Exam 4: Account-Based Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
Windows 2000 Professional is typically installed with an Administrator account and a Guest account.
(True/False)
4.7/5
(37)
In Windows Server 2003, ____________________ generally relate to managing server or Active Directory functions.
(Short Answer)
4.8/5
(29)
The useradd - m command enables you to create a new user and establishes the home directory, if it has not previously been set up.
(True/False)
4.9/5
(35)
Which operating system may come configured to automatically boot into an account without an account or password screen enabled?
(Multiple Choice)
4.9/5
(40)
Which preconfigured Windows Server 2003 administrative template is used for managing desktop settings that are common to all of Windows 95, 98, and NT?
(Multiple Choice)
4.9/5
(37)
Which preconfigured Windows Server 2003 administrative template is used for dial-up, language, and temporary Internet files settings in Internet Explorer?
(Multiple Choice)
4.8/5
(38)
A formal account policy may include decisions about the format of usernames and restrictions on how passwords are constructed.
(True/False)
4.7/5
(37)
The ____________________ template is used to manage how Windows updates are performed through the Internet.
(Short Answer)
4.7/5
(30)
Under most circumstances, it is best for the network administrator to create and control all user passwords.
(True/False)
4.9/5
(37)
In UNIX/Linux systems, what seven pieces of information does the password file contain?
(Essay)
4.8/5
(32)
What two important tools are included with Mac OS X Server that enable server management?
(Essay)
5.0/5
(38)
List three conventions for account names based on the user's actual name.
(Essay)
4.9/5
(31)
The Windows XP Professional ____________________ account is used for remote desktop help.
(Short Answer)
4.8/5
(42)
Which account properties tab provides information about the logon name, domain name, and account options?
(Multiple Choice)
4.8/5
(37)
Which of the following operating systems are capable of monitoring unsuccessful logon attempts?
(Multiple Choice)
5.0/5
(45)
What three security properties can be configured in the Red Hat User Manager?
(Essay)
4.9/5
(34)
Which operating system uses the dialog in the figure above to create accounts?

(Multiple Choice)
4.8/5
(40)
How many characters does Windows 2000 limit its user account names to?
(Multiple Choice)
4.7/5
(41)
Red Hat Linux is capable of monitoring unsuccessful logon attempts, in case an attacker attempts to break into an account by trying various password combinations or employing a brute force attack.
(True/False)
4.7/5
(43)
Showing 21 - 40 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)