Exam 10: Securing Windows Server 2008

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?

Free
(Essay)
5.0/5
(34)
Correct Answer:
Verified

BitLocker prevents these threats by encrypting the entire Windows OS volume on the hard disk and verifying the integrity of early boot components and boot configuration data.

____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

The ____ is responsible for managing the network health and connectivity policies on a network.

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

D

Windows Firewall does not allow you to create exceptions for inbound traffic.

(True/False)
4.9/5
(34)

Clients use a(n)____ to determine to what type of network they are connected.

(Multiple Choice)
4.9/5
(27)

____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.

(Multiple Choice)
4.7/5
(31)
Match each item with a statement below.
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Tunnel
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Custom
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Server-to-Server
Correct Answer:
Verified
Premises:
Responses:
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Tunnel
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Custom
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Server-to-Server
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Isolation
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Netsh
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
WFAS
This template creates rules that restrict network connections based on administrator-defined policies.
Authentication Exemption Rule
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
GPME
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
IP Security Policy snap-in
(Matching)
4.8/5
(32)

In Active Directory domain environments, _________________________ is used by clients for host authentication.

(Short Answer)
4.8/5
(42)

Secure Socket Layer (SSL)and Secure Shell (SSH)can protect Transport layer protocols and information such as TCP and UDP.

(True/False)
4.7/5
(40)

IPSec's ____ provides secure communications between two networks through a single node.

(Multiple Choice)
4.8/5
(34)

_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.

(Short Answer)
4.8/5
(38)

____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.

(Multiple Choice)
4.7/5
(37)

List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.

(Essay)
4.7/5
(29)

____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.

(Multiple Choice)
4.8/5
(26)

IPSec meets three basic goals. Briefly discuss these goals.

(Essay)
4.9/5
(38)

_____________________________________________ is an open-standards framework for securing network communications.

(Short Answer)
4.9/5
(41)

Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB)flash drive in place of TPM

(Essay)
4.8/5
(37)

The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).

(Short Answer)
4.8/5
(33)

Briefly describe the following network profiles: Public, Private, and Domain.

(Essay)
4.7/5
(28)

What is the purpose of the System Health Validator?

(Essay)
4.9/5
(33)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)