Exam 13: Securing Windows Server 2008
Exam 1: Introduction to Windows Server 200850 Questions
Exam 2: Installing Windows Server 200850 Questions
Exam 3: Configuring the Windows Server 2008 Environment50 Questions
Exam 4: Introduction to Active Directory and Account Management50 Questions
Exam 5: Configuring, managing, and Troubleshooting Resource Access50 Questions
Exam 6: Configuring Windows Server 2008 Printing50 Questions
Exam 7: Configuring and Managing Data Storage50 Questions
Exam 8: Managing Windows Server 2008 Network Services50 Questions
Exam 9: Deploying Iis and Active Directory Certificate Services50 Questions
Exam 10: Configuring Remote Access Services50 Questions
Exam 11: Windows Server 2008 Virtualization50 Questions
Exam 12: Application and Data Provisioning50 Questions
Exam 13: Securing Windows Server 200850 Questions
Exam 14: Server and Network Monitoring50 Questions
Exam 15: Managing System Reliability and Availability50 Questions
Select questions type
List two areas where NAP can be used to ensure compliance with network security policies.
Free
(Essay)
4.7/5
(31)
Correct Answer:
IPsec
VPN
DHCP
Terminal Services Gateway
802.1X
The use of ____ in Windows Server 2008 enables you to standardize the working environment of clients and servers by setting policies in Active Directory.
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
C
IPsec policies for a domain can be managed through the ____.
Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
D
If a drive is protected using ____,no one can access information without proper authentication even if the drive has been stolen.
(Multiple Choice)
4.8/5
(36)
List the items issued by DHCP with NAP if a client is fully compliant,and if the client is noncompliant.
(Essay)
4.8/5
(28)
____ encryption is the standard deployed by the U.S.federal government and is intended to be more secure than DES.
(Multiple Choice)
4.8/5
(39)
For a "strong password" Microsoft recommends a minimum of ____ characters.
(Multiple Choice)
4.9/5
(38)
Using NAP,all network clients must contact the HRA server and submit information about their security policy status and recent upgrades-called a ____.
(Multiple Choice)
4.8/5
(31)
____ applications involves setting up software through a group policy so that the application is available for users to install from a central application distribution server,such as through the Add/Remove Programs capability or an installation window via the user's desktop.
(Multiple Choice)
4.7/5
(42)
User ____ enable an account or group to perform predefined tasks.
(Multiple Choice)
4.9/5
(30)
Match each term with the correct statement below.
-A portion of a network that is between two networks,such as between a private network and the Internet
(Multiple Choice)
4.7/5
(39)
NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.
(True/False)
4.8/5
(39)
Match each term with the correct statement below.
-A security specification for a hardware device that can be used to secure information on a different hardware device,such as a hard drive
(Multiple Choice)
4.8/5
(38)
Match each term with the correct statement below.
-A comprehensive set of security features that monitors and manages a server and its clients
(Multiple Choice)
4.7/5
(37)
List and describe two specific password security options that you can configure in Windows Server 2008.
(Essay)
4.9/5
(41)
Match each term with the correct statement below.
-An Active Directory object that contains group policy settings (a set of group policies)for a site,domain,OU,or local computer
(Multiple Choice)
4.8/5
(28)
____________________ policies are a subset of individual policies within a larger group policy for a site,domain,OU,or local computer.
(Short Answer)
4.9/5
(36)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)