4.3.7 Section Quiz

pdf

School

St. Petersburg College *

*We aren’t endorsed by this school

Course

1358

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

10

Uploaded by MasterRain12063

Report
4.3.7 Section Quiz Candidate: Anthony Patrizzi (apatrizzi324@gmail.com) Date: 2/2/2024, 9:57:20 PM • Time Spent: 02:41 Score: 90% Passing Score: 80% Question 1. Correct You have placed a File Transfer Protocol (FTP) server in your DMZ behind your firewall. The FTP server is to be used to distribute software updates and demonstration versions of your products. However, users report that they are unable to access the FTP server. What should you do to enable access? Open ports 20 and 21 for outbound connections. Install a VPN. Move the FTP outside of the firewall. Define user accounts for all external visitors. Explanation To allow FTP traffic into your DMZ, you must open the correct ports on the firewall. For FTP, the correct ports are 20 and 21 for outbound connections. Installing a VPN is not necessary to grant access to external users. Defining user accounts may be required in some situations, but this scenario requires anonymous access. Moving the FTP server outside the firewall is not a secure action. References 4.3.2 File System Security Facts 5.1.2 Security Zones 5.1.3 Security Zone Facts 5.2.1 Demilitarized Zones 5.2.2 Configuring a DMZ 5.2.3 Configure a DMZ Individual Response about:srcdoc 1 of 10 2/17/2024, 3:45 PM
Question 2. Correct FTPS uses which mechanism to provide security for authentication and data transfer? IPsec Multi-factor authentication Token devices SSL Explanation File Transfer Protocol Secure (FTPS) uses Secure Sockets Layer (SSL) to provide security for authentication and data transfer. FTPS is an FTP replacement that brings reasonable security to an otherwise unsecure file-transfer mechanism. FTP by itself is unsecure because FTP transmits logon credentials in cleartext and does not encrypt transmitted files. References 4.3.1 File Server Security 4.3.2 File System Security Facts 4.3.3 File Permission Facts 4.3.4 Configuring NTFS Permissions 10.1.3 Secure Protocol Facts q_file_sys_sec_ftps_secp7.question.fex Question 3. Correct Individual Response about:srcdoc 2 of 10 2/17/2024, 3:45 PM
To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Now, you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select two.) 80 20 21 23 443 Explanation FTP uses port 21 for connection requests and port 20 for data transfers. Both ports need to remain open for you to transfer files to your company's internal network from home. Telnet uses port 23, SSL uses port 443, and HTTP uses port 80. References 4.3.1 File Server Security 4.3.2 File System Security Facts 4.3.3 File Permission Facts 4.3.4 Configuring NTFS Permissions 10.1.3 Secure Protocol Facts q_file_sys_sec_ftp_secp7.question.fex Question 4. Incorrect You want to close all ports associated with NetBIOS on your network's firewalls to prevent attacks directed against NetBIOS. Which ports should you close? 67, 68 Individual Response about:srcdoc 3 of 10 2/17/2024, 3:45 PM
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
135, 137-139 161, 162 389, 636 Explanation NetBIOS uses the following ports: TCP 135 TCP and UDP 137 TCP and UDP 138 TCP 139 Dynamic Host Configuration Protocol (DHCP) uses ports 67 and 68. Simple Network Management Protocol (SNMP) uses ports 161 and 162. Lightweight Directory Access Protocol (LDAP) uses ports 389 and 636. References 4.3.2 File System Security Facts q_file_sys_sec_netbios_secp7.question.fex Question 5. Correct Which of the following file transfer protocols use SSH to provide confidentiality during the transfer? (Select two.) SFTP SCP HTTPS FTP Individual Response about:srcdoc 4 of 10 2/17/2024, 3:45 PM
FTPS Explanation Secure Copy Protocol (SCP) and SSH File Transfer Protocol (SFTP) both use SSH to provide confidentiality. FTPS and HTTPS both use Transport Layer Security (TLS) or Secure Sockets Layer (SSL) to provide confidentiality. File Transfer Protocol (FTP) is an older TCP/IP protocol that's used for transferring files across systems. References 4.1.3 Manageable Network Plan Facts 4.3.2 File System Security Facts 5.13.3 Router Security Facts 10.1.3 Secure Protocol Facts q_file_sys_sec_ssh_secp7.question.fex Question 6. Correct To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions? 443 80 23 69 21 Explanation Individual Response about:srcdoc 5 of 10 2/17/2024, 3:45 PM
