Exam 7: Securing Windows Server 2008 Servers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A scheduled ____ provides automation and streamlines an administrator's job.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

When you run SCW, it creates a configuration ____________________ of all the possible server roles, client features, options, services, and Windows firewall settings.

Free
(Short Answer)
4.8/5
(35)
Correct Answer:
Verified

database

____ if enabled, logs events when a user exercises most user rights.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

D

Name and describe a primary tool used for compliance auditing.

(Essay)
4.9/5
(32)

Explain how to install WSUS.

(Essay)
4.9/5
(34)

You can use Server Manager to create a security policy that can be applied to any system to reduce the attack surface.

(True/False)
4.8/5
(31)

____ logs tracking information events such as program activation and process exits.

(Multiple Choice)
4.9/5
(38)

Explain the difference between an upstream server and a downstream server.

(Essay)
4.8/5
(31)

In general, ____ record who performed an action, what action was performed, and when and where it was performed.

(Multiple Choice)
4.8/5
(35)

A perimeter network is provided by using two firewalls; this arrangement is often referred to as a(n) ____.

(Multiple Choice)
4.8/5
(30)

The SCW GUI version can be used to perform compliance auditing on a system.

(True/False)
4.8/5
(38)

A ____ system starts with a reduced attack surface; it is regularly audited to ensure that it remains secure and is kept up to date.

(Multiple Choice)
4.9/5
(38)

Discuss using WSUS with branch offices.

(Essay)
4.8/5
(32)

When two WSUS servers are working as upstream/downstream servers in ____ mode, the upstream server sends all the updates it receives to the downstream server.

(Multiple Choice)
4.8/5
(41)

In the context of server security, a(n) ____________________ is a starting point for a server that locks it down as much as possible while also allowing it to operate.

(Short Answer)
4.9/5
(29)

____ can be used to track the actions of users and record the details of these actions in the Windows Security log.

(Multiple Choice)
4.8/5
(43)

Describe the purpose of the WSUS statistics server.

(Essay)
4.8/5
(32)

The scwcmd command ____________________ is used to analyze a system against a policy and determine if the system is compliant with the policy.

(Short Answer)
4.9/5
(32)

You can perform the compliance audit with the following command: ____

(Multiple Choice)
4.8/5
(29)

____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.

(Short Answer)
4.8/5
(28)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)