Deck 10: Securing Windows Server 2008
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 10: Securing Windows Server 2008
1
Clients use a(n)____ to determine to what type of network they are connected.
A)network profile
B)label
C)exception
D)forwarder
A)network profile
B)label
C)exception
D)forwarder
A
2
Secure Socket Layer (SSL)and Secure Shell (SSH)can protect Transport layer protocols and information such as TCP and UDP.
False
3
A(n)____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.
A)man-in-the-middle
B)identity spoofing
C)denial of service
D)data tampering
A)man-in-the-middle
B)identity spoofing
C)denial of service
D)data tampering
A
4
Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).
A)network address translation
B)dial-up networking
C)DFS
D)New Technology File System
A)network address translation
B)dial-up networking
C)DFS
D)New Technology File System
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A(n)____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.
A)disk quota
B)BitLocker
C)exception
D)rule
A)disk quota
B)BitLocker
C)exception
D)rule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.
A)tunnel mode
B)public key encryption
C)VPN
D)BitLocker
A)tunnel mode
B)public key encryption
C)VPN
D)BitLocker
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.
A)RADIUS
B)VPN
C)Layer 2 Tunneling
D)enhanced security mode
A)RADIUS
B)VPN
C)Layer 2 Tunneling
D)enhanced security mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP)virtual private network (VPN)solutions for remote access.
A)transport mode
B)routing table
C)socket
D)tunnel mode
A)transport mode
B)routing table
C)socket
D)tunnel mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ attacks are performed by flooding a host or a network router with more traffic than it can handle.
A)Man-in-the-middle attacks
B)Identity spoofing
C)Denial of service
D)Data tampering
A)Man-in-the-middle attacks
B)Identity spoofing
C)Denial of service
D)Data tampering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.
A)Man-in-the-middle attack
B)Identity spoofing
C)Repudiation
D)Data tampering
A)Man-in-the-middle attack
B)Identity spoofing
C)Repudiation
D)Data tampering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ is a microchip that performs basic security tasks with encryption keys.
A)stub zone
B)Trusted Protection Module
C)root hint
D)DHCP relay agent
A)stub zone
B)Trusted Protection Module
C)root hint
D)DHCP relay agent
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ provides hard drive-based encryption of servers and Windows Vista computers.
A)BitLocker
B)Internet Key Exchange
C)Symmetric encryption
D)Multifactor authentication
A)BitLocker
B)Internet Key Exchange
C)Symmetric encryption
D)Multifactor authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
IPSec's ____ provides secure communications between two networks through a single node.
A)transport mode
B)routing table
C)socket
D)tunnel mode
A)transport mode
B)routing table
C)socket
D)tunnel mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Windows Firewall does not allow you to create exceptions for inbound traffic.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
When a user encrypts a file, a symmetric file encryption key (FEK)is generated that EFS uses to encrypt the file.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.
A)Repudiation
B)Network traffic sniffing
C)Identity spoofing
D)Denial of service
A)Repudiation
B)Network traffic sniffing
C)Identity spoofing
D)Denial of service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
EFS uses a combination of private and public key encryption for securing a user's data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.
A)Netsh
B)Ipconfig
C)Cipher.exe
D)Ping
A)Netsh
B)Ipconfig
C)Cipher.exe
D)Ping
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.
A)Network Access Protection
B)Symmetric encryption
C)Network address translation
D)Demand-dial routing
A)Network Access Protection
B)Symmetric encryption
C)Network address translation
D)Demand-dial routing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
In Active Directory domain environments, _________________________ is used by clients for host authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.
A)DHCP
B)UDP
C)Encapsulating Security Payload
D)Kerberos
A)DHCP
B)UDP
C)Encapsulating Security Payload
D)Kerberos
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Briefly discuss the two phases used by IPSec to perform transactions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
IPSec meets three basic goals. Briefly discuss these goals.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB)flash drive in place of TPM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
The ____ is responsible for managing the network health and connectivity policies on a network.
A)System Health Validator
B)Remediation Server
C)System Health Agent
D)Network Policy Server
A)System Health Validator
B)Remediation Server
C)System Health Agent
D)Network Policy Server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.
A)IGMP
B)Internet Key Exchange
C)UDP
D)L2TP
A)IGMP
B)Internet Key Exchange
C)UDP
D)L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.
A)Internet Key Exchang e
B)Authentication Header
C)BitLocker
D)Encapsulating Security Payload
A)Internet Key Exchang e
B)Authentication Header
C)BitLocker
D)Encapsulating Security Payload
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Briefly describe the following network profiles: Public, Private, and Domain.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the limitations of BitLocker?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
List three authentication protocols supported by Windows Server 2008.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
_____________________________________________ is an open-standards framework for securing network communications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.
A)digital certificate
B)header
C)Kerberos
D)preshared keys
A)digital certificate
B)header
C)Kerberos
D)preshared keys
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
All forms of NTLM use the ____.
A)challenge-response protocol
B)Internet Key Exchange
C)tunnel mode
D)public key encryption
A)challenge-response protocol
B)Internet Key Exchange
C)tunnel mode
D)public key encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What is the purpose of the System Health Validator?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck