Exam 13: Securing Windows Server 2008

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

TS Gateway combined with NAP uses the ____________________ server to ensure that a client is compliant with the health and security policies on a network.

(Short Answer)
4.7/5
(31)

In Windows Server 2008,____ ensures secure access and communication when Terminal Services are used over the Internet.

(Multiple Choice)
4.8/5
(36)

A(n)____________________ server is one that can provide updates and security policy changes to the client to bring that client into compliance.

(Short Answer)
4.8/5
(27)

Discuss establishing account policies.

(Essay)
4.9/5
(44)

____ are security rights developed by Microsoft to provide security for documents,spreadsheets,e-mail,and other types of files created by applications.

(Multiple Choice)
4.8/5
(45)

Match each term with the correct statement below. -Programs that you choose to allow through the firewall in both directions

(Multiple Choice)
4.8/5
(27)

List two ways that NAP can be used to keep a network healthy.

(Essay)
4.9/5
(29)

Discuss the IP addresses that NAT uses.

(Essay)
4.8/5
(29)

Match each term with the correct statement below. -Involves the use of tickets that are exchanged between the client who requests logon and network services access,and the server or Active Directory that grants access.

(Multiple Choice)
4.8/5
(37)

UAC means there is little chance that the installation can destabilize the operating system,because the installation takes place only with the proper authorization and in standard user mode.

(True/False)
4.8/5
(30)

Match each term with the correct statement below. -A wired and wireless authentication approach offered by the IEEE and is supported in modern Windows operating systems including Windows XP,Windows Vista,Windows 7,and Windows Server 2003/2008

(Multiple Choice)
4.9/5
(35)

Through ____________________,NAP allows computers that are considered noncompliant to access the local network.

(Short Answer)
5.0/5
(33)

Computers in the DMZ generally have more security defenses via routers and firewalls.

(True/False)
5.0/5
(38)

Discuss why NAT is a good security technique.

(Essay)
4.8/5
(32)

In terms of NAP,"____" refers to ensuring that all authenticated computers on the network have the most recent updates and comply with network security policies.

(Multiple Choice)
4.8/5
(41)

The first line of defense in Windows Server 2008 is ____ security.

(Multiple Choice)
4.8/5
(45)

____ applications means an application is automatically represented on the user's desktop,for example as a Start menu option or as an icon on the desktop,and which initially is really a link to the central application distribution server.

(Multiple Choice)
4.9/5
(32)

A common password policy is to have ____ go into effect after five to 10 unsuccessful logon attempts.

(Multiple Choice)
4.8/5
(39)

One reason for developing ____________________ was to enable the use of more globally available IP addresses.

(Short Answer)
4.8/5
(30)

Discuss the two important functions that NAT serves.

(Essay)
4.7/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)