Exam 10: Securing Windows Server 2008
Exam 1: Introduction to Windows Server 200842 Questions
Exam 2: Installing Windows Server 200842 Questions
Exam 3: Networking with Windows Server 200842 Questions
Exam 4: Installing and Configuring the Dynamic Host Configuration Protocol42 Questions
Exam 5: Introduction to DNS in Windows Server 200842 Questions
Exam 6: Managing and Administering DNS in Windows Server 200842 Questions
Exam 7: Configuring File Services in Windows Server 200842 Questions
Exam 8: Introduction to Printers in a Windows Server 2008 Network42 Questions
Exam 9: Network Policy and Access Services in Windows Server 200842 Questions
Exam 10: Securing Windows Server 200843 Questions
Exam 11: Managing and Monitoring a Windows Server 2008 Network41 Questions
Select questions type
____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
C
Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
The ____ is responsible for managing the network health and connectivity policies on a network.
(Multiple Choice)
4.9/5
(35)
_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.
(Short Answer)
4.8/5
(41)
____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.
(Multiple Choice)
4.8/5
(37)
The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.
(True/False)
4.8/5
(37)
____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.
(Multiple Choice)
4.8/5
(34)
List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.
(Essay)
4.9/5
(33)
Briefly discuss the two phases used by IPSec to perform transactions.
(Essay)
4.9/5
(39)
____ attacks are performed by flooding a host or a network router with more traffic than it can handle.
(Multiple Choice)
4.8/5
(33)
A(n) ____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.
(Multiple Choice)
4.8/5
(46)
Clients use a(n) ____ to determine to what type of network they are connected.
(Multiple Choice)
4.9/5
(39)
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.
(Multiple Choice)
4.9/5
(32)
A ____ is a microchip that performs basic security tasks with encryption keys.
(Multiple Choice)
4.8/5
(40)
_____________________________________________ is an open-standards framework for securing network communications.
(Short Answer)
4.8/5
(29)
The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.
(Multiple Choice)
4.8/5
(38)
____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.
(Multiple Choice)
4.7/5
(45)
The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).
(Short Answer)
5.0/5
(27)
Showing 1 - 20 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)