You should give yourself 20 minutes to review this testlet, review the table, and complete the questions.
Towely Incorporated designs, manufactures, and markets industrial strength towels. Towely Inc. is currently the largest supplier of towels to hotels in the world.
The organization has three offices, as shown in the following table. The main office is in Philadelphia, and there are branch offices in Los Angeles and Miami. Employees and the business units are distributed as referenced in the table.
|
Office Locations |
Employee Quantity |
Business Units |
Onsite IT support |
|---|---|---|---|
|
Philadelphia |
5,000 |
Executive, Marketing, HR, and IT |
IT staff |
|
Los Angeles |
750 |
Accounting and Research and Development |
5 IT administrators |
|
Miami |
100 |
Manufacturing |
1 IT administrator and 1 help desk operator |
Directory Services Towely Incorporated consists of a single Active Directory domain named TowelyInc.com. The company’s organizational unit (OU) structure is shown in the OU structure exhibit (in the section “Case Study Exhibits”).
There are domain controllers in each of the offices: Philadelphia, Miami, and Los Angeles.
A global security group named PHLExecs contains all of the executive employees in the Philadelphia office. A global security group named MIAManufacture contains all of the manufacturing employees in the Miami office.
Network Infrastructure All of the servers are running Windows Server 2003, Enterprise Edition. All of the client workstations in all of the sites are running Windows XP Professional. All computers have the most recent service packs applied. Client workstations access websites through a proxy server.
Towely Incorporated uses an internal website to handle most of the human resources as well as other organizational business. Only employees should be allowed to access the intranet and the organization’s information.
There is also a perimeter network. The perimeter network houses a server named ExServer4. ExServer4 is not a member of the Active Directory domain. ExServer4 hosts a website that is used by the various hotel chains to order more towels for their respective hotels. The website is maintained in Internet Information Services 6.0 running an ASP .NET application.
All of the Research and Development data is located on a single server named RD_Data, located in Los Angeles.
The following organizational problems must be considered:
Whenever a significant outage occurs, the help desk operator in Miami gets inundated with calls.
The employees in the Los Angeles office have a history of installing unsupported drivers on their workstations. In addition, you have discovered that unauthorized software has been installed on some of the workstations by employees. Some of applications that have been installed have caused incompatibilities with some of the line-of-business applications.
Users frequently forget to lock or log out of their client computers. This is a security risk and should be prevented from happening.
Chief Information Officer We plan on implementing a secure infrastructure to prevent our competitors from gaining access to our research information.
On occasion, we monitor logon traffic to our domain controllers and inspect the logs randomly. This inspection needs to occur on a more regular basis.
Chief Operating Officer The last time the IT department implemented a widespread policy shift, it took the users several weeks to adjust and production decreased significantly. Any changes that are made that affect production need to have a minimum impact on the bottom line.
Network Administrator We need to test software and make sure that it is compatible with our current desktop image. Users should not be able to install software on their own client computers without administrative oversight.
Last year more than 10 users had their passwords compromised because they were easily guessed. Our team spent weeks recovering from each of the incidents and we want to, at least, minimize the occurrence of passwords being compromised.
Currently there are no logon policies in place.
Organizational Goals Currently the IT Staff manages user, group, and computer accounts centrally in Philadelphia. The help desk operator in Miami needs to have the authority to manage the users in Miami only.
Security The company’s security policy contains the following requirements:
Manufacturing data must not be accessible over the network through shared folders. The highest level of authentication must be used for all access to the data.
Access to the RD_Data folder must be restricted to only members of the research team. The research team should be able to make all types of changes to the contents of the files.
Before business partners are allowed to access the partner site, the source IP address needs to be recorded and be in a specific list of allowed source addresses.
The following security requirements apply specifically to the websites and servers for the organization.
IIS cannot be installed on domain controllers.
All access to the internal website should be restricted to only allow authenticated users in the domain.
The following shows the physical locations and connectivity diagram:
The following shows the Active Directory organizational unit structure:
|
You need to give permissions to the employees in the research team so that they can access the research data. Which of the following tasks should you complete? (Choose all that apply.)
Create a Domain Local group named dl_ResearchData.
Add the research accounts to the Domain Local group dl_ResearchData.
Assign permissions to the Global group g_ResearchData.
Create a Universal group and add the research accounts to the Universal group u_AllResearch.
Create a Global group named g_ResearchData.
| ||
|
You decide to implement strong password requirements for all of the users in the Miami office. You need to make sure that no password cracking utility can access LM hashes on the local machines. What additional steps should you take? (Choose all that apply.)
