiro needs to audit file and folder access on his application (member) server.
So, he first needs to enable the Audit Object Access setting. To audit files and folders, you must be logged on as a member of the Administrators group or have been granted the Manage auditing and security log right in Group Policy. Since Toshiro is a member of the Administrators group, he does not need to be assigned the Manage auditing and security log right. There is no requirement that he be in the Server Operators group, especially if he is already in the Administrators group. Files and folders must be on an NTFS volume for auditing to be available. In our scenario, the Auditing tab was visible, clearly indicating that the folder was on an NTFS volume, not a FAT32 volume.


85. What authentication methods will WWCatalog need to use? (Choose all that apply)

A. SSL
B. NTLM
C. Certificate-based
D. Kerberos
E. Digest authentication
F. Smart cards

>> !
Answer: B, C & D

Kerberos will be used on the domain and for Buyers, major vendors, and employees at headquarters in New York. Web customers will use certificate-based authentication, not SSL (Secure Sockets Layer). Layer two protocol was specified in the recent security definition. Smart cards for authentication were not specified in the scenario. NTLM authentication may be needed if vendors are using pre-Windows 2000 machines. NTLM is the default authentication of NT systems. Digest authentication, where two share a secret that does not cross the network because it employs a hash algorithm, is not required. Web customers are using certificates. 4.5.1 Designing a Windows 2000 Security Solution. Design an authentication strategy. Select authentication methods. Methods include certificate-based authentication, Kerberos authentication, clear-text passwords, digest authentication, smart cards, NTLM, RADIUS, and SSL.


86. Zoltan must configure his network to allow the Research department, located in Atlanta, to establish secure communications with the Development department, located in San Diego. Both networks maintain a dedicated WAN connection to the company headquarters intranet located in Denver. Due to the sensitive nature of the material on servers in Research and in Development, this data must not be accessible to users in Denver. How should Zoltan proceed?

A. Connect the two networks over the intranet with a router-to-router virtual private networking (VPN) connection.
B. Schedule all communication between the Research and Development to take place during off-peak hours.
C. Create global groups containing the members of the Research and Development departments. Exclude Denver users from this group. Assign this group Modify permissions to the shared resources on the servers in Atlanta and San Diego.
D. Require Kerberos v5 authentication for all Research and Development users. Require reauthentication prior to each data exchange.

>> !
Answer: A

Zoltan's big problem is allowing Research and Development to communicate securely using the company's intranet as an intermediary. The best choice provided is the one which creates a VPN (Virtual Private Network) connection router-to-router. In this scenario, the two networks are connected to the common intranet with computers that can act as VPN clients or VPN servers. When the VPN connection is established, users on computers on either network can exchange sensitive data across the corporate intranet, exposing only encrypted data to anyone who should attempt a network attack on the transmission. Scheduling communication at only specific times does not address the issue of securing the data. Creating the proper level of access control is necessary, but, again, doesn't address the issue of sending secure communication. Denying access to a given resource doesn't prevent a malicious user from mounting network attacks to attempt to gain access to sensitive data flowing across the intranet. Kerberos authentication is the standard authentication mechanism for Windows 2000. Authentication only proves who you are, it does not provide the encryption services this scenario demands.


87. One of your designs includes a security template recommendation for the MOBWWW server. As you often do in your design documents, you want to include a few bullet points that justify the template. Which three of the following will your design include?

[view the scenario]

A. Your design will include the fact that the Administrator account should be renamed.
B. Your design will include the fact that the NTLM authentication level should be set to LM and NTLM.
C. Your design will include the fact that the NTLM authentication level should be set to NTLM.
D. Your design will include the fact that access to the CD-ROM should be limited only to users that are logged on locally.
E. Your design will include the fact that all website users should be allowed access to the CD-ROM.
F. Your design will include the fact that strong password requirements should be enforced on the system.
G. Your design will include the fact that account lockout should be disabled for the anonymous account.
H. Your design will include the fact that account lockout should be enabled for the anonymous account.
I. Your design will include the fact that the anonymous account password should be changed every 45 days.

>> !
Answer: A, D & F

Because the system is a webserver, it needs to be extra secure. On their website, Microsoft has a series of excellent templates, documents, and tools to use for locking down an IIS server. The most important answers above are ensuring that no one can access the CD-ROM from across the network, requiring strong passwords, and renaming the administrator account. Everyone that works with Windows 2000 knows the name of the administrator account. All they need to do is guess the password to gain full control of the system. Renaming the account makes this process much harder. By requiring stronger passwords, you decrease the likelihood that passwords can be guessed. You also increase the time a dictionary type attack takes as it must go through many more combinations before successfully gaining access. Finally, there is no reason to allow CD-ROM access from across the network. If you accidentally leave a CD in the drive with utilities on it, or someone is able to get their own CD into your system, this can have disastrous consequences.There is no reason to use account lockout with the anonymous account because users are automatically logged in using it if they do not have a valid username and password. Likewise, because it is not necessary to secure the account and users never know the password, there is no reason to require password changes for it.


88. As a seasoned professional, you recognize how important it is to evaluate a company's risk tolerance before preparing a risk assessment document for them. Based on what you have learned about this company, what would you consider their level of risk tolerance to be?

[view the scenario]

A. You would consider the company to be comfortable with a high level of risk.
B. You would consider the company to be conservative and reluctant to take any chances.
C. You would consider the company to be willing to try new approaches for growth.
D. You would consider the company to be willing to risk everything for large rewards.
E. You would consider the company to not be willing to try approaches beyond what they have successfully implemented before.
F. You would consider the company to only be willing to try approaches that it knows have worked for other companies in the past.
G. You would consider the company to prefer to be focused on existing but under performing ideas and on making them successful.

>> !
Answer: C

The company is obviously willing to try new approaches to business, otherwise they would not have attempted to start a new Internet venture. However, they also went about it in a calculating way, keeping it separate from their main company but still very much accountable to it. This suggests that the company is not willing to risk everything for growth. Because of these and other facts learned from discussions with the company, the best answer is that the company is willing to invest in new ideas that allow it to grow.


89. You are the security administrator for your Mixed Mode Windows 2000 Active Directory domains in the gunderville.com forest. The three domains are gunderville.com, northamerica.gunderville.com, and usa.northamerica.gunderville.com. You have responded to a call from the help desk. They have reported that a number of users in usa.northamerica.gunderville.com cannot log on to use their domain accounts. Upon further investigation, you discover that over 25% of the users across the enterprise are locked out and need to be administratively reset. You are convinced that this was a brute force attack on your user account database. To ease the help desk workload on future incidents, you decide to set parameters on the lock out policy so accounts reset after a certain period of time after an attack like this takes place so the help desk does not have to do it manually.

Your primary objective is to perform the necessary changes so that they are universal throughout the enterprise.

Your secondary objectives are to perform this action with the least amount of administrative effort and configure the settings so that accounts will reset themselves after 30 minutes. This allows the users to log on again after the number of bad password attempts has been breached.

You decided to reset your domain policy GPO so that the following settings were configured.

Account Lockout Duration - 0 minutes
Account Lockout Threshold - 5
Reset Account Lockout counter after - 30 Minutes

You then link this policy to usa.northamerica.gunderville.com.

What is the end result of your actions?

A. The primary and both secondary objectives have been satisfied.
B. The primary and one of the secondary objectives has been satisfied.
C. Only the primary objective has been satisfied.
D. Only one of the secondary objectives has been satisfied.
E. None of the objectives has been satisfied.

>> !
Answer: E

Setting the Account Lockout Duration to 0 minutes forces Administrative action, so the secondary objectives have not been met. Also, your primary objective is to perform the necessary changes so that they are universal throughout the enterprise. By linking the policy to usa.northamerica.gunderville.com, you limit the changes to only that domain, not the entire enterprise.


90. Quincy is supervising a Windows 2000 upgrade. After the upgrade, all client workstation computers will be running Windows 2000 Professional. The following Windows NT 4.0 servers will be upgraded to Windows 2000 Server: two file servers; two domain controllers; one remote access server; and, two Exchange 5.5 servers. The Windows NT 4.0 IIS/Outlook Web Access server will NOT be upgraded. Quincy supports six remote branch offices. These users access the company network through the Outlook Web Access server. Anonymous Web surfers also access the Outlook Web Access server in order to post sweepstakes entries into a public folder on one of the Exchange servers. After the upgrade is complete, what authorization method should Quincy configure to enable the branch office users to authenticate with the Outlook Web Access server?

