Exam 10: Securing Windows Server 2008
Exam 1: Introduction to Windows Server 200842 Questions
Exam 2: Installing Windows Server 200842 Questions
Exam 3: Networking with Windows Server 200842 Questions
Exam 4: Installing and Configuring the Dynamic Host Configuration Protocol42 Questions
Exam 5: Introduction to DNS in Windows Server 200842 Questions
Exam 6: Managing and Administering DNS in Windows Server 200842 Questions
Exam 7: Configuring File Services in Windows Server 200842 Questions
Exam 8: Introduction to Printers in a Windows Server 2008 Network42 Questions
Exam 9: Network Policy and Access Services in Windows Server 200842 Questions
Exam 10: Securing Windows Server 200843 Questions
Exam 11: Managing and Monitoring a Windows Server 2008 Network41 Questions
Select questions type
Secure Socket Layer (SSL) and Secure Shell (SSH) can protect Transport layer protocols and information such as TCP and UDP.
(True/False)
4.8/5
(28)
IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) solutions for remote access.
(Multiple Choice)
5.0/5
(32)
Briefly describe the following network profiles: Public, Private, and Domain.
(Essay)
4.9/5
(33)
Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB) flash drive in place of TPM
(Essay)
4.8/5
(35)
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.
(Multiple Choice)
4.8/5
(39)
When a user encrypts a file, a symmetric file encryption key (FEK) is generated that EFS uses to encrypt the file.
(True/False)
4.8/5
(41)
In Active Directory domain environments, _________________________ is used by clients for host authentication.
(Short Answer)
4.8/5
(28)
How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?
(Essay)
4.7/5
(32)
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.
(Multiple Choice)
4.8/5
(33)
Match each item with a statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(41)
Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.
(Essay)
4.9/5
(31)
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.
(Multiple Choice)
4.8/5
(37)
Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.
(Short Answer)
4.9/5
(33)
Windows Firewall does not allow you to create exceptions for inbound traffic.
(True/False)
4.8/5
(35)
Match each item with a statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(38)
A(n) ____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.
(Multiple Choice)
4.8/5
(25)
EFS uses a combination of private and public key encryption for securing a user's data.
(True/False)
4.8/5
(36)
Showing 21 - 40 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)