Deck 10: Securing Windows Server 2008

Full screen (f)
exit full mode
Question
Clients use a(n)____ to determine to what type of network they are connected.

A)network profile
B)label
C)exception
D)forwarder
Use Space or
up arrow
down arrow
to flip the card.
Question
Secure Socket Layer (SSL)and Secure Shell (SSH)can protect Transport layer protocols and information such as TCP and UDP.
Question
A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.

A)man-in-the-middle
B)identity spoofing
C)denial of service
D)data tampering
Question
Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).

A)network address translation
B)dial-up networking
C)DFS
D)New Technology File System
Question
A(n)____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.

A)disk quota
B)BitLocker
C)exception
D)rule
Question
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.

A)tunnel mode
B)public key encryption
C)VPN
D)BitLocker
Question
Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.

A)RADIUS
B)VPN
C)Layer 2 Tunneling
D)enhanced security mode
Question
IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN)solutions for remote access.

A)transport mode
B)routing table
C)socket
D)tunnel mode
Question
____ attacks are performed by flooding a host or a network router with more traffic than it can handle.

A)Man-in-the-middle attacks
B)Identity spoofing
C)Denial of service
D)Data tampering
Question
____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.

A)Man-in-the-middle attack
B)Identity spoofing
C)Repudiation
D)Data tampering
Question
A ____ is a microchip that performs basic security tasks with encryption keys.

A)stub zone
B)Trusted Protection Module
C)root hint
D)DHCP relay agent
Question
____ provides hard drive-based encryption of servers and Windows Vista computers.

A)BitLocker
B)Internet Key Exchange
C)Symmetric encryption
D)Multifactor authentication
Question
IPSec's ____ provides secure communications between two networks through a single node.

A)transport mode
B)routing table
C)socket
D)tunnel mode
Question
Windows Firewall does not allow you to create exceptions for inbound traffic.
Question
The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.
Question
When a user encrypts a file, a symmetric file encryption key (FEK)is generated that EFS uses to encrypt the file.
Question
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.

A)Repudiation
B)Network traffic sniffing
C)Identity spoofing
D)Denial of service
Question
EFS uses a combination of private and public key encryption for securing a user's data.
Question
____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.

A)Netsh
B)Ipconfig
C)Cipher.exe
D)Ping
Question
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.

A)Network Access Protection
B)Symmetric encryption
C)Network address translation
D)Demand-dial routing
Question
In Active Directory domain environments, _________________________ is used by clients for host authentication.
Question
_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.
Question
____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.

A)DHCP
B)UDP
C)Encapsulating Security Payload
D)Kerberos
Question
Briefly discuss the two phases used by IPSec to perform transactions.
Question
IPSec meets three basic goals. Briefly discuss these goals.
Question
Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB)flash drive in place of TPM
Question
List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.
Question
The ____ is responsible for managing the network health and connectivity policies on a network.

A)System Health Validator
B)Remediation Server
C)System Health Agent
D)Network Policy Server
Question
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.

A)IGMP
B)Internet Key Exchange
C)UDP
D)L2TP
Question
Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.
Question
Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.
Question
How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?
Question
____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.

A)Internet Key Exchang e
B)Authentication Header
C)BitLocker
D)Encapsulating Security Payload
Question
Briefly describe the following network profiles: Public, Private, and Domain.
Question
What are the limitations of BitLocker?
Question
List three authentication protocols supported by Windows Server 2008.
Question
The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).
Question
_____________________________________________ is an open-standards framework for securing network communications.
Question
The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.

A)digital certificate
B)header
C)Kerberos
D)preshared keys
Question
All forms of NTLM use the ____.

A)challenge-response protocol
B)Internet Key Exchange
C)tunnel mode
D)public key encryption
Question
Match between columns
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
WFAS
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Netsh
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Server-to-Server
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Tunnel
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
GPME
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Custom
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Authentication Exemption Rule
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Isolation
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
IP Security Policy snap-in
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
WFAS
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Netsh
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Server-to-Server
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Tunnel
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
GPME
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Custom
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Authentication Exemption Rule
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Isolation
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
IP Security Policy snap-in
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
WFAS
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Netsh
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Server-to-Server
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Tunnel
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
GPME
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Custom
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Authentication Exemption Rule
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Isolation
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
IP Security Policy snap-in
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
WFAS
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Netsh
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Server-to-Server
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Tunnel
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
GPME
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Custom
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Authentication Exemption Rule
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Isolation
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
IP Security Policy snap-in
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
WFAS
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Netsh
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Server-to-Server
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Tunnel
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
GPME
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Custom
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Authentication Exemption Rule
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Isolation
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
IP Security Policy snap-in
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
WFAS
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Netsh
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Server-to-Server
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Tunnel
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
GPME
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Custom
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Authentication Exemption Rule
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Isolation
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
IP Security Policy snap-in
This template creates rules that restrict network connections based on administrator-defined policies.
WFAS
This template creates rules that restrict network connections based on administrator-defined policies.
Netsh
This template creates rules that restrict network connections based on administrator-defined policies.
Server-to-Server
This template creates rules that restrict network connections based on administrator-defined policies.
Tunnel
This template creates rules that restrict network connections based on administrator-defined policies.
GPME
This template creates rules that restrict network connections based on administrator-defined policies.
Custom
This template creates rules that restrict network connections based on administrator-defined policies.
Authentication Exemption Rule
This template creates rules that restrict network connections based on administrator-defined policies.
Isolation
This template creates rules that restrict network connections based on administrator-defined policies.
IP Security Policy snap-in
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
WFAS
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Netsh
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Server-to-Server
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Tunnel
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
GPME
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Custom
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Authentication Exemption Rule
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Isolation
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
IP Security Policy snap-in
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
WFAS
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Netsh
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Server-to-Server
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Tunnel
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
GPME
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Custom
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Authentication Exemption Rule
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Isolation
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
IP Security Policy snap-in
Question
What is the purpose of the System Health Validator?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Securing Windows Server 2008
1
Clients use a(n)____ to determine to what type of network they are connected.