A. NTLM
B. Kerberos
C. Basic (Encrypted Text) with Secure Sockets Layer (SSL)
D. Basic (Clear Text) with Secure Sockets Layer (SSL)

>> !
Answer: D

The Outlook Web Access server can authenticate users with one or more types of security. These choices are: Anonymous, Basic (Clear Text), Basic (Clear Text) over Secure Sockets Layer (SSL), and Windows NT Challenge/Response (NTLM). Of the available choices, Basic (Clear Text) with SSL is correct. Users must provide a valid Windows NT user account name and password to use Outlook Web Access. Both the user name and password are transmitted as encrypted information over the network to the IIS/Outlook Web Access server. This method has several advantages: -- Most browsers support Basic over SSL authentication. -- Users can access all Microsoft Exchange Server resources. -- Basic over SSL authentication is very secure. The other available choice, NTLM, is not correct. NTLM requires all resources the user wants to use reside on the same server as IIS and Outlook Web Access. NTLM authentication is not supported if IIS/Outlook Web Access and Microsoft Exchange Server are located on different computers, as they are in our scenario. Kerberos authentication, while standard with Windows 2000, is not supported with Outlook Web Access. Encrypted text is not one of the modes available through Basic authentication. SSL provides the encryption -- it would not be necessary or desirable to encrypt something that was already encrypted.


91. Rajneesh is the network administrator for an existing Kerberos realm on a UNIX-based system. He is deploying a fleet of Windows 2000 Professional laptops for use by traveling sales representatives. The objective is for the Windows 2000 laptop users to dial in to the company network and authenticate with the existing Kerberos realm in order to provide access to existing Kerberos-enabled applications. Rajneesh does not want to add a Windows 2000 domain into his existing environment. Rajneesh configures the Windows 2000 laptops to authenticate with the non-Windows Key Distribution Center (KDC). This will cause the laptops to request a Ticket Granting Ticket (TGT) and session tickets from the KDC, which they will place in the default credential store. The client can then present credentials to Kerberos-enabled applications in the non-Windows environment. Before Rajneesh is finished, what else must he do to complete the configuration process?

A. Establish a mapping between the user account in the Kerberos realm and a local user on the Windows computer.
B. Create service accounts for all of the UNIX-based services.
C. Establish a one-way trust between the client computers and the Kerberos realm.
D. Establish a Windows 2000 account for each Kerberos principal in the realm.

>> !
Answer: A

Kerberos v5 is a mature, industry-standard authentication solution, providing a high degree of interoperability between Windows 2000 and non-Windows 2000 systems. An individual Kerberos deployment is referred to as a 'realm'. A Kerberos realm is conceptually similar to a Windows domain. In a Kerberos realm, a Key Distribution Center (KDC) provides the authentication services. There are four basic authentication scenarios associated with Kerberos: -- Windows client and Windows KDC -- Windows client and non-Windows KDC -- non-Windows client and Windows KDC and -- non-Windows client and non-Windows KDC
Each of the four authentication scenarios listed above have implementation issues depending on whether you are accessing Windows 2000 resources or non-Windows 2000 resources. In our scenario, Rajneesh has a Windows client/non-Windows KDC environment. Since the principals in the Kerberos realm do not contain the group associations that are used by Windows 2000 for access control, establish a mapping between the user account in the Kerberos realm and a local user account on the Windows computer. Service accounts and one-way trusts are associated with Active Directory and Windows 2000 domains, which are not supported by our scenario. Mapping, as described above, makes it unnecessary to create new Windows 2000 accounts. Mapping allows us to use the existing Windows account as an alias for one or more realm accounts.


92. Raoul is planning security for his company's Windows 2000 network. To minimize administrative cost and overhead, Raoul would like to limit his choices to one of the predefined security levels to form the basis of his IPSec policy. After analyzing the company's existing organizational policies and infrastructure, Raoul has determined the following:
About 3000 clients access the network via the LAN.
About 150 clients routinely access the network through remote connections.
The majority of client communications do not require security, but some do - including remote client sessions.
Some file servers contain valuable data that should be transmitted securely.
Some file servers contain sensitive data that must always be transmitted securely.
Bandwidth usage is high and maintaining an optimal level of network performance is desirable.
Raoul needs to present a report to the Vice President of IT, and he wants to phrase his recommendations in the vocabulary of predefined security levels rather than the actual IPSec policies these security levels represent. On that basis, which predefined security level best meets Raoul's security requirements?

A. Minimal Security
B. Standard Security
C. High Security
D. Custom Security

>> !
Answer: C

When you implement IP Security, you must strike a balance between ease of information retrieval for legitimate users and protecting sensitive information from unauthorized access. To help administrators do just this, three security levels have been defined to provide a general basis for a security plan. These levels are Minimal Security, Standard Security, and High Security. Minimal Security is appropriate where no exchange of sensitive data takes place. In this case, IPSec is not even enabled Our scenario requires more security than this. Standard Security is based on two predefined IPSec policies: Client (Respond Only) and Server (Request Security). These policies secure necessary data, but do not necessarily provide the highest level of security. This security level does not quite meet Raoul's security standards. High Security is based on the Secure Server (Require Security) IPSec policy. This policy includes strong confidentiality and integrity algorithms, Perfect Forward Secrecy, key lifetimes and limits, and strong Diffie-Hellman Groups. Unsecured communication is blocked. This level of security is necessary to meet Raoul's needs. Granted, it would impose additional administrative overhead and may negatively impact network performance, but security is the critical issue in this scenario. If none of the predefined policies meet your needs, you can create your own custom policies. Raoul is free to create custom policies to fine-tune his needs, but based on the scenario, the High Security level conforms to the guidelines presented.


93. Rhiannon is concerned with SNMP security because, under normal circumstances, community names are transmitted in cleartext format creating an unacceptable security risk. She has decided that she wants to protect SNMP messages with IP Security. How should Rhiannon configure her IP Security policy?

A. Edit the appropriate IP filter list. Add two sets of filter specifications, one for typical SNMP traffic, and one for SNMP trap messages. For the first filter, specify a port source and destination address of 161 for TCP and UDP traffic. For the second filter, specify a port source and destination address of 162 for TCP and UDP traffic. Mirror both.
B. Use the Server (Require Security) predefined IPSec policy, which encrypts the SNMP protocol by default.
C. Add a new IP filter list called All SNMP Traffic. From the Filter Properties dialog box, select ANY from the Select a protocol type: drop-down list. Select From any port and To any port in the Set the IP protocol port: section.
D. From the SNMP Service Properties dialog box, select the Security tab. Select the Send authentication trap check box. Select the public community, and change the Community rights: drop-down list to NONE.

>> !
Answer: A

Simple Network Management Protocol (SNMP) service provides the ability to monitor and communicate status information between a variety of hosts. SNMP performs its management services by using a distributed architecture of management systems and agents. Two components are required to use SNMP -- an SNMP management system and an SNMP agent. The SNMP management system can request a variety of information from managed computers (SNMP agents). The SNMP service provides a basic form of security through the use of community names and authentication traps. You can restrict SNMP communications for the agent and allow it to communicate with only a prescribed list of SNMP management systems. To add the security our scenario dictates, you would edit the existing IP Security policy to add two sets of filter specifications to the appropriate IP filter list (normally something like 'All IP Traffic'). For typical SNMP traffic, you would specify port 161 for both TCP and UDP protocols. SNMP uses port 161 for general messages and port 162 for trap messages. The Filter Properties dialog box does not list SNMP as an option in the drop-down list. The SNMP Service Properties dialog box is used to configure the SNMP service, not modify IP Security. IP Security does NOT encrypt the SNMP protocol by default.


94. Windows 2000 supports NTFS, FAT, and FAT32 file systems. In most configurations, NTFS is the best choice from a best practices standpoint as well as a security standpoint.

The Windows 2000 operating system and the NTFS file system provide which of the following features under Windows 2000? Select the three best answers.

A. Security at the file and folder level, which allows you to control access down to the file level.
B. Security at the file and folder level, which allows you to control access down to the Active Directory level.
C. Disk compression, which allows you to compress folders, subfolders, and files to increase the amount of file storage, without slowing down access to the files.
D. Disk compression, which allows you to compress folders, subfolders, and files to increase the amount of file storage, but it does slow down access to the files.
E. Folders, subfolders, and files can be encrypted and decrypted automatically by the operating system by the file owner.
F. Folders, subfolders, and files can be encrypted and decrypted but these acts must be performed individually to access the data for actions such as read or write and the user account used must have Power Users rights or higher to do this.

