Exam 4: Account-Based Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Windows 2000 Professional is typically installed with an Administrator account and a Guest account.

(True/False)
4.7/5
(37)

On which of the following can you set a group policy?

(Multiple Choice)
4.9/5
(35)

In Windows Server 2003, ____________________ generally relate to managing server or Active Directory functions.

(Short Answer)
4.8/5
(29)

The useradd - m command enables you to create a new user and establishes the home directory, if it has not previously been set up.

(True/False)
4.9/5
(35)

Which operating system may come configured to automatically boot into an account without an account or password screen enabled?

(Multiple Choice)
4.9/5
(40)

Which preconfigured Windows Server 2003 administrative template is used for managing desktop settings that are common to all of Windows 95, 98, and NT?

(Multiple Choice)
4.9/5
(37)

Which preconfigured Windows Server 2003 administrative template is used for dial-up, language, and temporary Internet files settings in Internet Explorer?

(Multiple Choice)
4.8/5
(38)

A formal account policy may include decisions about the format of usernames and restrictions on how passwords are constructed.

(True/False)
4.7/5
(37)

The ____________________ template is used to manage how Windows updates are performed through the Internet.

(Short Answer)
4.7/5
(30)

Under most circumstances, it is best for the network administrator to create and control all user passwords.

(True/False)
4.9/5
(37)

In UNIX/Linux systems, what seven pieces of information does the password file contain?

(Essay)
4.8/5
(32)

What two important tools are included with Mac OS X Server that enable server management?

(Essay)
5.0/5
(38)

List three conventions for account names based on the user's actual name.

(Essay)
4.9/5
(31)

The Windows XP Professional ____________________ account is used for remote desktop help.

(Short Answer)
4.8/5
(42)

Which account properties tab provides information about the logon name, domain name, and account options?

(Multiple Choice)
4.8/5
(37)

Which of the following operating systems are capable of monitoring unsuccessful logon attempts?

(Multiple Choice)
5.0/5
(45)

What three security properties can be configured in the Red Hat User Manager?

(Essay)
4.9/5
(34)

  Which operating system uses the dialog in the figure above to create accounts? Which operating system uses the dialog in the figure above to create accounts?

(Multiple Choice)
4.8/5
(40)

How many characters does Windows 2000 limit its user account names to?

(Multiple Choice)
4.7/5
(41)

Red Hat Linux is capable of monitoring unsuccessful logon attempts, in case an attacker attempts to break into an account by trying various password combinations or employing a brute force attack.

(True/False)
4.7/5
(43)
Showing 21 - 40 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)