To perform secure transactions, SSL on port 443 needs to be enabled. HTTPS uses port 443 by default. References 4.3.1 File Server Security 4.3.2 File System Security Facts 4.3.3 File Permission Facts 4.3.4 Configuring NTFS Permissions 10.1.3 Secure Protocol Facts 10.1.4 Adding SSL to a Website 10.1.5 Allow SSL Connections q_file_sys_sec_ssl_secp7.question.fex Question 7. Correct You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file. What should you do? Configure NTFS permissions for Confidential.xls to allow read-only. Remove Mark Mangum from the Managers group. Add Mark Mangum to the ACL for the Reports directory with Deny permissions. Add Mark Mangum to the ACL for the Confidential.xls file with Deny permissions. Explanation Individual Response about:srcdoc 6 of 10 2/17/2024, 3:45 PM
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
To prevent Mark from accessing one file, edit the ACL for that file, add his user account to the ACL, and configure Deny permissions. The Deny permissions configured on the file override the Write permissions granted to the folder through the group. Removing Mark from the group would prevent access to the entire folder, not just to the one file. Configuring Deny permissions to the folder for Mark would also prevent access to the entire folder. References 4.3.3 File Permission Facts 5.3.2 Firewall Facts 5.13.3 Router Security Facts 6.3.3 Authorization Facts q_fileperms_acl_secp7.question.fex Question 8. Correct You want to give all managers the ability to view and edit a certain file. To do so, you need to edit the discretionary access control list (DACL) associated with the file. You want to be able to easily add and remove managers as their job positions change. What is the BEST way to accomplish this? Add one manager to the DACL that grants all permissions. Have this user add other managers as required. Create a distribution group for the managers. Add all users as members of the group. Add the group to the file's DACL. Add each user account to the file's DACL. Create a security group for the managers. Add all users as members of the group. Add the group to the file's DACL. Explanation Individual Response about:srcdoc 7 of 10 2/17/2024, 3:45 PM
Create a security group for the users and add the users to the DACL. A group is an object that identifies a set of users with similar access needs. Microsoft systems have two kinds of groups, which are distribution groups and security groups. Only security groups can be used for controlling access to objects. As manager roles change, add or remove user accounts from the group. Assigning permissions to a group grants those same permissions to all members of the group. Adding individual user accounts instead of groups to the ACL would require more work as you add or remove managers. References 4.3.3 File Permission Facts 5.3.2 Firewall Facts 5.13.3 Router Security Facts 6.3.3 Authorization Facts q_fileperms_dacl_secp7.question.fex Question 9. Correct If Mark has a read-write permission to the share \\fileserver\securefiles and a read-only permission to the file coolstuff.docx on the NTFS file system shared by the file share, he is able to perform which action? Rename the file. Change the contents of the file. Delete the file. Read the file. Explanation Individual Response about:srcdoc 8 of 10 2/17/2024, 3:45 PM
The permissions of the share and file system work together, and the more restrictive of the two is used when accessing the file through the share. In this case, Mark is allowed to read the file. Because the NTFS permissions are set to read-only, he would not be allowed to delete, rename, or change the file. References 4.3.1 File Server Security 4.3.2 File System Security Facts 4.3.3 File Permission Facts 4.3.4 Configuring NTFS Permissions q_fileperms_ntfs_secp7.question.fex Question 10. Correct You have a file server named Srv3 that holds files used by the development department. You want to allow users to access the files over the network and control access to files accessed through the network or through a local logon. Which solution should you implement? NTFS permissions and file screens NTFS permissions and share permissions Share permissions and quotas Share permissions and file screens Explanation Use New Technology File System (NTFS) permissions and share permissions to control access to files. Share permissions apply when files are accessed through the network, and NTFS permissions apply to both network and local access. Use file screens to restrict the types of files that can be saved within a folder. References Individual Response about:srcdoc 9 of 10 2/17/2024, 3:45 PM
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.3.1 File Server Security 4.3.2 File System Security Facts 4.3.3 File Permission Facts 4.3.4 Configuring NTFS Permissions q_fileperms_permissions_secp7.question.fex Copyright © The Computing Technology Industry Association, Inc. All rights reserved. Individual Response about:srcdoc 10 of 10 2/17/2024, 3:45 PM