>> !
Answer: A, D & E

NTFS provides security at the file and folder levels, which allows you to control access down to the file level. When assigning Read-level NTFS access to a user at a folder, this limits his access to files in the folder and subfolders at the Read-level via inheritance.

Windows 2000 supports disk compression, which allows you to compress folders, subfolders, and files to increase the amount of file storage on the hard drive or in certain instances, removable media, but it does cause a system performance degradation that slightly slows down access to the files in most cases.

Windows 2000 supports native encryption, which allows file owners (or those with full control access to the data) to encrypt and decrypt folders, subfolders, and files automatically by the operating system through simply accessing the data. After a file has been encrypted, a user needs only to access it, for example, by opening and editing a document, to decrypt it for use. Closing access to the file encrypts it once again.

[B: There is no way under Windows 2000 to set security at the file and folder levels that allows you to control access down to the Active Directory level because Active Directory is a different part of the Windows 2000 system structure than the file system.]

[C: Windows 2000 supports disk compression, which allows you to compress folders, subfolders, and files to increase the amount of file storage on the hard drive or in certain instances, such as removable media, but it does cause a system performance degradation that slightly slows down access to the files in most cases.]

[F: Native encryption allows all file owners (or those with Full Control access to the data) to encrypt and decrypt folders, subfolders, and files automatically by the operating system through simply accessing the data. After a file has been encrypted, a user needs only to access it, for example, by opening and editing a document, to decrypt it for use. Closing access to the file encrypts it once again.]


95. Access control lists and applicable permissions are applied to limit what users on a given system can and cannot do. These permissions may be set locally on the system or at the domain level.

Where local settings and permissions are considered, which registry key and subkey (where applicable) does the Power Users group have Modify access to, by default, on a clean installation of Windows 2000?

A. HKEY_LOCAL_MACHINE\System
B. HKEY_LOCAL_MACHINE\Hardware
C. HKEY_LOCAL_MACHINE\Security
D. HKEY_CURRENT_USER
E. HKEY_LOCAL_MACHINE\Software

>> !
Answer: E

On a clean installation of Windows 2000 or on an upgrade of a Windows 9x system where NTFS is used and the defltwk.inf template is run, Power Users have Modify access of the HKEY_LOCAL_MACHINE\Software key and subkey in the registry, by default.

[A: Power Users have Read permission on the HKEY_LOCAL_MACHINE\System key and subkey, by default.]

[B: Power users have Read permission through the Everyone group on the HKEY_LOCAL_MACHINE\Hardware key and subkey, by default.]

[C: Power users have no permissions set for the HKEY_LOCAL_MACHINE\Security key and subkey, by default. They are implicitly denied access because no access of any type (allowed or restricted) has been set.]

[D: Power Users have the Full Control permission set for the HKEY_CURRENT_USER key, by default.]


96. What security measures will the IT department have to take for the new (upgraded) Windows 2000 terminal servers in order to manage stringent security for end users? (Choose all that apply)

A. Use only Windows 2000's version of NTFS file system and the Basicsv.inf and Securews.inf security templates.
B. Upgrade to Windows 2000 Advanced server on computers that will be member servers.
C. Manage user rights with Terminal Services Configuration tool by adding them to the Terminal Services User local group.
D. Use the Client Connection Manager to manage what application(s) a group of users is allowed to run.
E. Put the UsrLogon.cmd file in the application's folder on the terminal server.
F. Open port 443 for the RDP connections between client and terminal server.

>> !
Answer: A, B, C & D

Use only Windows 2000's version of NTFS on the upgraded terminal servers. In a multi-user environment, users can see all subdirectories, just like an interactive user on a Windows 9x system. The Basicsv.inf will put the upgraded NT 4.0 servers on a security level with a clean-install Windows 2000 server. Securews.inf security template is for workstations and servers who need incremental security templates for a more security than the basic Windows 2000 security template provides. The Hisecws.inf security template is for workstations and servers that need a highly secure configuration. However, Hisecws.inf can only be used in a native mode and OhJuice's Active Directory is in mixed mode. Avoid putting terminal server on domain controllers. Instead make them member servers. Otherwise, the terminal servers will be adversely affected when user rights policies are configured for the domain controllers of the domain. A terminal services user must have local logon rights to the terminal server that is running in Application Sharing mode. This is done with the Terminal Services Configuration tool.
The Client Connection Manager is used to specify what application(s) a user is allowed to run but does not provide stringent security measures for the servers. It is incorrect to put the UsrLogon.cmd file in the application's folder on the terminal server. The UsrLogon.cmd file is stored in the System 32 directory of the server. This batch file contains the application's scripts. It is incorrect to open the port 443 for RDP connections between client and terminal server. The port to keep open if a firewall is in use is 3389 for RDP connections. The RDP protocol provides users who have been granted access to be a member of the built-in Terminal Services Users local group. It allows them to log on to terminal services. Opening port 443 is necessary on a Proxy Server if the client's browser must pass through a firewall. 1.4 Analyzing Business Requirements. Analyze business and security requirements for the end user.


97. You are a server operator for gunderville.com and northamerica.gunderville.com. A Windows 2000 Web server named WebOne is a member server of northamerica.gunderville.com. A folder on WebOne named D:\HR\Accounting_vacation_requests is shared as AcctVac with default NTFS and share permissions. Users in the domain local group named AcctGrp save vacation requests as Microsoft Word documents to AcctVac by using a mapped drive. You want other users in the domain to be able to view the vacation requests by using the URL://WebOne/Vacation.

What should you do to properly configure the folder for use at the required permission level with the least amount of administrative effort?

A. Rename the folder to D:\HR\Vacation. Modify NTFS permissions for the folder to assign the Everyone group the Allow-Read permission and to assign the AcctGrp group the Allow-Full Control permission.
B. Create a new share named Vacation for the folder. Modify NTFS permissions for the folder to assign the Everyone group the Allow-Read permission and to assign the AcctGrp group the Allow-Full Control permission.
C. Configure the folder as a virtual directory with the alias of Vacation. Assign the Read and the Directory browsing access permissions for the virtual directory.
D. Create a new Web site named Vacation on the WebOne server. Create a virtual directory with the default settings in the new Web site.

>> !
Answer: C

For other users in the domain to be able to view the vacation requests using URL://WebOne/Vacation, you must set up a virtual directory to the network share. The virtual directory should use the alias Vacation. You would also need to configure the appropriate NTFS permission on the folder.

Assigning Read and Directory browsing permissions allows the users read-only access and they would also be able to see contents of the folder.


98. You are the network administrator for gunderville.com and northamerica.gunderville.com. All of the client systems in the enterprise currently run Windows 2000 Professional or Windows XP Professional within this single domain. Some of the installed systems were upgraded from Windows 98 to Windows 2000.

Which security template should you apply to the upgraded Windows 98 clients to ensure that the default Windows 2000 security settings are applied with the least amount of administrative effort?

A. Defltwk.inf
B. Basicwk.inf
C. Compatws.inf
D. Ocfiles.inf
E. You do not have to apply a security template.

>> !
Answer: E

Upgraded Windows 9x systems automatically receive the defltwk.inf. during installation and do not need to have it reapplied.

On Windows 9x systems, you should check that the local users from the Windows 98 system become local Administrators on the upgraded system and, in most cases, would need to make local changes to the account database.

Systems upgraded from Windows NT 4.0 to Windows 2000 maintain the settings as enabled from the Windows NT environment. You can apply the Basic template (basicwk.inf.) so that the default Windows 2000 Server security settings are applied to the upgraded NT 4 server systems. Upgraded Windows 9x systems automatically receive the defltwk.inf, which is the necessary template for this question, during installation.

The Windows NT 4.0 Compatible Security (compatws.inf) template weakens default security installed by defltwk.inf so that applications that do not properly handle the security settings running in the Windows 2000 space can function.

Ocfiles.inf deals with optional component file security on Windows 2000 systems.


99. You are a desktop administrator for gunderville.com. You are reviewing the current service pack and hotfix revision levels on desktop systems on a particular subnet using HFNetChk. You want to enable the tool to check the entire 192 subnet and detail the output information in the following format:

------------------------------------
SERVERBOX (192.168.1.14)
------------------------------------

* WINDOWS 2000 SP3

NoteMS01-022296441 Please refer to Q306460 for a detailed explanation.

NoteMS02-008318202 Please refer to Q306460 for a detailed explanation.

Patch NOT FoundMS02-050329115 File D:\WINNT\system32\cryptdlg.dll has an invalid checksum and its file version is equal to or less than what is expected.

