Lesson 8: Planning Server and Network Security Flashcards

1
Q
  1. Which of the following terms refers to automatic identification of individuals based on physiological characteristics?
    a) keys
    b) keycards
    c) combinations
    d) biometrics
A

d) biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following is the most popular biometric technology in use today?
    a) hand geometry
    b) iris or retinal scans
    c) fingerprint matching
    d) speech recognition
A

c) fingerprint matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What process circumvents security barriers by persuading authorized users to provide passwords or other sensitive information?
    a) social engineering
    b) administrative engineering
    c) security engineering
    d) uninvasive verification
A

a) social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following is essentially a series of filters that examine the contents of packets and traffic patterns to and from the network to determine which packets they should allow to pass through the filter?
    a) tunneling
    b) port control
    c) firewall
    d) Trojan horse
A

c) firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is not an important criterion that firewalls can use in their rules?
    a) DNS name
    b) IP addresses
    c) protocol numbers
    d) port numbers
A

a) DNS name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following is not a port that Windows uses for network browsing?
    a) 5355
    b) 8080
    c) 137
    d) 138
A

b) 8080

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which network profile is not supported by Windows Server 2008?
    a) domain
    b) server
    c) public
    d) private
A

b) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following is not a default configuration of Windows Firewall?
    a) The firewall is turned on.
    b) Incoming traffic is blocked unless it matches a rule.
    c) The firewall is turned off.
    d) Outgoing traffic is allowed unless it matches a rule.
A

c) The firewall is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following is the only technology included in Windows Server 2008 that can protect data while it is in transit?
    a) Encrypting File System (EFS)
    b) BitLocker
    c) IPsec
    d) Windows Firewall
A

c) IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following is not an operation mode in BitLocker?
    a) transparent operation mode
    b) user authentication mode
    c) volume encryption mode
    d) USB key mode
A

c) volume encryption mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Proof of identity typically takes one of three forms. Which of the following is not a typical form of proof?
    a) something you see
    b) something you know
    c) something you have
    d) something you are
A

a) something you see

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. For encryption on a data network to be both possible and practical, what form of encryption do computers typically use?
    a) secret key
    b) public key
    c) Kerberos
    d) decentralized
A

b) public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What type of list does SAM enable computers to maintain?
    a) network credentials
    b) authentication information
    c) local users and groups that function as a decentralized authentication system
    d) authenticated user requests for access to domain resources
A

c) local users and groups that function as a decentralized authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following is an example of a strong password?
    a) Password
    b) 55Caterpillars
    c) *&_I5y#<.h
    d) 09071981
A

b) 55Caterpillars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following is the default maximum password age?
    a) 22 days
    b) 30 days
    c) 40 days
    d) 42 days
A

d) 42 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is known as the cryptographic key that is used in exchanges between the security principal and the KDC?
    a) short-term key
    b) long-term key
    c) Kerberos key
    d) ticket
A

b) long-term key

17
Q
  1. In the Kerberos Policy Settings, what is the default value for Maximum Lifetime for User Ticket?
    a) 5 hours
    b) 7 hours
    c) 8 hours
    d) 10 hours
A

d) 10 hours

18
Q
  1. An ACL is a collection of individual permissions presented in what form?
    a) access control entries
    b) security principals
    c) access control principals
    d) special permissions
A

a) access control entries

19
Q
  1. Effective permissions for a given resource can be assigned in various ways. Which of the following is not a way in which they can be assigned?
    a) application controlled
    b) group membership
    c) explicitly assigned
    d) inherited
A

a) application controlled

20
Q
  1. Which of the following biometric authentication mechanisms is suitable for verification but not identification?
    a) hand geometry
    b) iris or retinal scans
    c) fingerprint matching
    d) speech recognition
A

a) hand geometry

21
Q
  1. Multiple laptops are used by management and technical support personnel. You need to ensure that all data on the hard disks are encrypted on the laptops and when the operating system is booted, the authorized user is present. What do you recommend as a solution?
    a) EFS
    b) BitLocker
    c) DFS
    d) WINS
A

b) BitLocker

22
Q
  1. You administer an Active Directory domain with multiple branch offices, each containing domain controllers and member servers. The domain controllers are running Windows Server 2003 R2 with SP1. You need to ensure that if you use BitLocker on a volume and if the BitLocker keys are corrupted on the computer, the recovery information is stored in a central location. What should you do?

a) Upgrade all domain controllers to Windows Server 2008 R2. Configure the Group policy to enable TPM backups to Active Directory.
b) Upgrade all domain controllers to Windows Server 2008 R2. Create a Data Recovery Agent.
c) Upgrade at least one domain controller to Windows Server 2008 R2. Configure the Group policy to enable TPM backups to Active Directory.
d) Upgrade the PDC emulator to Windows Server 2008 R2. Create a Data Recovery Agent.

A

a) Upgrade all domain controllers to Windows Server 2008 R2. Configure the Group policy to enable TPM backups to Active Directory.

23
Q
  1. What is the best way to manage Windows Firewall across all computer workstations and laptops?
    a) Local group policies
    b) Domain-based group policy
    c) System policy
    d) Startup script
A

b) Domain-based group policy