IS3340 CHAPTER 11 Flashcards

1
Q

A special mode that allows administrators to created an offline copy of Active Directory is called ___?

A

DIRECTORY SERVICE RESTORE MODE (DSRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A rule that handles addressing and encapsulating is called ___?

A

ENCAPSULATING PROTOCOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of making configuration changes and deploying controls to reduce the attack surface is called ___?

A

HARDENING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A solution that defines and implements a policy that describes the requirements to access your network is called ___?

A

NETWORK ACCESS CONTROL (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An open source utility used to scan one or more computers or network devices for open ports and other information is called ___?

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A general approach to handling encryption keys using trusted entities and digital certificates; the hardware, software, policies, and procedures to manage all aspects of digital certificates is called ___?

A

PUBLIC KEY INFRASTRUCTURE (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A predefined set of services, programs, and configuration settings that enable a computer to fulfill a specific set of requirements is called ___?

A

ROLES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Microsoft utility that provides guidance to administrators and creates policies based on the least privilege principle for the server roles you have selected either during installation or afterward using the server Manager Utility is called ___?

A

SECURITY CONFIGURATION WIZARD (SCW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Windows Server 2008 R2 installation option that provides a minimal environment that only includes programs necessary for the roles you select is called ___?

A

SERVER CORE INSTALLATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technique that creates a virtual encrypted connection and allow applications to use any protocol to communicate with servers and services without having to worry about addressing or privacy concerns is called ___?

A

TUNNELING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The term ATTACK SURFACE refers to all of the software a computer runs that is vulnerable to attack.
    TRUE OR FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The best way to secure a service is to disable it.

TRUE OR FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. The process of making configuration changes and deploying controls to reduce the attack surface is called ___?
A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which Windows Server 2008 R2 feature allows you to specify which services you want to include during the operating system installation?
  2. Edition
  3. Role
  4. GPO
  5. Configuration
A

Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which Windows Server 2008 R2 installation option only includes a minimal environment to just run selected services?
  2. Server core
  3. Foundation
  4. Standard
  5. Runtime
A

Server core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which Microsoft tool guides administrators and creates policies based on least privilege to reduce the attack surface of a windows server after installation?
  2. GPO
  3. MBSA
  4. SCW
  5. NMAP
A

SCW

17
Q
  1. You can use GPOs to reply Windows firewall rules.

TRUE OR FALSE

A

TRUE

18
Q
  1. Which of the following actions is the best action to take to secure an unneeded service?
  2. Close the port
  3. Disable the service
  4. Delete the service from Services
  5. Create a GPO restriction for the service
A

Disable the service

19
Q
  1. You should disable the ___ user account to make it harder for attackers to access the default escalated-privilege account.
A

Administrator

20
Q
  1. AD makes securing many computers in a network more complex.
    TRUE OR FALSE
A

FALSE

21
Q
  1. The ___ tool is a handy open source tool to scan computers for open ports.
A

Nmap

22
Q
  1. Which term describes software that defines and implements a policy that describes the requirements to access your network?
  2. SCW
  3. VPN
  4. GPO
  5. NAC
A

NAC

23
Q
  1. VPNs increase security of remote connection by guaranteeing all traffic is encrypted.
    TRUE OR FALSE
A

FALSE

24
Q
  1. Which new Microsoft VPN protocol makes it easy to use VPNs even through firewalls?
  2. L2TP
  3. SSTP
  4. TLS
  5. TCP
A

SSTP

25
Q
  1. ___ refers to the hardware, software, policies, and procedures to manage all aspects of digital certificates.
A

PKI