Skip to document

Test Out 4 This is a description so the engine will pass it

This is a description so the engine will pass it
Course

Computer Systems Security (IT 253)

355 Documents
Students shared 355 documents in this course
Academic year: 2021/2022
Uploaded by:
164Uploads
445upvotes

Comments

Please sign in or register to post comments.

Preview text

Section Quiz

Candidate: Zemas Howard  (zmshoward) Date: 1/6/2022 12:24:06 pm • Time spent: 03:

Score: 100% Passing Score: 80%

Question 1:  Correct

You have placed a File Transfer Protocol (FTP) server in your DMZ behind your firewall. The FTP server is to be used to distribute software updates and demonstration versions of your products. However, users report that they are unable to access the FTP server. What should you do to enable access?

EXPLANATION To allow FTP traffic into your DMZ, you must open the correct ports on the firewall. For FTP, the correct ports are 20 and 21 for outbound connections. Installing a VPN is not necessary to grant access to external users. Defining user accounts may be required in some situations, but this scenario requires anonymous access. Moving the FTP server outside the firewall is not a secure action.

Install a VPN.

Open ports 20 and 21 for inbound and outbound connections.

Move the FTP outside of the firewall.

Define user accounts for all external visitors.

Question 2:  Correct

FTPS uses which mechanism to provide security for authentication and data transfer?

EXPLANATION File Transfer Protocol Secure (FTPS) uses Secure Sockets Layer (SSL) to provide security for authentication and data transfer. FTPS is an FTP replacement that brings reasonable security to an otherwise unsecure file-transfer mechanism. FTP by itself is unsecure because FTP transmits logon credentials in cleartext and does not encrypt transmitted files.

Question 3:  Correct

To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Now, you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select two.)

EXPLANATION FTP uses port 21 for connection requests and port 20 for data transfers. Both ports need to remain open for you to transfer files to your company's internal network from home. Telnet uses port 23, SSL uses port 443, and HTTP uses port 80.

IPsec

SSL

Token devices

Multi-factor authentication

21

80

443

20

23

Question 5:  Correct

Which of the following file transfer protocols use SSH to provide confidentiality during the transfer? (Select two.)

EXPLANATION Secure Copy Protocol (SCP) and SSH File Transfer Protocol (SFTP) both use SSH to provide confidentiality. FTPS and HTTPS both use Transport Layer Security (TLS) or Secure Sockets Layer (SSL) to provide confidentiality. File Transfer Protocol (FTP) is an older TCP/IP protocol that's used for transferring files across systems.

Question 6:  Correct

To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

EXPLANATION To perform secure transactions, SSL on port 443 needs to be enabled. HTTPS uses port 443 by default.

FTP

SCP

HTTPS

FTPS

SFTP

443

23

69

21

80

Question 7:  Correct

You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential file. What should you do?

EXPLANATION To prevent Mark from accessing one file, edit the ACL for that file, add his user account to the ACL, and configure Deny permissions. The Deny permissions configured on the file override the Write permissions granted to the folder through the group. Removing Mark from the group would prevent access to the entire folder, not just to the one file. Configuring Deny permissions to the folder for Mark would also prevent access to the entire folder.

Add Mark Mangum to the ACL for the Reports directory with Deny permissions.

Add Mark Mangum to the ACL for the Confidential file with Deny permissions.

Configure NTFS permissions for Confidential to allow read-only.

Remove Mark Mangum from the Managers group.

Question 9:  Correct

If Mark has a read-write permission to the share \fileserver\securefiles and a read-only permission to the file coolstuff on the NTFS file system shared by the file share, he is able to perform which action?

EXPLANATION The permissions of the share and file system work together, and the more restrictive of the two is used when accessing the file through the share. In this case, Mark is allowed to read the file. Because the NTFS permissions are set to read-only, he would not be allowed to delete, rename, or change the file.

Question 10:  Correct

You have a file server named Srv3 that holds files used by the development department. You want to allow users to access the files over the network and control access to files accessed through the network or through a local logon. Which solution should you implement?

EXPLANATION Use New Technology File System (NTFS) and share permissions to control access to files. Share permissions apply when files are accessed through the network, and NTFS permissions apply to both network and local access. Use file screens to restrict the types of files that can be saved within a folder.

Copyright © 2022 TestOut Corporation All rights reserved.

Delete the file.

Read the file.

Change the contents of the file.

Rename the file.

Share permissions and file screens

NTFS and share permissions

Share permissions and quotas

NTFS permissions and file screens

Was this document helpful?

Test Out 4 This is a description so the engine will pass it

Course: Computer Systems Security (IT 253)

355 Documents
Students shared 355 documents in this course
Was this document helpful?
2/7/22, 10:17 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_486/index.html
1/7
Section Quiz
Candidate:Zemas Howard (zmshoward)
Date: 1/6/2022 12:24:06 pm•Time spent:03:18
Score:100% Passing Score:80%
Question 1: Correct
You have placed a File Transfer Protocol (FTP) server in your DMZ behind your firewall. The FTP server
is to be used to distribute software updates and demonstration versions of your products. However,
users report that they are unable to access the FTP server.
What should you do to enable access?
E X P L A N A T I O N
To allow FTP traffic into your DMZ, you must open the correct ports on the firewall. For FTP, the
correct ports are 20 and 21 for outbound connections.
Installing a VPN is not necessary to grant access to external users. Defining user accounts may be
required in some situations, but this scenario requires anonymous access. Moving the FTP server
outside the firewall is not a secure action.
Install a VPN.
Open ports 20 and 21 for inbound and outbound connections.
Move the FTP outside of the firewall.
Define user accounts for all external visitors.