Exam 13: Securing Windows Server 2008
Exam 1: Introduction to Windows Server 200850 Questions
Exam 2: Installing Windows Server 200850 Questions
Exam 3: Configuring the Windows Server 2008 Environment50 Questions
Exam 4: Introduction to Active Directory and Account Management50 Questions
Exam 5: Configuring, managing, and Troubleshooting Resource Access50 Questions
Exam 6: Configuring Windows Server 2008 Printing50 Questions
Exam 7: Configuring and Managing Data Storage50 Questions
Exam 8: Managing Windows Server 2008 Network Services50 Questions
Exam 9: Deploying Iis and Active Directory Certificate Services50 Questions
Exam 10: Configuring Remote Access Services50 Questions
Exam 11: Windows Server 2008 Virtualization50 Questions
Exam 12: Application and Data Provisioning50 Questions
Exam 13: Securing Windows Server 200850 Questions
Exam 14: Server and Network Monitoring50 Questions
Exam 15: Managing System Reliability and Availability50 Questions
Select questions type
____ is an encryption technique that uses public and private keys along with a computer algorithm that relies on factoring large prime numbers.
(Multiple Choice)
4.8/5
(32)
In Kerberos security,the permanent ticket,called a ____ ticket,is good for the duration of a logon session.
(Multiple Choice)
4.9/5
(25)
Match each term with the correct statement below.
-A relatively new security measure for protecting hard drives
(Multiple Choice)
4.8/5
(35)
When an IPsec communication begins between two computers,the computers first exchange ____ to authenticate the receiver and sender.
(Multiple Choice)
4.9/5
(31)
____ is a server role to complement the client applications that can take advantage of Rights Management Services safeguards.
(Multiple Choice)
4.9/5
(36)
____ is used to make the implementation and troubleshooting of group policies much simpler for an administrator.
(Multiple Choice)
4.8/5
(25)
Match each term with the correct statement below.
-Designed to keep the user running in the standard user mode as a way to more fully insulate the kernel and to keep operating system and desktop files stabilized
(Multiple Choice)
4.9/5
(31)
____ is a set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF).
(Multiple Choice)
4.8/5
(26)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)