|
1.
|
You are evaluating remote management options for your company. Your network administration staff and CSO are worried about spoofing attacks, eavesdropping, sniffing, and manipulation of data in packets sent through the remote management tools. What technology would you use to alleviate these concerns?
Local administration only
Strong encryption
Strong authentication protocol
Patch management policy
|
|
|
2.
|
You need to provide security for your remote management tools. Unfortunately, not all of the tools support strong authentication mechanisms and/or encryption. You have unsuccessfully searched for alternative tools. You need to perform remote management of these applications but also require security. What can you do to alleviate this problem?
Install a secondary network for performing remote management only. The administrators would need to authenticate with the router to gain access to this network. This private network would alleviate many of the security risks associated with management over the normal network.
Perform all management locally. This would ensure that nobody can infiltrate the remote management data.
To prevent eavesdropping, create a policy that sets forth strict penalties for any employee sniffing the network.
Use a Windows client to connect to the server you need to manage because it will automatically secure the connection.
|
|
|
3.
|
You currently use an MMC snap-in to manage your Windows Server 2003 Active Directory infrastructure. The communication from this snap-in needs to pass through a firewall that separates you from a branch office so you can manage a domain controller that is there. The management application uses RPC and LDAP (389) to communicate with the server. What ports would you need to open on the firewall for RPC?
110
135
23
3336
|
|
|
4.
|
Ann needs to set up remote management with a server. She does not want to worry about installing the proper management tools on the clients. She discovers that not all clients will support the management tools for the applications she and her fellow administrators use. She is also concerned about eavesdropping on network management data. What remote management tool should she use?
Microsoft Management Console
Remote Assistance
Remote Desktop for Administrators
Telnet
|
|
|
5.
|
What is the main purpose for using Remote Assistance to remotely manage networks?
Remote Assistance provides administrators with a graphical user interface to manage a server as if they were sitting at the local console.
Remote Assistance provides administrators with a command-line interface that is compatible with many servers and devices.
Remote Assistance provides administrators with the ability to remotely assist end users with problems on their computers.
Remote Assistance provides administrators with the ability to manage a server even after it has locked up in many cases.
|
|
|
6.
|
What are the security issues with using Telnet to perform remote management of servers or devices on the network?
Telnet does not have a graphical user interface.
Telnet is not supported by all devices or Windows by default.
Telnet does not provide for encryption or strong authentication.
Telnet only works over a serial connection.
|
|
|
7.
|
Which of the following can you perform using out-of-band management tools?
Restart the server.
Configure the IP address of the server.
List the running processes on the server.
Kill a process.
Start a command prompt.
Generate a stop error.
All of the above.
|
|
|
8.
|
What is the main purpose of using Emergency Management Services (EMS) to remotely manage networks?
EMS provides administrators with a graphical user interface to manage a server as if they were sitting at the local console.
EMS provides administrators with a command-line interface that is compatible with many servers and devices.
EMS provides administrators with the ability to remotely assist end users with problems on their computers.
EMS provides administrators with the ability to manage a server even after it has locked up in many cases.
|
|
|
9.
|
What is the most effective way of handling serial connections to many servers and the most secure way to set up EMS for out-of-band remote management?
Purchase a terminal concentrator that supports SSH. Connect the terminal concentrator to the servers through the network using SSH. Connect to the terminal concentrator from the management computer through a null serial connection. Physically secure the terminal concentrator in the server room with the servers.
Purchase a terminal concentrator that supports Telnet. Connect the terminal concentrator to the servers through the network using Telnet. Connect to the terminal concentrator from the management computer through a null serial connection. Physically secure the terminal concentrator in the server room with the servers.
Purchase a terminal concentrator that supports Telnet. Connect the terminal concentrator to the servers with null serial cables. Connect to the terminal concentrator from the management computer through Telnet. Physically secure the terminal concentrator in the server room with the servers.
Purchase a terminal concentrator that supports SSH. Connect the terminal concentrator to the servers with null serial cables. Connect to the terminal concentrator from the management computer through SSH. Physically secure the terminal concentrator in the server room with the servers.
|
|
|
10.
|
What is the main purpose for using Remote Desktop to remotely manage networks?
Remote Desktop provides administrators with a graphical user interface to manage a server as if they were sitting at the local console.
Remote Desktop provides administrators with a command-line interface that is compatible with many servers and devices.
Remote Desktop provides administrators with the ability to remotely assist end users with problems on their computers.
Remote Desktop provides administrators with the ability to manage a server even after it has locked up in many cases.
|
|