05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

26-36 Chapter 26 Implementing, Managing, and Troubleshooting Network Protocols and Services<br />

Objective 6.6 Answers<br />

1. Correct Answers: D<br />

A. Incorrect: Windows Firewall cannot prevent this type of intrusion because the<br />

Web server must be able to receive HTTP requests from legitimate users on the<br />

public Internet. Windows Firewall is capable of stopping all HTTP requests, but<br />

cannot distinguish between legitimate and malicious requests within a single protocol.<br />

B. Incorrect: Windows Firewall filters packets as they are processed by a Windows<br />

XP Professional network adapter. This particular scenario saturates your bandwidth<br />

with incoming packets. The packets sent during the DoS intrusion saturate<br />

the Internet connection before they reach hosts on the destination network. Windows<br />

Firewall can filter the packets when they reach the Windows XP Professional<br />

system; however, it cannot stop the Internet connection from being saturated.<br />

C. Incorrect: Windows Firewall is capable of filtering connections only where the<br />

Windows XP Professional computer is acting as the server. When users retrieve email<br />

messages, the connection is initiated by the Windows XP Professional computer.<br />

Further, Windows Firewall is capable of filtering only an entire protocol. ICF<br />

is incapable of differentiating between legitimate and malicious requests within a<br />

single protocol.<br />

D. Correct: By default, Windows Firewall filters incoming FTP requests. In this scenario,<br />

the FTP server was accidentally started. Windows Firewall is designed to<br />

prevent this type of vulnerability. When Windows Firewall is enabled, only those<br />

services explicitly enabled can receive traffic—even if they are accidentally<br />

started.<br />

2. Correct Answers: A and B<br />

A. Correct: The source IP address is one of the fields of data collected in the Windows<br />

Firewall security log.<br />

B. Correct: The destination port is one of the fields of data collected in the Windows<br />

Firewall security log.<br />

C. Incorrect: The Windows Firewall security log does not contain the source’s host<br />

name. The source IP address is included, however, so you can perform a reverse<br />

DNS lookup based on the source IPs in the log.<br />

D. Incorrect: Windows Firewall security logs do not contain the data that was contained<br />

in the dropped packets. Only information contained in the header of packets<br />

is recorded.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!