Exam 7: Securing Windows Server 2008 Servers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ provides updates for all supported versions of Windows operating systems.

(Multiple Choice)
4.8/5
(36)
Match each statement with the correct term below.
Additional product functionality that wasn’t included in the original release
trusted
Connections from the Internet from customers, remote employees, or trusted business partners
feature packs
A dedicated application that can be installed on a server to perform as a firewall
hardening
Correct Answer:
Verified
Premises:
Responses:
Additional product functionality that wasn’t included in the original release
trusted
Connections from the Internet from customers, remote employees, or trusted business partners
feature packs
A dedicated application that can be installed on a server to perform as a firewall
hardening
Collections of updates and fixes that often include additional features
system policy rules
Connections on the internal network from company-owned resources and employees
untrusted
Identify traffic and protocols that are allowed to and from the perimeter network
perimeter network
Connections from the Internet
ISA Server
The process of making a system more secure from the default configuration
service packs
Added as a buffer between an internal protected network and an external unprotected network
semi-trusted
(Matching)
4.7/5
(40)

Discuss options for creating a perimeter network.

(Essay)
4.9/5
(44)

When hardening a system, start by making sure that only the needed services and protocols are installed and enabled.

(True/False)
4.8/5
(38)

When MBSA is installed, the ____ command-line utility is also installed, which can be used to run MBSA from the command line.

(Multiple Choice)
4.9/5
(42)

Regularly checking systems to ensure that they haven't been changed is called ____.

(Multiple Choice)
4.7/5
(33)

The scwcmd command ____ is used to apply the security policy to the system.

(Multiple Choice)
4.7/5
(41)

The value of any command-line tool is that it can be ____.

(Multiple Choice)
4.9/5
(38)

List and explain one concern when considering adding WSUS to a network.

(Essay)
4.8/5
(44)

____ checks include possible security issues such as whether the Guest account is enabled, the file system isn't NTFS, or whether there are excessive members of the Administrators group.

(Multiple Choice)
4.8/5
(30)

Within a domain environment, ____ can be used as a central location to download and approve updates.

(Multiple Choice)
4.8/5
(36)

____ are software components designed to support hardware.

(Multiple Choice)
4.7/5
(31)

____________________ identify resources in one network that can communicate with resources in another network.

(Short Answer)
4.8/5
(39)

List and explain the three parts to the Microsoft SD³+C approach.

(Essay)
4.9/5
(35)

____ are a group of updates used to target a specific area such as security, or a specific component or application.

(Multiple Choice)
4.9/5
(31)

____ logs an event when a user account or group is added, deleted, or modified, or when a password is set or modified.

(Multiple Choice)
4.8/5
(33)

WSUS includes the ability to export and import updates to and from media.

(True/False)
4.9/5
(31)

List and describe a primary benefit provided by WSUS.

(Essay)
4.9/5
(31)

____ audits user logon events when a user is authenticated from a local computer (not a domain controller).

(Multiple Choice)
4.8/5
(27)

The scwcmd command ____ can be used to extend the SCW database by adding roles, tasks, services, and port definitions.

(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)