Lesson 8: Planning Server and Network Security Flashcards
1
Q
- Which of the following terms refers to automatic identification of individuals based on physiological characteristics?
a) keys
b) keycards
c) combinations
d) biometrics
A
d) biometrics
2
Q
- Which of the following is the most popular biometric technology in use today?
a) hand geometry
b) iris or retinal scans
c) fingerprint matching
d) speech recognition
A
c) fingerprint matching
3
Q
- What process circumvents security barriers by persuading authorized users to provide passwords or other sensitive information?
a) social engineering
b) administrative engineering
c) security engineering
d) uninvasive verification
A
a) social engineering
4
Q
- Which of the following is essentially a series of filters that examine the contents of packets and traffic patterns to and from the network to determine which packets they should allow to pass through the filter?
a) tunneling
b) port control
c) firewall
d) Trojan horse
A
c) firewall
5
Q
- Which of the following is not an important criterion that firewalls can use in their rules?
a) DNS name
b) IP addresses
c) protocol numbers
d) port numbers
A
a) DNS name
6
Q
- Which of the following is not a port that Windows uses for network browsing?
a) 5355
b) 8080
c) 137
d) 138
A
b) 8080
7
Q
- Which network profile is not supported by Windows Server 2008?
a) domain
b) server
c) public
d) private
A
b) server
8
Q
- Which of the following is not a default configuration of Windows Firewall?
a) The firewall is turned on.
b) Incoming traffic is blocked unless it matches a rule.
c) The firewall is turned off.
d) Outgoing traffic is allowed unless it matches a rule.
A
c) The firewall is turned off.
9
Q
- Which of the following is the only technology included in Windows Server 2008 that can protect data while it is in transit?
a) Encrypting File System (EFS)
b) BitLocker
c) IPsec
d) Windows Firewall
A
c) IPsec
10
Q
- Which of the following is not an operation mode in BitLocker?
a) transparent operation mode
b) user authentication mode
c) volume encryption mode
d) USB key mode
A
c) volume encryption mode
11
Q
- Proof of identity typically takes one of three forms. Which of the following is not a typical form of proof?
a) something you see
b) something you know
c) something you have
d) something you are
A
a) something you see
12
Q
- For encryption on a data network to be both possible and practical, what form of encryption do computers typically use?
a) secret key
b) public key
c) Kerberos
d) decentralized
A
b) public key
13
Q
- What type of list does SAM enable computers to maintain?
a) network credentials
b) authentication information
c) local users and groups that function as a decentralized authentication system
d) authenticated user requests for access to domain resources
A
c) local users and groups that function as a decentralized authentication system
14
Q
- Which of the following is an example of a strong password?
a) Password
b) 55Caterpillars
c) *&_I5y#<.h
d) 09071981
A
b) 55Caterpillars
15
Q
- Which of the following is the default maximum password age?
a) 22 days
b) 30 days
c) 40 days
d) 42 days
A
d) 42 days