Exam 10: Securing Windows Server 2008

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Secure Socket Layer (SSL) and Secure Shell (SSH) can protect Transport layer protocols and information such as TCP and UDP.

(True/False)
4.8/5
(28)

IPSec meets three basic goals. Briefly discuss these goals.

(Essay)
4.9/5
(32)

IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) solutions for remote access.

(Multiple Choice)
5.0/5
(32)

What is the purpose of the System Health Validator?

(Essay)
4.9/5
(30)

Briefly describe the following network profiles: Public, Private, and Domain.

(Essay)
4.9/5
(33)

Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB) flash drive in place of TPM

(Essay)
4.8/5
(35)

____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.

(Multiple Choice)
4.8/5
(39)

When a user encrypts a file, a symmetric file encryption key (FEK) is generated that EFS uses to encrypt the file.

(True/False)
4.8/5
(41)

In Active Directory domain environments, _________________________ is used by clients for host authentication.

(Short Answer)
4.8/5
(28)

How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?

(Essay)
4.7/5
(32)

With ____, each user has a public key that is available to everyone and a private key that is known only to the user.

(Multiple Choice)
4.8/5
(33)
Match each item with a statement below.
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Netsh
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
GPME
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Custom
Correct Answer:
Verified
Premises:
Responses:
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Netsh
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
GPME
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Custom
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Isolation
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Server-to-Server
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Tunnel
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Authentication Exemption Rule
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
WFAS
This template creates rules that restrict network connections based on administrator-defined policies.
IP Security Policy snap-in
(Matching)
4.8/5
(41)

Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.

(Essay)
4.9/5
(31)

For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.

(Multiple Choice)
4.8/5
(37)

Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.

(Short Answer)
4.9/5
(33)

Windows Firewall does not allow you to create exceptions for inbound traffic.

(True/False)
4.8/5
(35)
Match each item with a statement below.
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Custom
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Server-to-Server
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
GPME
Correct Answer:
Verified
Premises:
Responses:
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Custom
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Server-to-Server
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
GPME
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Authentication Exemption Rule
This template creates rules that restrict network connections based on administrator-defined policies.
Isolation
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
WFAS
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
IP Security Policy snap-in
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Netsh
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Tunnel
(Matching)
4.8/5
(38)

A(n) ____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.

(Multiple Choice)
4.8/5
(25)

EFS uses a combination of private and public key encryption for securing a user's data.

(True/False)
4.8/5
(36)

What are the limitations of BitLocker?

(Essay)
4.9/5
(35)
Showing 21 - 40 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)