Exam 10: Securing Windows Server 2008

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When a user encrypts a file, a symmetric file encryption key (FEK)is generated that EFS uses to encrypt the file.

(True/False)
4.8/5
(43)

List three authentication protocols supported by Windows Server 2008.

(Essay)
4.8/5
(37)

The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.

(Multiple Choice)
4.8/5
(37)

____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.

(Multiple Choice)
4.8/5
(31)

Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.

(Short Answer)
5.0/5
(36)

EFS uses a combination of private and public key encryption for securing a user's data.

(True/False)
4.8/5
(40)

____ provides hard drive-based encryption of servers and Windows Vista computers.

(Multiple Choice)
4.7/5
(27)

All forms of NTLM use the ____.

(Multiple Choice)
4.8/5
(34)

With ____, each user has a public key that is available to everyone and a private key that is known only to the user.

(Multiple Choice)
4.7/5
(32)

For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.

(Multiple Choice)
4.8/5
(38)

A ____ is a microchip that performs basic security tasks with encryption keys.

(Multiple Choice)
4.9/5
(35)

____ attacks are performed by flooding a host or a network router with more traffic than it can handle.

(Multiple Choice)
4.8/5
(35)

A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.

(Multiple Choice)
4.8/5
(30)

Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.

(Multiple Choice)
4.9/5
(46)

IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN)solutions for remote access.

(Multiple Choice)
4.7/5
(25)

The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.

(True/False)
4.8/5
(37)

____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.

(Multiple Choice)
4.8/5
(23)

Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).

(Multiple Choice)
4.8/5
(31)

A(n)____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.

(Multiple Choice)
4.8/5
(38)

Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.

(Essay)
5.0/5
(34)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)