Solved

IPSEC

Posted on 2011-02-22
6
260 Views
Last Modified: 2012-05-11
The network consists of an internal network and a perimeter network. The
internal network is protected by a firewall. The perimeter network is exposed to
the Internet.
You are deploying 10 Windows Server 2003 computers as Web servers. The servers
will be located in the perimeter network. The servers will host only publicly
available Web pages.
You want to reduce the possibility that users can gain unauthorized access to the
servers. You are concerned that a user will probe the Web servers and find ports
or services to attack.?

/////////////////////////

I agree with the d because others can cause performance issue.
0
Comment
Question by:kunalclk
  • 3
  • 2
6 Comments
 
LVL 18

Accepted Solution

by:
jmeggers earned 250 total points
ID: 34957131
Is there really a question here?  At the very least, the servers should go in a DMZ off the firewall so they are protected to some degree.  For web servers, you should also (or perhaps instead) use a web application firewall to look for specific HTTP attacks.
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 34958481
Yes, answers for this question would be helpful ;)

My opinion (if you're interested :) ) It doesn't matter which access method you will use because when user will be connected to the server it can always run port,services discovery. I don't know if there is anything related with File and Printer sharing? That could disallow port/services discovery

Regards,
Krzysztof
0
 
LVL 2

Author Comment

by:kunalclk
ID: 34963631
A. Disable File and Printer Sharing on the servers
B. Disable the IIS Admin service on the servers
C. Enable Server Message Block (SMB) signing on the servers
D. Assign the Secure Server (Require Security) IPSec policy to the servers
0
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
LVL 39

Assisted Solution

by:Krzysztof Pytko
Krzysztof Pytko earned 250 total points
ID: 34963724
Definitively A answer :]

Krzysztof
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34964078
tnx
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 34964094
Some article about that (maybe not strictly about reason but explains some issues)
http://support.microsoft.com/kb/199346

Krzysztof
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
This article runs through the process of deploying a single EXE application selectively to a group of user.
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now