Exam 13: Securing Windows Server 2008

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List two areas where NAP can be used to ensure compliance with network security policies.

Free
(Essay)
4.7/5
(31)
Correct Answer:
Verified

IPsec
VPN
DHCP
Terminal Services Gateway
802.1X

The use of ____ in Windows Server 2008 enables you to standardize the working environment of clients and servers by setting policies in Active Directory.

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

C

IPsec policies for a domain can be managed through the ____.

Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
Verified

D

Explain the purpose of TS Gateway.

(Essay)
4.8/5
(37)

If a drive is protected using ____,no one can access information without proper authentication even if the drive has been stolen.

(Multiple Choice)
4.8/5
(36)

List the items issued by DHCP with NAP if a client is fully compliant,and if the client is noncompliant.

(Essay)
4.8/5
(28)

____ encryption is the standard deployed by the U.S.federal government and is intended to be more secure than DES.

(Multiple Choice)
4.8/5
(39)

For a "strong password" Microsoft recommends a minimum of ____ characters.

(Multiple Choice)
4.9/5
(38)

Using NAP,all network clients must contact the HRA server and submit information about their security policy status and recent upgrades-called a ____.

(Multiple Choice)
4.8/5
(31)

NAP cannot work in conjunction with 802.1X.

(True/False)
4.9/5
(31)

____ applications involves setting up software through a group policy so that the application is available for users to install from a central application distribution server,such as through the Add/Remove Programs capability or an installation window via the user's desktop.

(Multiple Choice)
4.7/5
(42)

To determine compliance,NAP uses a server that is a ____.

(Multiple Choice)
4.8/5
(27)

User ____ enable an account or group to perform predefined tasks.

(Multiple Choice)
4.9/5
(30)

Match each term with the correct statement below. -A portion of a network that is between two networks,such as between a private network and the Internet

(Multiple Choice)
4.7/5
(39)

NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.

(True/False)
4.8/5
(39)

Match each term with the correct statement below. -A security specification for a hardware device that can be used to secure information on a different hardware device,such as a hard drive

(Multiple Choice)
4.8/5
(38)

Match each term with the correct statement below. -A comprehensive set of security features that monitors and manages a server and its clients

(Multiple Choice)
4.7/5
(37)

List and describe two specific password security options that you can configure in Windows Server 2008.

(Essay)
4.9/5
(41)

Match each term with the correct statement below. -An Active Directory object that contains group policy settings (a set of group policies)for a site,domain,OU,or local computer

(Multiple Choice)
4.8/5
(28)

____________________ policies are a subset of individual policies within a larger group policy for a site,domain,OU,or local computer.

(Short Answer)
4.9/5
(36)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)