Exam 7: Securing Windows Server 2008 Servers
Exam 1: Designing Active Directory Domain Services42 Questions
Exam 2: Designing Physical Topology42 Questions
Exam 3: Designing and Implementing DNS42 Questions
Exam 4: Designing and Implementing Group Policy42 Questions
Exam 5: Designing Remote Access and Terminal Services Strategies42 Questions
Exam 6: Designing and Implementing a PKI42 Questions
Exam 7: Securing Windows Server 2008 Servers42 Questions
Exam 8: Designing High Availability and Business Continuity42 Questions
Exam 9: Designing Supporting Services42 Questions
Exam 10: Designing Virtualization Strategies31 Questions
Select questions type
A scheduled ____ provides automation and streamlines an administrator's job.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
A
When you run SCW, it creates a configuration ____________________ of all the possible server roles, client features, options, services, and Windows firewall settings.
Free
(Short Answer)
4.8/5
(35)
Correct Answer:
database
____ if enabled, logs events when a user exercises most user rights.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
D
You can use Server Manager to create a security policy that can be applied to any system to reduce the attack surface.
(True/False)
4.8/5
(31)
____ logs tracking information events such as program activation and process exits.
(Multiple Choice)
4.9/5
(38)
Explain the difference between an upstream server and a downstream server.
(Essay)
4.8/5
(31)
In general, ____ record who performed an action, what action was performed, and when and where it was performed.
(Multiple Choice)
4.8/5
(35)
A perimeter network is provided by using two firewalls; this arrangement is often referred to as a(n) ____.
(Multiple Choice)
4.8/5
(30)
The SCW GUI version can be used to perform compliance auditing on a system.
(True/False)
4.8/5
(38)
A ____ system starts with a reduced attack surface; it is regularly audited to ensure that it remains secure and is kept up to date.
(Multiple Choice)
4.9/5
(38)
When two WSUS servers are working as upstream/downstream servers in ____ mode, the upstream server sends all the updates it receives to the downstream server.
(Multiple Choice)
4.8/5
(41)
In the context of server security, a(n) ____________________ is a starting point for a server that locks it down as much as possible while also allowing it to operate.
(Short Answer)
4.9/5
(29)
____ can be used to track the actions of users and record the details of these actions in the Windows Security log.
(Multiple Choice)
4.8/5
(43)
The scwcmd command ____________________ is used to analyze a system against a policy and determine if the system is compliant with the policy.
(Short Answer)
4.9/5
(32)
You can perform the compliance audit with the following command: ____
(Multiple Choice)
4.8/5
(29)
____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.
(Short Answer)
4.8/5
(28)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)