A)network profile
B)label
C)exception
D)forwarder
A
2
Secure Socket Layer (SSL)and Secure Shell (SSH)can protect Transport layer protocols and information such as TCP and UDP.
False
3
A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.

A)man-in-the-middle
B)identity spoofing
C)denial of service
D)data tampering
A
4
Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).

A)network address translation
B)dial-up networking
C)DFS
D)New Technology File System
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A(n)____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.

A)disk quota
B)BitLocker
C)exception
D)rule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.

A)tunnel mode
B)public key encryption
C)VPN
D)BitLocker
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.

A)RADIUS
B)VPN
C)Layer 2 Tunneling
D)enhanced security mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN)solutions for remote access.

A)transport mode
B)routing table
C)socket
D)tunnel mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ attacks are performed by flooding a host or a network router with more traffic than it can handle.

A)Man-in-the-middle attacks
B)Identity spoofing
C)Denial of service
D)Data tampering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.

A)Man-in-the-middle attack
B)Identity spoofing
C)Repudiation
D)Data tampering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ is a microchip that performs basic security tasks with encryption keys.

A)stub zone
B)Trusted Protection Module
C)root hint
D)DHCP relay agent
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ provides hard drive-based encryption of servers and Windows Vista computers.

A)BitLocker
B)Internet Key Exchange
C)Symmetric encryption
D)Multifactor authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
IPSec's ____ provides secure communications between two networks through a single node.

A)transport mode
B)routing table
C)socket
D)tunnel mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Windows Firewall does not allow you to create exceptions for inbound traffic.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
When a user encrypts a file, a symmetric file encryption key (FEK)is generated that EFS uses to encrypt the file.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.

A)Repudiation
B)Network traffic sniffing
C)Identity spoofing
D)Denial of service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
EFS uses a combination of private and public key encryption for securing a user's data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.

A)Netsh
B)Ipconfig
C)Cipher.exe
D)Ping
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.

A)Network Access Protection
B)Symmetric encryption
C)Network address translation
D)Demand-dial routing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
In Active Directory domain environments, _________________________ is used by clients for host authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.

A)DHCP
B)UDP
C)Encapsulating Security Payload
D)Kerberos
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Briefly discuss the two phases used by IPSec to perform transactions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
IPSec meets three basic goals. Briefly discuss these goals.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB)flash drive in place of TPM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
The ____ is responsible for managing the network health and connectivity policies on a network.

A)System Health Validator
B)Remediation Server
C)System Health Agent
D)Network Policy Server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.

A)IGMP
B)Internet Key Exchange
C)UDP
D)L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.

A)Internet Key Exchang e
B)Authentication Header
C)BitLocker
D)Encapsulating Security Payload
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Briefly describe the following network profiles: Public, Private, and Domain.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the limitations of BitLocker?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
List three authentication protocols supported by Windows Server 2008.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
_____________________________________________ is an open-standards framework for securing network communications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.

A)digital certificate
B)header
C)Kerberos
D)preshared keys
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
All forms of NTLM use the ____.

A)challenge-response protocol
B)Internet Key Exchange
C)tunnel mode
D)public key encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
WFAS
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Netsh
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Server-to-Server
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Tunnel
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
GPME
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Custom
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Authentication Exemption Rule
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
Isolation
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
IP Security Policy snap-in
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
WFAS
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Netsh
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Server-to-Server
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Tunnel
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
GPME
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Custom
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Authentication Exemption Rule
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
Isolation
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
IP Security Policy snap-in
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
WFAS
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Netsh
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Server-to-Server
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Tunnel
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
GPME
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Custom
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Authentication Exemption Rule
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
Isolation
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
IP Security Policy snap-in
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
WFAS
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Netsh
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Server-to-Server
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Tunnel
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
GPME
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Custom
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Authentication Exemption Rule
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Isolation
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
IP Security Policy snap-in
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
WFAS
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Netsh
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Server-to-Server
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Tunnel
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
GPME
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Custom
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Authentication Exemption Rule
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
Isolation
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
IP Security Policy snap-in
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
WFAS
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Netsh
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Server-to-Server
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Tunnel
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
GPME
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Custom
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Authentication Exemption Rule
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
Isolation
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
IP Security Policy snap-in
This template creates rules that restrict network connections based on administrator-defined policies.
WFAS
This template creates rules that restrict network connections based on administrator-defined policies.
Netsh
This template creates rules that restrict network connections based on administrator-defined policies.
Server-to-Server
This template creates rules that restrict network connections based on administrator-defined policies.
Tunnel
This template creates rules that restrict network connections based on administrator-defined policies.
GPME
This template creates rules that restrict network connections based on administrator-defined policies.
Custom
This template creates rules that restrict network connections based on administrator-defined policies.
Authentication Exemption Rule
This template creates rules that restrict network connections based on administrator-defined policies.
Isolation
This template creates rules that restrict network connections based on administrator-defined policies.
IP Security Policy snap-in
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
WFAS
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Netsh
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Server-to-Server
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Tunnel
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
GPME
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Custom
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Authentication Exemption Rule
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
Isolation
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
IP Security Policy snap-in
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
WFAS
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Netsh
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Server-to-Server
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Tunnel
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
GPME
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Custom
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Authentication Exemption Rule
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
Isolation
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
IP Security Policy snap-in
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What is the purpose of the System Health Validator?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.