Patch NOT FoundMS02-055323255 File D:\WINNT\system32\itss.dll has an invalid checksum and its file version is equal to or less than what is expected.

NoteMS02-064327522 Please refer to Q306460 for a detailed explanation.


* INTERNET EXPLORER 6 SP1

Patch NOT FoundMS03-004810847 File D:\WINNT\system32\urlmon.dll has an invalid checksum and its file version is equal to or less than what is expected.

You also don't want the output to be displayed on the screen; you want it sent to a file named data.txt.

Which syntax would you use?

A. hfnetchk -v -r 192.168.1.1 -192.168.1.254 -f data.txt
B. hfnetchk -r 192.168.1.1 -192.168.1.254 -f data.txt
C. hfnetchk -v -r 192.168.1.1-192.168.1.254 -s 2 -f data.txt
D. hfnetchk -v -r 192.168.1.1-192.168.1.254 -s 1 -f data.txt
E. hfnetchk -r 192.168.1.1-192.168.1.254 -s 1 -f data.txt

>> !
Answer: A

To check the entire range of machines on the 192 subnet in verbose mode and output the information to a named file, you must use the following switches when running HFNetChk:

-v for verbose
-r for IP address range
-f for the output file

[B: Using this syntax, without including the -v switch, will not generate the file in verbose mode.]

[C & D: Using this syntax does not generate all of the listed messages in the example. The -s switch can suppress Note and Warning messages. The -s 1 switch suppresses Note messages only; the -s 2 switch suppresses both Note and Warning messages. The default is to show all messages.]

[E: The -s 1 switch prevents generation of Note messages. The example shows both Note and Warning messages. Without including the -v switch, the file will not be generated in verbose mode.]


100. You are a desktop administrator for gunderville.com. You are reviewing the current service pack and hotfix revision levels on desktop systems on a particular subnet using the Microsoft Baseline Security Analyzer (MBSA) Version 1.1.

Which of the following services must be installed and enabled on the client systems in order to perform remote MBSA scans? (Choose all that apply)

A. Server service
B. Workstation service
C. TFTP
D. Remote Registry service
E. File & Print Sharing
F. DNS Client

>> !
Answer: A, D & E

The Server service, Remote Registry service, and File & Print Sharing must be installed and enabled to perform remote MBSA scans on systems.

[B: The Workstation service does not influence your ability to perform remote MBSA scans on systems.]

[C: TFTP does not influence your ability to perform remote MBSA scans on systems.]

[F: The DNS Client does not influence your ability to perform remote MBSA scans on systems.]


101. You are the network administrator for your Windows 2000 forest, which consists of a single domain. Client systems in use include Windows 2000 Professional and Windows XP Professional. You have been asked to devise a standard for keeping the systems in the enterprise up to date with the latest critical updates and Security Roll-up patches. Your primary objective is to deploy service packs automatically to clients. Your secondary objective is to deploy Windows Critical Updates, Windows Critical Security Updates, and Security Roll-up patches automatically to clients. You decide to use Microsoft Software Update Services (SUS) on one of the servers on your intranet and Automatic Updates on the clients, to direct them to the internal SUS server.

Which of the following statements is true?

A. The primary and secondary objectives have been satisfied.
B. The primary and one of the secondary objectives have been satisfied.
C. Only the secondary objectives have been satisfied.
D. Only the primary objective has been satisfied.
E. None of the objectives has been satisfied.

>> !
Answer: C

SUS can be used to deploy Windows Critical Updates, Windows Critical Security Updates, and Security Roll-up patches automatically to clients using Automatic Updates. It cannot be used to deploy service packs.

[A & B: SUS can be used to deploy Windows Critical Updates, Windows Critical Security Updates, and Security Roll-up patches automatically to clients using Automatic Updates. It cannot be used to deploy service packs.]

[D: SUS cannot be used to deploy service packs.]

[E: SUS can be used to deploy Windows Critical Updates, Windows Critical Security Updates, and Security Roll-up patches automatically to clients using Automatic Updates.]


102. You are the network administrator for your Windows 2000 forest, which consists of a single domain. Client systems in use include Windows 2000 Professional SP2 and Windows XP Professional SP1. You have been asked to devise a standard for keeping the systems in the enterprise up to date with the latest critical updates and Security Roll-up patches. You install Microsoft Software Update Services (SUS) on one of the servers on your intranet.

What needs to be done on the clients to install the needed Automatic Update component so they can connect to the internal SUS server to receive the updates? (Choose all that apply)

A. The Automatic Update component is already included on the systems running Windows 2000 Professional SP2. Nothing more needs to be done for those computers.
B. The Automatic Update component is already included on the systems running Windows XP Professional SP1. Nothing more needs to be done for those computers.
C. The Automatic Update component needs to be installed on the Windows 2000 Professional SP2 systems by separate download from Microsoft.
D. The Automatic Update component needs to be installed on the Windows XP Professional SP1 systems by separate download from Microsoft.
E. The Automatic Update component needs to be installed on the Windows 2000 Professional SP2 systems from the Windows 2000 Resource Kit - Supplement 1 CD-ROM.
F. The Automatic Update component needs to be installed on the Windows XP Professional SP1 systems from the Windows XP Professional Resource Kit CD-ROM.

>> !
Answer: B & C

The Automatic Update component is included on the systems running Windows 2000 Professional SP3 and Windows XP Professional SP1. Lower versions of those operating systems would need to have the client manually installed on them by downloading it from Microsoft.

[A: The Automatic Update component is included on the systems running Windows 2000 Professional SP3 and Windows XP Professional SP1. Lower versions of those operating systems would need to have the client manually installed on them by downloading it from Microsoft.]

[D: The Automatic Update component is included on the systems running Windows 2000 Professional SP3 and Windows XP Professional SP1.]

[E: The Automatic Update component needs to be installed manually by downloading it from Microsoft. It is not available in the Resource Kit.]

[F: The Automatic Update component is included on systems running Windows XP Professional SP1 and does not need to be installed manually.]


103. You are the Web administrator for the gunderville.com domain. You have been granted Server Operators membership on the IIS systems. Your servers are running Windows 2000 Server, Windows 2000 Advanced Server, and two Windows Server 2003 RC2 test systems. Your environment uses Microsoft Software Update Services (SUS) on your intranet and Automatic Updates on the clients and servers. You have been testing a recently released Critical Security Update in your staging environment. The SUS update for this new Critical Security Update is not yet available on the SUS server because the admin in charge has not yet allowed this to be posted for use in the enterprise. He is aware of the update and has currently held up its release pending your report from deploying it in the staging environment.
You have received the verbal OK to manually download these fixes and install them in the production environment ASAP. The IIS Lockdown tool and URLSCAN has been run on all of the production IIS servers and they are configured to only respond to Web requests-all other traffic is denied by local port blocking. The servers are all in a workgroup and on a secure firewalled subnet (DMZ) with all file and print services disabled. All local hardware and services that are not specifically required to support hosting of the e-business services on the Web servers or Software Update Services have been disabled.

What do you need to do on the systems to get this 3505KB security hotfix installed without compromising the current security settings and that causes the least amount of administrative effort?

A. Change the settings on the SUS server to release the update.
B. Download the update on your laptop and FTP the file to one of the servers in the DMZ.
C. Download the update on your laptop and use a disk-on-key USB Flash Hard Drive to physically transport the hotfix to the servers and run the set up from the USB port.
D. Enable the CD-ROM drives on the servers in question. Download the update on your laptop and burn a CD-ROM with the fix and physically transport the hotfix to the servers and run the set up from the CD-ROM drive.
E. Log on locally to the IIS servers and use Windows Update to pull down the fix.

>> !
Answer: D

All local hardware and services that are not specifically required to support hosting of the e-business services on the Web servers or Software Update Services have been disabled. This includes USB ports, floppy drives, CD-ROM drives, and the like. The only way to get this update on the servers is to enable the CD-ROM drives and install the update. Once finished, the CD-ROM drives could then be disabled again.

[A: This is an option but you cannot perform it. You have delegated Server Operators rights on the IIS systems, not the SUS system; therefore, you cannot log on to the SUS system to perform this action.]

[B: There is no way to FTP into the DMZ. Even if the firewall allowed it, the servers themselves are only responding to Web requests on ports 80 and 443. They don't respond to port 20/21 calls.]

[C: All local hardware and services that are not specifically required to support hosting of the e-business services on the Web servers or Software Update Services have been disabled. This includes USB ports, floppy drives, CD-ROM drives, and the like. Because you have not specified that you would enable the ports beforehand, this update will not be possible.]

