ausp9dld7sm
Fan
Dołączył: 21 Mar 2011
Posty: 47
Przeczytał: 0 tematów
Ostrzeżeń: 0/3 Skąd: England Płeć: Kobieta
|
Wysłany: Śro 13:39, 27 Kwi 2011 Temat postu: Puma Disc Determining What apt Audit and A puma sh |
|
|
this practice, you will create a list of audit requirements for a fictitious company, and then analyze common MCSE 2003 records found in the security log. Complete the exercises that follow. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.Exercise 1: Determining What to AuditRead the following scenario and then answer the question that follows.Scenario You are an IT auditor at Wingtip Toys. You are queried to specify the audit requirements for a file server in the research division. The file server will cache privileged research message. Files are protected by EPS encryption. Communications between researchers' workstations and the file server are protected by IPSec. Only the researchers and their workstations are allowed to access the file server.Figure 9-23 shows the configuration for auditing for use of the Take MCSE study guides free Ownership permission. To ensure that the administrator is caught, you should also audit for privilege use. Two possible events can be recorded. If the administrator attempts access while logged on interactively to the server on which the file resides, the Se_TakeownershipPrivilege, event 578, is recorded. This is a privilege usage event. However, if she takes ownership remotely [link widoczny dla zalogowanych], the file Take Ownership permission (WRITE_OWNER) is used. This is object access event 560. With all this noted, remember that administrators can also delete audit logs, either in their entirety or by individual events. If you have untrustworthy administrators, the only solution is to not allow them to be administrators.Also To prevent an administrator from reading a file [link widoczny dla zalogowanych], you can encrypt the file. However, if you do so, make sure the administrator is not the file recovery surrogate. To learn why and what you can do to prevent administrators from reading perceptive files, look Lesson 5, "Designing a File Encryption and Decryption Strategy" CCNA after in the chapter.In this practice, you ambition establish a menu of audit requirements for a fictitious corporation, and then examine general MCSE 2003 records base in the security log. Complete the disciplines that follow. If you are unable to reply a question, review the lesson materials and try the question anew. You can find answers to the questions in the "Questions and Answers" section by the end of the part.Exercise 1: Determining What to AuditRead the following scenario and then answer the question that follows.Scenario You are an IT auditor at Wingtip Toys. You are asked to specify the audit requirements for a file server in the research department. The file server will store confidential research information. Files are protected by EPS encryption. Communications between researchers' workstations and the file server are protected by IPSec. Only the researchers and their workstations are allowed to access the file server.Figure 9-23 shows the configuration for auditing for use of the Take MCSE learn advisers free Ownership permission. To assure that the custodian is caught, you should also audit because prerogative use. Two possible memorabilia can be logged. If the administrator offers access when recorded on interactively to the waiter aboard which the document resides [link widoczny dla zalogowanych], the Se_TakeownershipPrivilege, event 578, namely recorded. This is a privilege method accident. However, whether she takes ownership remotely, the document Take Ownership permission (WRITE_OWNER) is secondhand. This is thing access event 560. With all this noted, remember namely administrators can also erase inspect logs, both in their entirety alternatively at individual events. If you have untrustworthy administrators, the only solution is to not permit them apt be administrators.Also To discourage an administrator from reading a fi
Post został pochwalony 0 razy
|
|