Exam 10: Securing Windows Server 2008
Exam 1: Introduction to Windows Server 200842 Questions
Exam 2: Installing Windows Server 200842 Questions
Exam 3: Networking With Windows Server 200842 Questions
Exam 4: Installing and Configuring the Dynamic Host Configuration Protocol42 Questions
Exam 5: Introduction to Dns in Windows Server 200842 Questions
Exam 6: Managing and Administering Dns in Windows Server 200842 Questions
Exam 7: Configuring File Services in Windows Server 200842 Questions
Exam 8: Introduction to Printers in a Windows Server 2008 Network42 Questions
Exam 9: Network Policy and Access Services in Windows Server 200842 Questions
Exam 10: Securing Windows Server 200842 Questions
Exam 11: Managing and Monitoring a Windows Server 2008 Network42 Questions
Select questions type
How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?
Free
(Essay)
5.0/5
(34)
Correct Answer:
BitLocker prevents these threats by encrypting the entire Windows OS volume on the hard disk and verifying the integrity of early boot components and boot configuration data.
____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
The ____ is responsible for managing the network health and connectivity policies on a network.
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
D
Windows Firewall does not allow you to create exceptions for inbound traffic.
(True/False)
4.9/5
(34)
Clients use a(n)____ to determine to what type of network they are connected.
(Multiple Choice)
4.9/5
(27)
____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.
(Multiple Choice)
4.7/5
(31)
Match each item with a statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(32)
In Active Directory domain environments, _________________________ is used by clients for host authentication.
(Short Answer)
4.8/5
(42)
Secure Socket Layer (SSL)and Secure Shell (SSH)can protect Transport layer protocols and information such as TCP and UDP.
(True/False)
4.7/5
(40)
IPSec's ____ provides secure communications between two networks through a single node.
(Multiple Choice)
4.8/5
(34)
_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.
(Short Answer)
4.8/5
(38)
____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.
(Multiple Choice)
4.7/5
(37)
List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.
(Essay)
4.7/5
(29)
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.
(Multiple Choice)
4.8/5
(26)
_____________________________________________ is an open-standards framework for securing network communications.
(Short Answer)
4.9/5
(41)
Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB)flash drive in place of TPM
(Essay)
4.8/5
(37)
The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).
(Short Answer)
4.8/5
(33)
Briefly describe the following network profiles: Public, Private, and Domain.
(Essay)
4.7/5
(28)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)