[E: There are two things wrong with this option. First, the Web servers cannot go out to the Internet. With all the ports locked, the servers cannot use high ports to allow return connections from the Internet because all local hardware and services that are not specifically required to support hosting of the e-business services on the Web servers or Software Update Services have been disabled. Also, even if for some fluke reason you could establish a connection, the maximum permissions you could log on with would be local Server Operators rights. You would need to log on as a local administrator to apply the Critical Security Update.]


104. You are the network administrator for your company and have been asked to deploy an L2TP/IPSec VPN solution for your company for remote field users. These users currently use laptop systems running Windows NT 4 Workstation, Windows 98, and Windows 2000 Professional. You need to use the most secure policy for your network so that communications are always secure and always available.

Which predefined policy will allow you to secure the network and allow it to properly authenticate all users?

A. Server (Request Security)
B. Server (Respond Only)
C. Client (Respond Only)
D. Secure Server (Require Security)

>> !
Answer: A

The Microsoft L2TP/IPSec VPN Client allows Windows 98, Windows ME, and Windows NT Workstation 4.0 systems to use L2TP/IPSec solutions because they don't come with it by default. The Server (Request Security) policy allows systems to accept unsecured traffic after an attempt to secure additional communications by requesting security from the original sender fails. This is often used in situations where you would like to secure as much data traffic as possible but not deny connection attempts from systems that cannot use IPSec. Because it has not been explicitly stated that the Microsoft L2TP/IPSec VPN Client has been installed on the Windows 98 and NT clients, you should assume that it hasn't and to use the most secure policy for your network so that communications are always secure and always available. Therefore, this is the best answer for this question.

[B: There is no such predefined template as Server (Respond Only).]

[C: Client (Respond Only) is a policy that enables client systems to respond to requests for secured communications and is normally used one way, from the clients, with the Server (Request Security) policy in use on the server side.]

[D: The Secure Server (Require Security) is the most secure default option; however, if the Microsoft L2TP/IPSec VPN Client has not been installed on the Windows 98 and Windows NT clients, they will not be able to properly authenticate, thus threatening the "always available" part of the question.]


105. You are the network administrator for gunderville.com. You have been reviewing authentication encryption solutions for your company for remote field users. These users currently use Windows 2000 Professional clients on laptop systems.

Of the following, which should be used to encrypt authentication? (Choose all that apply)

A. SHA
B. MD5
C. 56-bit DES
D. 40-bit DES
E. 3DES

>> !
Answer: A & B

Secure Hash Algorithm (SHA) is a high-security authentication encryption method that uses a 160-bit key. It cannot be used to encrypt data. Message Digest 5 (MD5) is the standard authentication encryption method that uses a 128-bit key.

[C: 56-bit DES (Data Encryption Standard) uses a single 56-bit key as part of its data encryption process and is often used for smaller security concerns where system overhead is an issue.]

[D: 40-bit DES (Data Encryption Standard) uses a single 40-bit key as part of its data encryption process and is normally only utilized in certain export situations. In addition, the key is no longer considered very secure because of the high processing power of most desktop systems available today.]

[E: 3DES (Data Encryption Standard), most often referred to as Triple DES, uses three 56-bit keys and processes each data block three times, using a unique key each time as part of its data encryption process. It is used often in high security situations.]


106. You are the network administrator for gunderville.com. You have been reviewing data encryption solutions for your company for remote field users. These users currently use laptop systems running Windows NT 4 Workstation, Windows 98, and Windows 2000 Professional.

Of the following solutions, which can be used to provide security for both the IP header and the data payload carried in the packet by digitally signing the packet and encrypting the data as well? The solution requires the least amount of administrative effort.

A. The Microsoft L2TP/IPSec VPN Client is not required. Use AH.
B. Install the Microsoft L2TP/IPSec VPN Client on the required systems and use MD5 encryption.
C. Install the Microsoft L2TP/IPSec VPN Client on the required systems and use 3DES encryption.
D. Install the Microsoft L2TP/IPSec VPN Client on the required systems and use Encapsulating Security Payload (ESP) encryption.
E. The Microsoft L2TP/IPSec VPN Client is not required. Use 3DES encryption.
F. The Microsoft L2TP/IPSec VPN Client is not required. Use Encapsulating Security Payload (ESP) encryption.

>> !
Answer: D

Encapsulating Security Payload (ESP) provides security for both the IP header and the data payload carried in the packet by digitally signing the packet and it does encrypt data; however, it does not normally encrypt the entire packet unless it is being tunneled. Therefore, the IP header is not encrypted. The Microsoft L2TP/IPSec VPN Client would need to be downloaded so that computers running Windows 98, Windows Me, or Windows NT Workstation 4.0 will be able to use IPSec and L2TP.

[A: Authentication Header (AH) provides security for both the IP header and the data payload carried in the packet by digitally signing the packet but it does not provide encryption for the data.]

[B: Message Digest 5 (MD5) is the standard authentication encryption method that uses a 128-bit key. It does not encrypt IP headers and data.]

[C: 3DES (Triple Data Encryption Standard), most often referred to as Triple DES, uses three 56-bit keys and processes each data block three times, using a unique key each time as part of its data encryption process and is often used in high security situations. It does not encrypt IP headers. The Microsoft L2TP/IPSec VPN Client would need to be downloaded so that computers running Windows 98, Windows Me, or Windows NT Workstation 4.0 will be able to use IPSec and Layer Two Tunneling Protocol (L2TP).]

[E: 3DES uses three 56-bit keys and processes each data block three times, using a unique key each time as part of its data encryption process and is often used in high security situations. It does not encrypt IP headers. The Microsoft L2TP/IPSec VPN Client would need to be downloaded so that computers running Windows 98, Windows Me, or Windows NT Workstation 4.0 will be able to use IPSec and L2TP.]

[F: ESP provides security for both the IP header and the data payload carried in the packet by digitally signing the packet and it does encrypt data; however, it does not normally encrypt the entire packet unless it is being tunneled. Therefore, the IP header is not encrypted. The Microsoft L2TP/IPSec VPN Client would need to be downloaded so that computers running Windows 98, Windows Me, or Windows NT Workstation 4.0 will be able to use IPSec and L2TP.]


107. You are the network administrator for your company. You have been reviewing different authentication methods for your company's remote field users. These users currently use laptop systems running Windows 2000 Professional in separate Active Directory forests. The requirements call for strong authentication between hosts via an L2TP/IPSec VPN solution. Which of the following solutions can be used as an authentication method for your enterprise and requires the least amount of administrative effort?

A. Kerberos authentication
B. Public Key authentication
C. Preshared keys
D. ESP
E. 3DES

>> !
Answer: B

Public Key authentication can be used by clients from different Active Directory forests via L2TP/IPSec VPN solutions.

[A: All computers using Kerberos authentication need to be members of the same Active Directory forest.]

[C: Preshared keys can be used, but they have a high administrative overhead and are difficult to use at best. This type of solution is normally used only in very small environments.]

[D: ESP (Encapsulating Security Payload) is not an authentication method. It is used to digitally sign packets and encrypt data.]

[E: 3DES (Data Encryption Standard), most often referred to as Triple DES, uses three 56-bit keys and processes each data block three times, using a unique key each time as part of its data encryption process. It is often used in high security situations and is not an authentication method.]


108. You are troubleshooting your company's current IPSec configuration. You are trying to resolve which filters and authentication protocols are in use for the IPSec Security Association.

Which of the following solutions can be used for this troubleshooting scenario and will require the least amount of administrative effort?

A. PING
B. IPSec Monitor
C. Preshared keys
D. Netdiag
E. Network Monitor (SMS version)

>> !
Answer: D

Netdiag can resolve which filters and authentication protocols are in use for the IPSec Security Association.

[A: PING can be used to verify network connectivity between the two hosts; it cannot be used to resolve which filters and authentication protocols are in use.]

[B: IPSec Monitor can be used to determine whether a Security Association is established between your computer and the target computer. It can also be used to determine which protocol is protected with IPSec. It cannot be used to resolve which filters and authentication protocols are in use.]

[C: Preshared keys can be used to determine whether the filters are working correctly but cannot be used to resolve which filters are used. The keys also cannot show which authentication protocols are in use.]

[E: The SMS version of NETMON can be used to determine whether the ISAKMP process is taking place as well as allow you to look for AH and ESP protocol packets, which would verify if the ISAKMP process was successful. However, it cannot be used to resolve which filters and authentication protocols are in use.]


109. You have been asked to configure your company's wireless network. Recently there has been a change in security standards in your environment. You need to review the Wired Equivalent Privacy (WEP) encryption strength currently in use and identify what WEP can be upgraded to.

