Exam 10: Securing Windows Server 2008
Exam 1: Introduction to Windows Server 200842 Questions
Exam 2: Installing Windows Server 200842 Questions
Exam 3: Networking With Windows Server 200842 Questions
Exam 4: Installing and Configuring the Dynamic Host Configuration Protocol42 Questions
Exam 5: Introduction to Dns in Windows Server 200842 Questions
Exam 6: Managing and Administering Dns in Windows Server 200842 Questions
Exam 7: Configuring File Services in Windows Server 200842 Questions
Exam 8: Introduction to Printers in a Windows Server 2008 Network42 Questions
Exam 9: Network Policy and Access Services in Windows Server 200842 Questions
Exam 10: Securing Windows Server 200842 Questions
Exam 11: Managing and Monitoring a Windows Server 2008 Network42 Questions
Select questions type
When a user encrypts a file, a symmetric file encryption key (FEK)is generated that EFS uses to encrypt the file.
(True/False)
4.8/5
(43)
List three authentication protocols supported by Windows Server 2008.
(Essay)
4.8/5
(37)
The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.
(Multiple Choice)
4.8/5
(37)
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.
(Multiple Choice)
4.8/5
(31)
Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.
(Short Answer)
5.0/5
(36)
EFS uses a combination of private and public key encryption for securing a user's data.
(True/False)
4.8/5
(40)
____ provides hard drive-based encryption of servers and Windows Vista computers.
(Multiple Choice)
4.7/5
(27)
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.
(Multiple Choice)
4.7/5
(32)
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.
(Multiple Choice)
4.8/5
(38)
A ____ is a microchip that performs basic security tasks with encryption keys.
(Multiple Choice)
4.9/5
(35)
____ attacks are performed by flooding a host or a network router with more traffic than it can handle.
(Multiple Choice)
4.8/5
(35)
A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.
(Multiple Choice)
4.8/5
(30)
Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.
(Multiple Choice)
4.9/5
(46)
IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN)solutions for remote access.
(Multiple Choice)
4.7/5
(25)
The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.
(True/False)
4.8/5
(37)
____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.
(Multiple Choice)
4.8/5
(23)
Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).
(Multiple Choice)
4.8/5
(31)
A(n)____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.
(Multiple Choice)
4.8/5
(38)
Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.
(Essay)
5.0/5
(34)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)