Chapter 9: Security Flashcards

1
Q

In the Kerberos Policy Settings, what is the default value for Maximum Lifetime for User Ticket?

A

10 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following do attackers use if they want to find an organization’s dial-up ports?

A

war dialer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following allows designated recovery agents to create public keys that can decode encrypted information?

A

Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a role that can be selected when you install Active Directory Certificate Services on a Windows Server 2008 computer?

A

intermediate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following contains a digest of the certificate data used for digital signing?

A

thumbprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is known as the cryptographic key that is used in exchanges between the security principal and the KDC?

A

long-term key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following types of connections is established between two computers involved in the tunneling process?

A

PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following specifies a value assigned by the CA that uniquely identifies the certificate?

A

serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following template versions provides backward compatibility for CAs running Windows Server 2003 Standard Edition and Windows 2000 family operating systems?

A

version 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Smartcard User is a version __________ certificate template.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For encryption on a data network to be both possible and practical, what form of encryption do computers typically use?

A

public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the default maximum password age?

A

42 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ACL is a collection of individual permissions presented in what form?

A

access control entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following authentication devices verifies the identity of a user during logon?

A

smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not a required permission that must be granted to the same user or group for the autoenrollment certificate template permission to function correctly?

A

Allow Write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of list does SAM enable computers to maintain?

A

local users and groups that function as a decentralized authentication system

17
Q

For authentication, PPTP supports all of the following authentication protocols except __________.

A

Microsoft Point-to-Point Encryption (MPPE)

18
Q

Which of the following terms specifies the functions for which a digital certificate can be used?

A

enhanced key usage

19
Q

In Windows Server 2008, a root CA’s self-generated certificate defaults to a validity period of __________.

20
Q

Which of the following methods enables the server to support authentication with smart cards or other types of digital certificates?

A

Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

21
Q

Which of the following is not an important criterion that firewalls can use in their rules?

22
Q

Effective permissions for a given resource can be assigned in various ways. Which of the following is not a way in which they can be assigned?

A

application controlled

23
Q

Which of the following is the most popular biometric technology in use today?

A

fingerprint matching

24
Q

Which of the following is the strongest authentication protocol supported by Windows Server 2008?

A

Extensible Authentication Protocol (EAP)

25
Which of the following Windows Server 2008 Certificate templates allows user authentication, EFS encryption, secure email, and certificate trust list signing?
administrator
26
Which of the following is not  a reason code for revoking a certificate?
certificate compromise