According to the current standards, which encryption strengths might be found in use on a WEP wireless network? (Choose all that apply)

A. 40/24 bit encryption
B. 56/24 bit encryption
C. 64/24 bit encryption
D. 104/24 bit encryption
E. 128/24 bit encryption

>> !
Answer: A & D

According to the current standards you can use 64-bit and 128-bit encryption on a wireless solution. They are often referred to as 40 bit and 104 bit, or 40/24 and 104/24, respectively, because the first 24 bits of each WEP key is an Initialization Vector (IV).


110. You have been asked to configure your company's wireless network. There has recently been a change in security standards in your environment and you need to review the Wired Equivalent Privacy (WEP) encryption strength currently in use and find out what WEP can be upgraded to.

Which of the following operating systems support wireless IEEE 802.1X authentication? (Choose all that apply)

A. Windows XP Professional
B. Windows XP Professional with the Microsoft 802.1X Authentication Client add-on installed
C. Windows 2000 Professional
D. Windows 2000 Professional with the Microsoft 802.1X Authentication Client add-on installed

>> !
Answer: A & D

Windows XP Professional natively supports IEEE 802.1X authentication without any additional add-ons. 802.1X Authentication Client add-on installed Windows 2000 Professional does not natively support IEEE 802.1X authentication; the Microsoft 802.1X Authentication Client add-on needs to be downloaded from the Microsoft Web site and installed.

[B: Windows XP Professional natively supports IEEE 802.1X authentication without any additional add-ons.]

[C: Windows 2000 Professional does not natively support IEEE 802.1X authentication; the Microsoft 802.1X Authentication Client add-on needs to be downloaded from the Microsoft Web site and installed.]


111. You are a server administrator for your company, which hosts a mixed mode Windows 2000 Active Directory forest. You have been asked to set up and configure a Certification Authority (CA) in your enterprise. You have decided to set it up as an enterprise subordinate CA.

Which of the following options are required to install the enterprise subordinate CA? (Choose all that apply)

A. WINS
B. DNS
C. Active Directory
D. DHCP

>> !
Answer: B & C

DNS is required to install the enterprise subordinate CA.
Active Directory is required to install the enterprise subordinate CA.

WINS is not required to install the enterprise subordinate CA.
DHCP is not required to install the enterprise subordinate CA.


112. You are a server administrator for your company, which hosts a mixed mode Windows 2000 Active Directory forest. Your clients are running Windows 2000 Professional with a mix of Service Packs 2 and 3, and Windows XP Professional (no Service Pack 1 deployed yet in the enterprise). You have been asked to set up and configure a CA in your enterprise. You need to report to the security manager the different types of Certificate Enrollments that you can use in your environment so he can make a recommendation to the CIO.

What are the different types of Certificate Enrollments you can use? (Choose all that apply)

A. Web-Based Enrollment
B. Automated Enrollment
C. MMC certificate snap-in
D. Group Policy Enrollment

>> !
Answer: A, B & C

Web-Based Enrollment starts when a client submits a certificate via HTTP to Microsoft Certificate Services. The management piece of this is accessed through the Certificate Services Enrollment Page, which is available from the Certificate Services Administrative Tools Web Page, http:///certsrv/ default.asp, where is the name of your certificate server.
The Automated Enrollment process depends on certificate types in use and auto-enrollment objects and is integrated with the Group Policy use. This method allows settings to be defined on a given site, domain, or OU and can be set on the computer or user portion of the policy.
The Microsoft Management console can be used along with the Certificate snap-in as another way to handle Certificate Enrollments in your environment.

[D: There is no such certificate enrollment process. There is the automated enrollment process that depends on certificate types in use and auto-enrollment objects and is integrated with the Group Policy use. This method allows settings to be defined on a given site, domain, or OU and can be set on the computer or user portion of the policy.]


113. You are a server administrator for your company, which hosts a mixed mode Windows 2000 Active Directory forest. Your clients are running Windows 2000 Professional with a mix of Service Packs 2 and 3, and Windows XP Professional (no Service Pack 1 deployed yet in the enterprise). All clients are currently running Outlook 2000 or Outlook XP. You have been asked to set up and configure a Certification Authority in your enterprise. You need to report to the security manager the different types of encryption levels that you can use for e-mail communications so he can make a recommendation to the CIO.

What types of encryption levels can be used for e-mail communications in your environment? (Choose all that apply)

A. RC2
B. SHA
C. DES
D. 3DES

>> !
Answer: A, C & D

Rivest's Cipher v2 (RC2) is a secret-key block encryption algorithm that uses 64-bit input and output blocks. The key size can be varied up to 128 bits in length and is optimized for speed and encrypts messages with less system overhead than DES or 3DES.
Data Encryption Standard (DES) takes 64-bit blocks of plaintext and applies a 56-bit key to each block of plaintext using the recipient's public key. The encrypted package is decrypted by the recipient by using their private key.
3DES, usually refered to as Triple DES, increases the strength of (standard) DES by using an encrypt-decrypt-encrypt process that uses three keys. The 64-bit plaintext message block is first encrypted with the first key, then the encrypted result is decrypted using a second key, and then encrypted using a third key. The resulting encryption strength is 168 bits (3 x 56-bits). This process requires more system overhead than RC2 or DES.

[B: Secure Hash Algorithm (SHA) is a high-security authentication encryption method that uses a 160-bit key. It cannot be used to encrypt data.]


114. Public key cryptography provides privacy through data encryption for e-mail, credit-card numbers sent over the Internet for purchases on e-commerce sites, or for data transfer and other general network traffic. An example is making a purchase on a Web site. The Web site's public keys are "posted" freely, so that customers can make purchases and encrypt their credit card data that is being sent to the e-commerce site.

Who can see this data and how are they able to see it?

A. The end user and the e-commerce site can see it. The end user uses the public key and the e-commerce site uses the private key.
B. The end user and the e-commerce site can see it. The end user uses the public key and the e-commerce site uses the public key.
C. The end user and the e-commerce site can see it by using the public key.
D. The end user and the e-commerce site can see it. The end user uses the private key and the e-commerce site uses the public key.
E. The end user and the e-commerce site can see it by using the private key.

>> !
Answer: A

The private key is kept confidential on the e-commerce site, which uses the private key to view the data sent from the end user who has used the public key. The public key is freely given to all potential correspondents so they can send their credit card data over the Internet in an encrypted format.


115. You are a server administrator for your company, which hosts a mixed mode Windows 2000 Active Directory forest. Your clients are running Windows 2000 Professional with a mix of Service Packs 2 and 3, Windows XP Professional (no Service Pack 1 deployed yet in the enterprise), and a few Windows NT4 workstations with Service Pack 6a. You have been asked to set up and configure the most secure network authentication for your LAN.

Which of the following authentication methods is the most secure and allows all workstations to authenticate users?

A. LAN Manager
B. NTLM version 1
C. NTLM Version 2
D. Kerberos

>> !
Answer: C

NTLM version 2 uses 128-bit encryption, which provides enough security against brute-force attacks to make them impractical. It is the only version of the possible answer choices that allows maximum security and all of the clients to log on.

NTLM version 2 is enabled for Windows NT 4 Service Pack 4 and later and Windows 9x can use it if the Directory Services client is installed.

[A: LAN Manager is not a very secure authentication method and is generally only used when connecting to shares on Windows for Workgroups, Windows 9x, and Windows Me.]

[B: NTLM version 1 was used in versions of Windows NT 4 prior to Service Pack 3 and was replaced with NTLM version 2. NTLM version 1 is more secure than LAN Manager but it is not as secure as other methods listed here.]

[D: Kerberos is the most secure method of all those listed here because clients contact a domain controller to retrieve a session ticket, which they can then use to prove that they can log on throughout the domain. However, Kerberos authentication is restricted to Windows 2000, Windows XP, and Windows Server 2003 systems; therefore, it is an unacceptable choice because there are Windows NT 4 systems in the scenario.]


116. You have been asked to present information on the Windows 2000 Kerberos version 5 protocol and its strengths and weaknesses regarding its interoperability with the MIT Kerberos version 5 implementation.

Which of the following options are true? (Choose all that apply)

A. Hierarchical realm support for cross-platform trust between the Windows 2000 and MIT Kerberos realms is available.
B. You can have transitive trusts between Windows 2000 domains in the domain tree when setting up this type of cross-platform trust.
C. The Windows 2000 Key Distribution Center supports post-dated tickets.
D. Unix clients and servers can use kinit and the DES-CBC-MD5 or DES-CBC-CRC encryption to authenticate to the Windows 2000 Key Distribution Center.

