Exam 10: Securing Windows Server 2008

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All forms of NTLM use the ____.

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

A

____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

The ____ is responsible for managing the network health and connectivity policies on a network.

(Multiple Choice)
4.9/5
(35)

_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.

(Short Answer)
4.8/5
(41)

____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.

(Multiple Choice)
4.8/5
(37)

The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.

(True/False)
4.8/5
(37)

____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.

(Multiple Choice)
4.8/5
(34)

List three authentication protocols supported by Windows Server 2008.

(Essay)
4.9/5
(39)

List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.

(Essay)
4.9/5
(33)

Briefly discuss the two phases used by IPSec to perform transactions.

(Essay)
4.9/5
(39)

____ attacks are performed by flooding a host or a network router with more traffic than it can handle.

(Multiple Choice)
4.8/5
(33)

A(n) ____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.

(Multiple Choice)
4.8/5
(46)

Clients use a(n) ____ to determine to what type of network they are connected.

(Multiple Choice)
4.9/5
(39)

____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.

(Multiple Choice)
4.9/5
(32)

A ____ is a microchip that performs basic security tasks with encryption keys.

(Multiple Choice)
4.8/5
(40)

_____________________________________________ is an open-standards framework for securing network communications.

(Short Answer)
4.8/5
(29)

The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.

(Multiple Choice)
4.8/5
(38)

____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.

(Multiple Choice)
4.7/5
(45)

The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).

(Short Answer)
5.0/5
(27)
Showing 1 - 20 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)