CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [230]
Be able to describe the needed components of an incident-response policy. The incident-response policy explains how incidents will be handled, including notification, resources, and escalation. This policy drives the incident-response process, and it provides advance planning to the incident-response team.
Know the aspects of privilege management. Privilege-management decision making involves evaluating the roles of individuals and departments in an organization. This includes centralized versus decentralized decision making, sign-on procedures, auditing, and role control.
Be able to describe the purpose of an audit. An audit is the process of testing and verifying the effectiveness of policies and procedures in an organization. A security audit may include evaluating privileges, systems usage, and escalation. The final product of an audit is the report to management, which outlines the results of the audit and pinpoints areas that need improvement.
Be able to describe the three roles of access control. The three roles are MAC, DAC, and RBAC. Mandatory Access Control (MAC) establishes rigid access control methods in the organization. Discretionary Access Control (DAC) allows for flexibility in access control. Role-Based Access Control (RBAC) is based on the role the individual or department has in the organization.
Hands-On Labs
The labs in this chapter are as follows:
Lab 8.1: Use Automated System Recovery in Windows Server 2003
Lab 8.2: Create a Rescue Disk in Linux
Lab 8.3: Create a Backup with SuSE Linux
Lab 8.1: Use Automated System Recovery in Windows Server 2003
In this lab, you’ll use the backup utility included with Windows Server 2003 to create an ASR backup:
1. Start the backup utility by choosing Start All Programs Accessories System Tools Backup.
2. Choose the Automatic System Recovery Wizard.
3. Walk through the wizard and answer the questions appropriately. When you finish, you’ll create the backup set first and a floppy second. The floppy contains files necessary to restore system settings after a disaster.
Lab 8.2: Create a Rescue Disk in Linux
This lab assumes the use of either SuSE Linux or Novell Desktop Linux. To create a disk, follow these steps:
1. Open YaST and choose System.
2. Beneath System, select Create A Boot, Rescue, Or Module Floppy. Seven choices appear here:
■ Standard Boot Floppy 1
■ Standard Boot Floppy 2
■ Standard Boot Floppy 3
■ Rescue Floppy
■ Module Floppies
■ Custom Floppy
■ Download Floppy Image
3. Choose Rescue Floppy, and the disk image will be copied to the media.
Lab 8.3: Create a Backup with SuSE Linux
This lab assumes the use of SuSE Linux Enterprise Server 9. To create a backup, follow these steps:
1. Log in as root and start YaST.
2. Choose System and System Backup.
3. Click Profile Management and choose Add, then enter a name for the new profile, such as fullsystemback.
4. Click OK.
5. Enter a backup name (using an absolute path such as /home/mybackup.tar), and make certain the archive type is set to a tar variety. Then click Next.
6. At the File Selection window, leave the default options and click Next.
7. Leave the Search Constraints at the defaults and click OK.
8. At the main YaST System Backup dialog box, click Start Backup. After several minutes of reading packages, the backup will begin.
Review Questions
1. Which plan or policy helps an organization determine how to relocate to an emergency site?
a. Disaster-recovery plan
b. Backup site plan
c. Privilege management policy
d. Privacy plan
2. Although you’re talking to her on the phone, the sound of the administrative assistant’s screams of despair can be heard down the hallway. She has inadvertently deleted a file that the boss desperately needs. Which type of backup is