>> !
Answer: B & D

Hierarchical realm support for cross-platform trust between the Windows 2000 and MIT Kerberos realms is not available. However, you can have transitive trusts between Windows 2000 domains in the domain tree.

Unix clients and servers can use this type of authentication encryption.

[A: Hierarchical realm support for cross-platform trust between the Windows 2000 and MIT Kerberos realms is not available. You can have transitive trusts between Windows 2000 domains in the domain tree.]

[C: The Windows 2000 Key Distribution Center does not support post-dated tickets.]


117. You are the network administrator for your Windows 2000 native mode domain, supporting clients running Windows 2000 and Windows XP Professional. You need to set up an IPSec configuration that will allow extranet clients to access systems in your partner intranet. You want wish to set up this configuration up based on the likely likelihoodfact that singular individual users from different companies will need to have access to any one of the allowed systems.

From the following options listed below, choose the best way to set up IPSec as previously described.

A. Transport Modemode
B. Tunnel MmodeServer (Respond Only)
C. Host-to-host (H2H)Client (Respond Only)
D. Host-to-gateway (H2G) System (Request Security)
E. Gateway-to-gateway (G2G) Secure Server (Require Security)

>> !
Answer: A & C

Encapsulating Security Payload (ESP) encrypts packets and can run it tunnel mode where all packets from one specific location (from any client) to another specific location (to any client) are encrypted, regardless of the type (HTTP, FTP, etc). It can also run in transport mode where just that particular type of traffic is encrypted and just between two particular systems.

Host-to-host (H2H) is used between two IPSec IPSec-aware systems and is the best choice for this scenario. The remote client systems may be from any number of different partners and may be to any number of different systems in the extranet.

[B: Encapsulating Security Payload (ESP) encrypts packets and can run it tunnel mode where all packets from one specific location (from any client) to another specific location (to any client) are encrypted, regardless of the type (HTTP, FTP, etc). It can also run in transport mode where just that particular type of traffic is encrypted and just between two particular systems.]

[D: Host-to-gateway (H2G) IPSec configurations provide a secure connection between different hosts and a network gateway to a private network, but it is not a better option than Host-to-host (H2H). If there was only one way into the extranet (through one external point, which might also encompass regular DMZ traffic for instance), it might cause and unnecessary load on network systems.]

[E: A Gateway-to-gateway (G2G) setup allows for secure connections between border gateways to create a secure wide area network (WAN) connection over the Internet. This type of solution is best for two separate locations of the same business who wish to securely use the internet Internet for secure connections, not multiple clients from different companies making connections to an extranet.]


118. You are the administrator of a standalone Windows 2000 Server computer named WebOne. WebOne has IIS installed and is used to host your company's public Internet Web site. The company is developing a new Web site on which business partners can exchange information about customer purchases, order history, and credit card information. You need to ensure that all information transmitted between WebOne and each business partner's computers is encrypted and that only authorized users can access the related sales history.

What is the best way to perform this action with the least amount of administrative effort?

A. Install a Web server certificate and enable Digest authentication and use integrated logon authentication.
B. Install a Web server certificate and enable SSL for the new Web site. Set up user accounts for the specific users that need to log on to review the data.
C. Configure the new Web site to use Integrated Windows authentication.
D. Configure the new Web site folder to enable EFS. Set up user accounts for the specific users that need to log on to review the data.
E. Configure the new Web site folder to use the NTFS security. Set up user accounts to use Integrated Windows authentication.

>> !
Answer: B

SSL encrypts the content and the data. Certificates are required for the server and client's browser to set up an SSL connection over which encrypted information can be sent. The certificate-based SSL features in IIS consist of a server certificate, an optional client certificate, and various digital keys.

Certificates are digital identification documents that allow both servers and clients to authenticate each other. Server certificates usually contain information about your company and the organization that issued the certificate, if it was an external authority.

[A: Digest authentication cannot be easily used (if at all) between partner systems and the standalone Windows 2000 IIS Server. Also, because the server is a stand-alone server, integrated logon would not be available.]

[C: Integrated Windows authentication cannot be easily used (if at all) between partner systems and the stand alone Windows 2000 IIS Server.]

[D: Enabling the Encrypting File System (EFS) is not going ensure that all information transmitted between WebOne and each business partner's computers is encrypted. EFS encrypts local data.]

[E: Configuring the new Web site folder to use the NTFS security is only going to allow you to set the proper permission levels on files and folders; it will do nothing to ensure that all information transmitted between WebOne and each business partner's computers is encrypted.]


119. You are a server administrator for your company, which hosts a mixed mode Windows 2000 Active Directory forest. Your clients are running Windows 2000 Professional with a mix of Service Packs 2 and 3, Windows XP Professional (no Service Pack 1 deployed yet in the enterprise), and a few Windows 98 and Window NT 4 workstations with Service Pack 6a. The Windows 98 and Windows NT 4 systems have the Active Directory Client installed. You have been asked to set up and configure secured remote access for your LAN. Which of the following authentication methods is the most secure, allows all workstations to authenticate users, and secures the passwords from being sent in clear text?

A. PAP
B. SPAP
C. CHAP
D. MS-CHAP v1
E. MS-CHAP v2
F. EAP

>> !
Answer: D

The Microsoft Challenge Handshake Authentication Protocol version 1 (MS-CHAP v1) works a lot like CHAP does because the server sends a challenge to the remote client that consists of a session ID and an arbitrary challenge string. The remote client must return the user name and a Message Digest 4 (MD4) hash of the challenge string, the session ID, and the MD4-hashed password.

MS-CHAP v1 only requires the MD4 hash of the password to validate the challenge response. It does not need it available in plaintext as in CHAP. In Windows 2000, user passwords are stored as an MD4 hash and in a reversibly encrypted form. When CHAP is used, the remote access server decrypts the reversibly encrypted password to validate the remote access client's response.

Because there are Windows 98 systems on the network, other, higher functioning authentication protocols cannot be used; therefore, this answer is correct.

[A: Password Authentication Protocol (PAP) sends passwords as clear text and offers no security at all.]

[B: Shiva Password Authentication Protocol (SPAP) is a hardware solution, now owned by Intel, used to support Shiva LAN Rover devices. It supports some encryption of passwords; however, it is vulnerable to replay attacks (where hackers capture encrypted passwords and re-use them in encrypted form) and limited to use in the supported hardware.]

[C: Challenge Handshake Authentication Protocol (CHAP) uses the Message Digest 5 (MD5) one-way encryption scheme to hash the response to a challenge issued by the remote access server to allow authentication with encrypted passwords. The destination server sends a challenge to the client, and the client uses the data from the challenge to calculate a one-way encrypted value, or hash, from the user name and password that can be used to authenticate the user without sending the actual password across the network. This is best suited for mixed networks where there are non-Microsoft clients in use. One drawback of CHAP is that the plain text version of the password must be available to validate the challenge response.]

[E: Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) is the Windows 2000 implementation of MS-CHAP. It does not support earlier Windows client versions such as Windows NT 4 and Windows 9x. Whereas you should use MS-CHAP v2 whenever possible, it is not the correct answer to this question because of the legacy systems in use.]

[F: Extensible Authentication Protocol (EAP) is an authentication protocol that can be extended with additional authentication methods such as smart cards, biometrics, and certificate-based authentication.]


120. You are a server administrator for your company, which hosts a mixed mode Windows 2000 Active Directory forest. Your clients are running Windows 2000 Professional with a mix of Service Packs 2 and 3, Windows XP Professional (no Service Pack 1 deployed yet in the enterprise), and a few Windows 98 and Windows NT 4 workstations with Service Pack 6a. The Windows 98 and Windows NT 4 clients have the Active Directory Client installed. You have been asked to allow access to certain systems in your environment. You have decided to use Network Address Translation (NAT) to hide the internal DMZ IP addressing scheme from the internet. In addition you have chosen to use Layer Two Tunneling Protocol (L2TP) VPN Tunnels and IPSec to encrypt all of the traffic in and out of DMZ.

Which of the following choices accurately describes why this configuration cannot be enabled?

A. Bandwidth Allocation Protocol (BAP) needs to be enabled.
B. A RADIUS Server needs to be installed.
C. Challenge Handshake Authentication Protocol (CHAP) should be used instead of L2TP.
D. IPSec cannot be used in this configuration.
E. Microsoft Point to Point Encryption (MPPE) should be used with IPSec.