Add a lockout policy for 3 invalid logons within a 30-minute timeframe.
Create a Group Policy Object that removes the LM Hashes from the local machines and link the policy to the Miami container.
Install a third-party monitoring system to evaluate the strength of the passwords and determine how long the passwords should be in order to thwart any brute force attacks.
Automate an alert notification to be sent when an incorrect username or password combination is supplied.
Set the Minimum Password Length policy to 15 for all users in Miami.
| ||
|
Towely Incorporated has hired some new research and development employees that need to have access to the research data. What must you do to assure that the new employees can access the data to perform their job?
Add the new employee accounts to the Domain Local group for the research data.
Add the new employee accounts to the Universal group for the research data.
Add the new employee accounts to the research Global group that has access to the research data.
Add the new employee accounts to the Domain Users Global Domain group.
| ||
|
Towely Incorporated has just acquired Leaf Soap LLP. Leaf Soap runs a Windows 2000 Active Directory domain that is running in Native mode. You need to configure the two domains to talk to each other so that resources are available to users in both domains. You need to configure the trust relationship to use Kerberos v5. What additional tasks must you perform? (Choose all that apply.)
Convert the Windows 2000 Active Directory domain to a Kerberos realm.
Create a two-way trust relationship from the Towely domain to the Leaf Soap domain.
Make the trust use Kerberos v5 by configuring the Registry on both bridgehead servers.
Upgrade the domain controllers at Leaf Soap to Windows Server 2003 and change Active Directory to run in Windows 2003 Native mode.
| ||
|
With the acquisition of Leaf Soap, your IT staff now must secure additional servers. After auditing the new network, it is determined that Exchange Server is running in the Leaf Soap domain. The service accounts for Exchange are running in the context of the LocalSystem account. You would like the service to run custom scripts that record log information to a remote share. You need to make sure that accounts have only the absolute minimum permissions that they require in order to function. Which one of the following should you do?
Remove the permissions to resources that are not needed for Exchange from the LocalSystem account.
Create an account on the server that is running Exchange and assign it only the permissions that are required to run the Exchange Server services.
Create an account in the Leaf Soap domain and assign it only the permissions that are required to run the Exchange Server services.
Create an account in the Leaf Soap domain and assign it to the local Administrators group on the Exchange Server machine.
| ||
|
You fear that the accounts in the Leaf Soap domain are less secure due to weak password requirements. Which of the following policies should you enable in order to require stronger passwords? (Choose all that apply.)
Maximum Password Age
Minimum Password Length
Minimum Password Age
Enforce Password History
Passwords Must Meet Complexity Requirements
| ||
|
You want to make sure that users in the Philadelphia office can only log on during normal business hours. What can you do in order to enforce this rule?
Enable and configure logon hours in the account’s properties dialog box.
Enable the Logon Hours policy for the domain.
Enable the Store Logon Hours With Credentials option on the domain controller.
Enable the Account Lockout Threshold and the Account Lockout Duration options.
| ||
|
Your security team has alerted you that in the early morning hours, several attempts are made to authenticate as various accounts and these attempts are obviously not being made by employees. What additional security policies must you enable to prevent this from being exploited into a brute force password attack? (Choose two.)
Account Lockout Duration
Reset Account Lockout After
Enforce Password History
Account Lockout Threshold
| ||
|
In your organization, a user, Winston Smith, whose logon is wsmith, attempts to set his password to WiNsTOn98. You have configured the default password filter by enabling the Passwords Must Meet Complexity Requirements policy. The password is rejected citing password requirements. Why?
The password doesn’t contain each of the four required character types (uppercase, lowercase, numeric, and special characters).
The password contains the user’s logon name.
The password contains the user’s name.
The password contains less than the minimum number of characters defined in the filter.
| ||
|
One of your partners needs to provide resources to some of your users. The partner runs Unix and has a Kerberos realm configured. You need to make sure that your organizational resources cannot be accessed by your partner’s accounts. What should you do?
Create an external one-way trust with the partner’s domain trusting your domain.
Create an external two-way trust between your domain and the partner’s domain.
Create an external one-way trust with your domain trusting your partner’s domain.
Create in your domain accounts for the users in the partner’s domain and assign them the appropriate permissions on the required resources.
| ||
|
To prevent users from being able to install software on their workstations, which one of the following tasks should you complete?
Remove the users from the Domain Users Global group.
Remove the users from the Local Users group on their client workstations.
Remove the users from the Administrators Local group on their client workstations.
Add the users to the Restricted group on the local workstations.
|
Answers