Chapter 9: Security Flashcards

1
Q

In the Kerberos Policy Settings, what is the default value for Maximum Lifetime for User Ticket?

A

10 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following do attackers use if they want to find an organization’s dial-up ports?

A

war dialer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following allows designated recovery agents to create public keys that can decode encrypted information?

A

Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a role that can be selected when you install Active Directory Certificate Services on a Windows Server 2008 computer?

A

intermediate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following contains a digest of the certificate data used for digital signing?

A

thumbprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is known as the cryptographic key that is used in exchanges between the security principal and the KDC?

A

long-term key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following types of connections is established between two computers involved in the tunneling process?

A

PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following specifies a value assigned by the CA that uniquely identifies the certificate?

A

serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following template versions provides backward compatibility for CAs running Windows Server 2003 Standard Edition and Windows 2000 family operating systems?

A

version 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Smartcard User is a version __________ certificate template.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For encryption on a data network to be both possible and practical, what form of encryption do computers typically use?

A

public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the default maximum password age?

A

42 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ACL is a collection of individual permissions presented in what form?

A

access control entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following authentication devices verifies the identity of a user during logon?

A

smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not a required permission that must be granted to the same user or group for the autoenrollment certificate template permission to function correctly?

A

Allow Write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of list does SAM enable computers to maintain?

A

local users and groups that function as a decentralized authentication system

17
Q

For authentication, PPTP supports all of the following authentication protocols except __________.

A

Microsoft Point-to-Point Encryption (MPPE)

18
Q

Which of the following terms specifies the functions for which a digital certificate can be used?

A

enhanced key usage

19
Q

In Windows Server 2008, a root CA’s self-generated certificate defaults to a validity period of __________.

A

5 years

20
Q

Which of the following methods enables the server to support authentication with smart cards or other types of digital certificates?

A

Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

21
Q

Which of the following is not an important criterion that firewalls can use in their rules?

A

DNS name

22
Q

Effective permissions for a given resource can be assigned in various ways. Which of the following is not a way in which they can be assigned?

A

application controlled

23
Q

Which of the following is the most popular biometric technology in use today?

A

fingerprint matching

24
Q

Which of the following is the strongest authentication protocol supported by Windows Server 2008?

A

Extensible Authentication Protocol (EAP)

25
Q

Which of the following Windows Server 2008 Certificate templates allows user authentication, EFS encryption, secure email, and certificate trust list signing?

A

administrator

26
Q

Which of the following is not a reason code for revoking a certificate?

A

certificate compromise