>> !
Answer: D

Where NAT is used in VPN tunnels that use L2TP there are issues because IPSec can encrypt the IP header and NAT cannot perform address translation because it cannot read the source and/or the destination address to perform the translation.

[A: BAP is not the reason this has failed. VPN tunnels that use L2TP are not supported with NAT because IPSec can encrypt the IP header and NAT cannot perform address translation.]

[B: The RADIUS absence is not the issue. VPN tunnels that use L2TP are not supported with NAT because IPSec can encrypt the IP header and NAT cannot perform address translation.]

[C: CHAP uses the Message Digest 5 (MD5) one-way encryption scheme to hash the response to a challenge issued by the remote access server to allow authentication with encrypted passwords. This has nothing to do with encrypting the data. The issue here is that VPN tunnels that use L2TP are not supported with NAT because IPSec can encrypt the IP header and NAT cannot perform address translation.]

[E: PPTP using MPPE might work because the IP header is not encrypted but you cannot use MPPE with IPSec. Even if you could, you still have the issue of NAT failing because of IP address mapping issues.]


121. You are a server administrator for your company, which hosts a mixed mode Windows 2000 Active Directory forest. Your clients are running Windows 2000 Professional with a mix of Service Packs 2 and 3 and Windows XP Professional with Service Pack 1.

You have been asked to allow access to certain systems in your environment from remote laptop users. You have decided to use the Connection Manager Administration Kit (CMAK).

When you install the CMAK, the following template files are installed in the \Program Files\CMAK\Support folder:

Template.cms
Template.cmp
Template.inf
Template.sed

Which template will be used for the installation information for service profiles?

A. Template.inf
B. Template.cms
C. Template.cmp
D. Template.sed

>> !
Answer: A

The template.inf file (.inf) is used to specify the installation information for your service profiles.

[B: The template.cms file is used to specify the configuration of the phone book and most of the other functions of your service profiles. Any additional customization required is done by editing the .cms file for that particular service profile.]

[C: The template.cmp file contains information specified by the specific user. It is not used to specify the installation information for your service profiles themselves.]

[D: The template.sed file contains instructions for building a self-extracting executable file for your service profiles.]


122. Virtual Private Networks use either the Point-to-Point Tunneling Protocol (PPTP) or the Layer Two Tunneling Protocol (L2TP) to establish connections.

What are the main properties and characteristics of L2TP? (Choose all that apply)

A. Supported networks include IP, Frame Relay, X.25, or ATM Based.
B. Supported networks are limited to TCP/IP.
C. Supports header compression.
D. Has no tunnel authentication.
E. Uses built in encryption.
F. Uses IPSec for encryption.

>> !
Answer: A, C & F

The main properties of L2TP are that it can be used on multiple network types, such as IP, Frame Relay, X.25, or ATM Based. It also supports header compression and tunnel authentication and uses IPSec for encryption.


123. What are the three primary components of the Windows 2000 public key infrastructure (PKI)? (Choose all that apply)

A. Certificate Services
B. DNS
C. Active Directory
D. PKI-enabled applications
E. Group Policy

>> !
Answer: A, C & D

Certificate Services are the core operating system service that allows businesses to act as their own CAs and to issue and manage digital certificates. The certificates can also be published on Web pages or distributed on smart cards, disks, or compact discs. Certificate revocation lists are published at URLs.

Active Directory is used as the publication service for PKI. Certificate publication makes certificates and certificate revocation lists publicly available within an organization.

PKI-enabled applications use PKI for encryption and authentication. These include Microsoft Internet Explorer, Microsoft Money, Microsoft Internet Information Services (IIS), Microsoft Outlook, Microsoft Outlook Express, and third-party applications.

[B: DNS is not one of the primary components of PKI. Although it is a requirement for Active Directory (which itself is one of the three), it is not a correct answer.]

[E: Group Policy is not one of the primary components of PKI.]


124. Regarding PKI standards supported by Windows 2000, which standard defines the format and content of digital certificates.

A. IPSec
B. SGC
C. X.509 version 3
D. PKIX
E. CRL version 2

>> !
Answer: C

The X.509 version 3 standard defines the format and content of digital certificates.

[A: IPSec deals with encryption for network sessions using the Internet Protocol (IP).]

[B: SGC provides SSL-like security without export complications.]

[D: The PKIX standard defines the format and behavior for public-key exchange and distribution.]

[E: The CRL version 2 standard defines the format and content of Certificate Revocation Lists.]


125. You have started the process of installing an enterprise root certificate authority and need to configure the appropriate key length. You are using the Microsoft Base Cryptographic Provider and the SHA-1 hashing algorithm.

What is the recommended key length for a root CA.

A. 512 bits
B. 1024 bits
C. 2048 bits
D. 4096 bits

>> !
Answer: C

The default key length using the Microsoft Base Cryptographic Provider is 512 bits. The recommended key length for a root CA should be at least 2048 bits.


126. You are an enterprise administrator for your Windows 2000 forest. Client systems include Windows 2000 and Windows XP Professional. You need to explain to your security manager the different ways that the Certification Authority publishes certificate revocation lists (CRLs) and how this information is kept up to date.

Which of the following can be used for publishing CRLs? (Choose all that apply)

A. Active Directory
B. Web pages
C. SRV record update via DNS replication
D. E-mail notice

>> !
Answer: A, B & D

Certification Authorities can use Active Directory, Web pages, public folders, and e-mail to publish CRLs so that the information is kept up to date.


127. You are an enterprise administrator for your Windows 2000 forest. Client systems include Windows 2000 and Windows XP Professional. You need to explain to your security manager the different uses for certificates in a Windows 2000 environment.

Other than use for IPSec and L2TP implementations, what are some other uses for certificates? (Choose all that apply)

A. Secure Sockets Layer (SSL).
B. Secure/Multipurpose Internet Mail Extensions (S/MIME).
C. Point-to-Point Tunneling Protocol (PPTP).
D. Driver signing.

>> !
Answer: A, B & D

SSL uses certificates so that systems across the internet can have secure communication. One example of this is SSL connections for e-commerce transactions.

S/MIME uses certificates to encrypt e-mail messages by using a public and private key exchange.

A digital signature is involved in the signing of Windows drivers (code). The CodeSigning template exists for this purpose.

[C: PPTP does not use a certificate-based solution for encryption. Instead it uses Microsoft Point-to-Point Encryption (MPPE).]


128. You are an enterprise administrator for your Windows 2000 forest. Client systems include Windows 2000 and Windows XP Professional. You need to determine which certificate templates can be issued to computers for client/server authentication.

Which certificate templates can be issued specifically and only to computers for client/server authentication? (Choose all that apply)

A. Machine
B. OfflineRouter
C. SmartcardLogon
D. Domain Controller
E. MachineEnrollmentAgent

>> !
Answer: A & D

Machine is issued specifically to computers for client/server authentication.

Domain Controller is issued specifically to computers for client/server authentication.

[B: OfflineRouter is used for client authentication. It can be issued to computers AND routers, not just computers.]

[C: SmartcardLogon is used for client authentication only. It can be issued to a user account.]

[E: MachineEnrollmentAgent is used to request certificates, not client or client/server authentication.]


129. You are an enterprise administrator for your Windows 2000 forest and you are configuring public key Group Policy settings in the domain policy for gunderville.com.

What are the items [KL1]that you can configure in the security settings section? (Choose all that apply)

A. Encrypted Data Recovery Agent.
B. Level of encryption required (forced minimum).
C. Automatic Certificate Requests.
D. Publishing rules for certificates in Active Directory.
E. Publishing rules for certificates for Third Party Trustees.

>> !
Answer: A & C

You can add a new Encrypted Data Recovery Agent as well as set up Automatic Certificate Requests in the security settings section of a GPO.

[B: You cannot set a predefined level of encryption in the security settings section of a GPO.]

[D: You cannot set publishing rules for certificates in Active Directory in the security setting section of a GPO.]

[E: You cannot set publishing rules for certificates for Third Party Trustees in the security settings section of a GPO.]


130. You are an enterprise administrator for your Windows 2000 forest and you are configuring your new Certification Authority server. You want to review some of the entries in the transaction database log files, which records all certificate transactions.

Where is this log file stored by default on a Windows 2000 installation.

A. :\WINNT\CertLog
B. :\WINNT\System32\CertLog
C. :\CertLog
D. :\WINNT\System32\CertLog\Logfiles
E. :\WINNT\CertLog\Logfiles

>> !
Answer: B

The default installation path is :\WINNT\System32\CertLog. On most systems this would be C:\WINNT\System32\CertLog.