Deck 7: Securing Windows Server 2008 Servers
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 7: Securing Windows Server 2008 Servers
1
A ____ system starts with a reduced attack surface; it is regularly audited to ensure that it remains secure and is kept up to date.
A) hardened
C) constrained
B) restricted
D) hindered
A) hardened
C) constrained
B) restricted
D) hindered
A
2
The scwcmd command ____ is used to apply the security policy to the system.
A) enable
C) display
B) configure
D) register
A) enable
C) display
B) configure
D) register
B
3
The scwcmd command ____ can be used to extend the SCW database by adding roles, tasks, services, and port definitions.
A) configure
C) transform
B) rebuild
D) register
A) configure
C) transform
B) rebuild
D) register
D
4
When hardening a system, start by making sure that only the needed services and protocols are installed and enabled.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A perimeter network is provided by using two firewalls; this arrangement is often referred to as a(n) ____.
A) restricted zone
C) demilitarized zone
B) internal zone
D) buffer zone
A) restricted zone
C) demilitarized zone
B) internal zone
D) buffer zone
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ logs an event when a user account or group is added, deleted, or modified, or when a password is set or modified.
A) Audit account management
C) Audit file management
B) Audit object management
D) Audit user management
A) Audit account management
C) Audit file management
B) Audit object management
D) Audit user management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ can be used to track the actions of users and record the details of these actions in the Windows Security log.
A) Policy monitoring
C) Eventlog monitoring
B) Scanning
D) Auditing
A) Policy monitoring
C) Eventlog monitoring
B) Scanning
D) Auditing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A scheduled ____ provides automation and streamlines an administrator's job.
A) script
C) baseline
B) interface
D) tool
A) script
C) baseline
B) interface
D) tool
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ if enabled, logs events when a user exercises most user rights.
A) Audit logon
B) Audit object
C) Audit account
D) Audit privilege use
A) Audit logon
B) Audit object
C) Audit account
D) Audit privilege use
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The SCW GUI version can be used to perform compliance auditing on a system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
You can perform the compliance audit with the following command: ____
A) scwcmd configure /p:PolicyPathName
B) scwcmd display /p:PolicyPathName
C) scwcmd analyze /p:PolicyPathandName
D) scwcmd baseline /p:PolicyPathName
A) scwcmd configure /p:PolicyPathName
B) scwcmd display /p:PolicyPathName
C) scwcmd analyze /p:PolicyPathandName
D) scwcmd baseline /p:PolicyPathName
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
WSUS includes the ability to export and import updates to and from media.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The value of any command-line tool is that it can be ____.
A) kept secure
C) scheduled
B) controlled
D) scripted
A) kept secure
C) scheduled
B) controlled
D) scripted
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ checks include possible security issues such as whether the Guest account is enabled, the file system isn't NTFS, or whether there are excessive members of the Administrators group.
A) Windows administrative vulnerabilities
C) Common security vulnerabilities
B) Windows patches
D) Windows configuration vulnerabilities
A) Windows administrative vulnerabilities
C) Common security vulnerabilities
B) Windows patches
D) Windows configuration vulnerabilities
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
You can use Server Manager to create a security policy that can be applied to any system to reduce the attack surface.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ audits user logon events when a user is authenticated from a local computer (not a domain controller).
A) Audit account management
C) Audit object events
B) Audit logon events
D) Audit privilege use
A) Audit account management
C) Audit object events
B) Audit logon events
D) Audit privilege use
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
When MBSA is installed, the ____ command-line utility is also installed, which can be used to run MBSA from the command line.
A) MBSAGUI
C) MBSA /CLI
B) MBSACLI
D) MBSA MMC
A) MBSAGUI
C) MBSA /CLI
B) MBSACLI
D) MBSA MMC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In general, ____ record who performed an action, what action was performed, and when and where it was performed.
A) security log entries
C) system log entries
B) auditing log entries
D) application log entries
A) security log entries
C) system log entries
B) auditing log entries
D) application log entries
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Regularly checking systems to ensure that they haven't been changed is called ____.
A) compliance certification
C) compliance auditing
B) compliance baselining
D) compliance hardening
A) compliance certification
C) compliance auditing
B) compliance baselining
D) compliance hardening
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The scwcmd command transform is used to roll back the settings of the last applied SCW security policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____ logs tracking information events such as program activation and process exits.
A) Audit account management
B) Audit log purging
C) Audit process tracking
D) Audit token tracking
A) Audit account management
B) Audit log purging
C) Audit process tracking
D) Audit token tracking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ provides updates for all supported versions of Windows operating systems.
A) Windows Update
B) Microsoft Update
C) Windows Control
D) Software Update
A) Windows Update
B) Microsoft Update
C) Windows Control
D) Software Update
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Discuss using WSUS with branch offices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ identify resources in one network that can communicate with resources in another network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Within a domain environment, ____ can be used as a central location to download and approve updates.
A) BITS
B) Microsoft Server Update Services
C) Windows Update Services
D) Windows Server Update Services
A) BITS
B) Microsoft Server Update Services
C) Windows Update Services
D) Windows Server Update Services
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
In the context of server security, a(n) ____________________ is a starting point for a server that locks it down as much as possible while also allowing it to operate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Name and describe a primary tool used for compliance auditing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
List and explain the three parts to the Microsoft SD³+C approach.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
When two WSUS servers are working as upstream/downstream servers in ____ mode, the upstream server sends all the updates it receives to the downstream server.
A) autonomous
B) synchronous
C) automatic
D) controlled
A) autonomous
B) synchronous
C) automatic
D) controlled
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
List and describe a primary benefit provided by WSUS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Explain the difference between an upstream server and a downstream server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____ are a group of updates used to target a specific area such as security, or a specific component or application.
A) Service packs
B) Drivers
C) Update rollups
D) Updates
A) Service packs
B) Drivers
C) Update rollups
D) Updates
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ are software components designed to support hardware.
A) Interfaces
B) Drivers
C) Applications
D) Update rollups
A) Interfaces
B) Drivers
C) Applications
D) Update rollups
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
List and describe two areas that should be considered when hardening a system's security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Explain how to install WSUS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The scwcmd command ____________________ is used to analyze a system against a policy and determine if the system is compliant with the policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
List and explain one concern when considering adding WSUS to a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
When you run SCW, it creates a configuration ____________________ of all the possible server roles, client features, options, services, and Windows firewall settings.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Discuss options for creating a perimeter network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the purpose of the WSUS statistics server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck