Deck 13: Securing Windows Server 2008
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 13: Securing Windows Server 2008
1
The use of ____ in Windows Server 2008 enables you to standardize the working environment of clients and servers by setting policies in Active Directory.
A) server policy
B) user policy
C) group policy
D) machine policy
A) server policy
B) user policy
C) group policy
D) machine policy
C
2
____ is a server role to complement the client applications that can take advantage of Rights Management Services safeguards.
A) Active Directory Certificate Services
B) Active Directory Lightweight Directory Services
C) Active Directory Rights Management Services
D) Active Directory User Management Services
A) Active Directory Certificate Services
B) Active Directory Lightweight Directory Services
C) Active Directory Rights Management Services
D) Active Directory User Management Services
C
3
____ is an encryption technique that uses public and private keys along with a computer algorithm that relies on factoring large prime numbers.
A) AES
B) RSA
C) DES
D) Twofish
A) AES
B) RSA
C) DES
D) Twofish
B
4
____ is a set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF).
A) IPsec
B) PPTP
C) DES
D) AES
A) IPsec
B) PPTP
C) DES
D) AES
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
If a drive is protected using ____,no one can access information without proper authentication even if the drive has been stolen.
A) BitLocker Drive Encryption
B) BitLocker Drive Vault
C) BitLocker System Encryption
D) BitLocker Volume Encryption
A) BitLocker Drive Encryption
B) BitLocker Drive Vault
C) BitLocker System Encryption
D) BitLocker Volume Encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A common password policy is to have ____ go into effect after five to 10 unsuccessful logon attempts.
A) logout
B) lockout
C) reboot
D) lock
A) logout
B) lockout
C) reboot
D) lock
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ encryption is the standard deployed by the U.S.federal government and is intended to be more secure than DES.
A) Advanced Encryption Standard
B) Blowfish
C) PGP
D) RSA
A) Advanced Encryption Standard
B) Blowfish
C) PGP
D) RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
IPsec policies for a domain can be managed through the ____.
A) Default Domain Controller Policy
B) Default Computer Policy
C) Default Encryption Policy
D) Default Domain Policy
A) Default Domain Controller Policy
B) Default Computer Policy
C) Default Encryption Policy
D) Default Domain Policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
NAP cannot work in conjunction with 802.1X.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
DHCP is an extremely secure protocol.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The first line of defense in Windows Server 2008 is ____ security.
A) user
B) token
C) file
D) password
A) user
B) token
C) file
D) password
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
____ applications involves setting up software through a group policy so that the application is available for users to install from a central application distribution server,such as through the Add/Remove Programs capability or an installation window via the user's desktop.
A) Publishing
B) Packaging
C) Licensing
D) Assigning
A) Publishing
B) Packaging
C) Licensing
D) Assigning
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In Kerberos security,the permanent ticket,called a ____ ticket,is good for the duration of a logon session.
A) granting
B) connection
C) service
D) session
A) granting
B) connection
C) service
D) session
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
When an IPsec communication begins between two computers,the computers first exchange ____ to authenticate the receiver and sender.
A) keys
B) certificates
C) passwords
D) tickets
A) keys
B) certificates
C) passwords
D) tickets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ are security rights developed by Microsoft to provide security for documents,spreadsheets,e-mail,and other types of files created by applications.
A) Client Management Services
B) Rights Configuration Services
C) Rights Management Services
D) Client Rights Services
A) Client Management Services
B) Rights Configuration Services
C) Rights Management Services
D) Client Rights Services
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
UAC means there is little chance that the installation can destabilize the operating system,because the installation takes place only with the proper authorization and in standard user mode.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
User ____ enable an account or group to perform predefined tasks.
A) passwords
B) roles
C) services
D) rights
A) passwords
B) roles
C) services
D) rights
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
For a "strong password" Microsoft recommends a minimum of ____ characters.
A) five
B) six
C) seven
D) eight
A) five
B) six
C) seven
D) eight
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Computers in the DMZ generally have more security defenses via routers and firewalls.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In Windows Server 2008,____ ensures secure access and communication when Terminal Services are used over the Internet.
A) TS RemoteApp
B) TS Server
C) TS Gateway
D) TS Manager
A) TS RemoteApp
B) TS Server
C) TS Gateway
D) TS Manager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
One reason for developing ____________________ was to enable the use of more globally available IP addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Involves the use of tickets that are exchanged between the client who requests logon and network services access,and the server or Active Directory that grants access.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Involves the use of tickets that are exchanged between the client who requests logon and network services access,and the server or Active Directory that grants access.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A portion of a network that is between two networks,such as between a private network and the Internet
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A portion of a network that is between two networks,such as between a private network and the Internet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
To determine compliance,NAP uses a server that is a ____.
A) Health Management Authority
B) Health Monitoring Authority
C) Health Policy Authority
D) Health Registration Authority
A) Health Management Authority
B) Health Monitoring Authority
C) Health Policy Authority
D) Health Registration Authority
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Programs that you choose to allow through the firewall in both directions
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Programs that you choose to allow through the firewall in both directions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
TS Gateway combined with NAP uses the ____________________ server to ensure that a client is compliant with the health and security policies on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
____________________ policies are a subset of individual policies within a larger group policy for a site,domain,OU,or local computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
In terms of NAP,"____" refers to ensuring that all authenticated computers on the network have the most recent updates and comply with network security policies.
A) healthy
B) examined
C) complete
D) managed
A) healthy
B) examined
C) complete
D) managed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A security specification for a hardware device that can be used to secure information on a different hardware device,such as a hard drive
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A security specification for a hardware device that can be used to secure information on a different hardware device,such as a hard drive
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Through ____________________,NAP allows computers that are considered noncompliant to access the local network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A wired and wireless authentication approach offered by the IEEE and is supported in modern Windows operating systems including Windows XP,Windows Vista,Windows 7,and Windows Server 2003/2008
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A wired and wireless authentication approach offered by the IEEE and is supported in modern Windows operating systems including Windows XP,Windows Vista,Windows 7,and Windows Server 2003/2008
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
____ is used to make the implementation and troubleshooting of group policies much simpler for an administrator.
A) Policy Evaluation
B) Effective Policy
C) Resultant Set of Policy
D) Merged Set of Policy
A) Policy Evaluation
B) Effective Policy
C) Resultant Set of Policy
D) Merged Set of Policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Designed to keep the user running in the standard user mode as a way to more fully insulate the kernel and to keep operating system and desktop files stabilized
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Designed to keep the user running in the standard user mode as a way to more fully insulate the kernel and to keep operating system and desktop files stabilized
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Using NAP,all network clients must contact the HRA server and submit information about their security policy status and recent upgrades-called a ____.
A) Statement of Service
B) Statement of Health
C) Statement of Availability
D) Statement of Function
A) Statement of Service
B) Statement of Health
C) Statement of Availability
D) Statement of Function
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
____ applications means an application is automatically represented on the user's desktop,for example as a Start menu option or as an icon on the desktop,and which initially is really a link to the central application distribution server.
A) Packaging
B) Publishing
C) Defining
D) Assigning
A) Packaging
B) Publishing
C) Defining
D) Assigning
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A(n)____________________ server is one that can provide updates and security policy changes to the client to bring that client into compliance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A comprehensive set of security features that monitors and manages a server and its clients
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A comprehensive set of security features that monitors and manages a server and its clients
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
An Active Directory object that contains group policy settings (a set of group policies)for a site,domain,OU,or local computer
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
An Active Directory object that contains group policy settings (a set of group policies)for a site,domain,OU,or local computer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A relatively new security measure for protecting hard drives
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A relatively new security measure for protecting hard drives
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
List two ways that NAP can be used to keep a network healthy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What happens after the HRA server validates a client's SoH?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
List two areas where NAP can be used to ensure compliance with network security policies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List and describe two specific password security options that you can configure in Windows Server 2008.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Discuss establishing account policies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Discuss why NAT is a good security technique.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain the purpose of TS Gateway.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List the items issued by DHCP with NAP if a client is fully compliant,and if the client is noncompliant.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the two important functions that NAT serves.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Discuss the IP addresses that NAT uses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck