Lesson 9: Securing Infrastructure Services Flashcards

1
Q
  1. Which of the following types of connections is established between two computers involved in the tunneling process?
    a) VPN
    b) PPP
    c) PPTP
    d) SSTP
A

b) PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. For authentication, PPTP supports all of the following authentication protocols except __________.
    a) Microsoft Challenge Handshake Authentication Protocol version 1
    b) Microsoft Challenge Handshake Authentication Protocol version 2
    c) Microsoft Point-to-Point Encryption (MPPE)
    d) Extensible Authentication Protocol
A

c) Microsoft Point-to-Point Encryption (MPPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Secure Socket Tunneling Protocol (SSTP) is supported only on clients running which of the following operating systems?
    a) Windows Vista
    b) Windows Vista with Service Pack 1
    c) Windows Server 2008
    d) Windows XP with Service Pack 2
A

b) Windows Vista with Service Pack 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following do attackers use if they want to find an organization’s dial-up ports?
    a) VPN requests
    b) port scanner
    c) war dialer
    d) application fuzzer
A

c) war dialer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is the strongest authentication protocol supported by Windows Server 2008?
    a) Microsoft Encrypted Authentication Version 2
    b) Challenge Handshake Authentication Protocol
    c) Password Authentication Protocol (PAP)
    d) Extensible Authentication Protocol (EAP)
A

d) Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following methods enables the server to support authentication with smart cards or other types of digital certificates?
    a) Extensible Authentication Protocol-Transport Level Security (EAP-TLS)
    b) Protected EAP (PEAP)
    c) Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2)
    d) Encrypted Authentication
A

a) Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following allows designated recovery agents to create public keys that can decode encrypted information?
    a) Internet authentication
    b) digital signatures
    c) Encrypting File System
    d) IP Security
A

c) Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following authentication devices verifies the identity of a user during logon?
    a) IP Security
    b) smart card
    c) software code signing
    d) Internet authentication
A

b) smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following terms specifies the functions for which a digital certificate can be used?
    a) public key
    b) key usage
    c) enhanced key usage
    d) subject
A

c) enhanced key usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following specifies a value assigned by the CA that uniquely identifies the certificate?
    a) signature algorithm
    b) serial number
    c) version
    d) subject
A

b) serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following contains a digest of the certificate data used for digital signing?
    a) certificate policies
    b) friendly name
    c) thumbprint algorithm
    d) thumbprint
A

d) thumbprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following is not a factor that administrators should consider when choosing the length for a certificate’s lifetime?
    a) provider of the certificate
    b) standard practices in the industry
    c) government regulations
    d) type of certificate
A

a) provider of the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. In Windows Server 2008, a root CA’s self-generated certificate defaults to a validity period of __________.
    a) 6 months
    b) 1 year
    c) 3 years
    d) 5 years
A

d) 5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following is not a role that can be selected when you install Active Directory Certificate Services on a Windows Server 2008 computer?
    a) subordinate
    b) enterprise
    c) standalone
    d) intermediate
A

d) intermediate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following is not a required permission that must be granted to the same user or group for the autoenrollment certificate template permission to function correctly?
    a) Allow Autoenroll
    b) Allow Enroll
    c) Allow Read
    d) Allow Write
A

d) Allow Write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following template versions provides backward compatibility for CAs running Windows Server 2003, Standard Edition and Windows 2000 family operating systems?
    a) version 1
    b) version 2
    c) version 3
    d) version 4
A

a) version 1

17
Q
  1. Which of the following Windows Server 2008 Certificate templates allows user authentication, EFS encryption, secure email, and certificate trust list signing?
    a) administrator
    b) user
    c) computer
    d) domain controller
A

a) administrator

18
Q
  1. Smartcard User is a version __________ certificate template.
    a) 1
    b) 2
    c) 3
    d) 4
A

a) 1

19
Q
  1. Which of the following steps is not part of the certificate enrollment process?
    a) generating keys
    b) requesting the certificate
    c) verifying the certificate
    d) sending or posting the certificate
A

c) verifying the certificate

20
Q
  1. Which of the following is not a reason code for revoking a certificate?
    a) key compromise
    b) CA compromise
    c) certificate compromise
    d) superseded
A

c) certificate compromise

21
Q
  1. Secure Socket Tunneling Protocol (SSTP) is supported only on clients running which of the following operating systems? (Choose all that apply.)
    a) Windows 7
    b) Windows Vista with Service Pack 1
    c) Windows Server 2008
    d) Windows XP with Service Pack 2
A

a) Windows 7

b) Windows Vista with Service Pack 1

22
Q
  1. Which of the following is the strongest authentication protocol supported by Windows Server 2008?
    a) Microsoft Encrypted Authentication Version 2
    b) Challenge Handshake Authentication Protocol
    c) Password Authentication Protocol (PAP)
    d) Extensible Authentication Protocol (EAP)
A

d) Extensible Authentication Protocol (EAP)

23
Q
  1. Which of the following methods enables the server to support authentication with smart cards or other types of digital certificates?
    a) Extensible Authentication Protocol-Transport Level Security (EAP-TLS)
    b) Protected EAP (PEAP)
    c) Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2)
    d) Encrypted Authentication
A

a) Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

24
Q
  1. Which VPN protocol supports data confidentiality, data integrity, data authentication, and VPN Reconnect?
    a) L2TP with IPSec
    b) IKEv2
    c) PPTP
    d) SSTP
A

b) IKEv2

25
Q
  1. Which port is used by IKEv2?
    a) TCP port 80
    b) TCP port 443
    c) TCP port 500
    d) TCP port 8080
A

c) TCP port 500

26
Q
  1. Within the PKI, the certificate authority binds a public key with respective user identities and issues digital certificates containing the public key. For this system to work, the CA must be ___________.
    a) independent
    b) bypassed
    c) trusted
    d) linked
A

c) trusted

27
Q
  1. Which of the following uses a cryptographic system that uses two keys (public and private) to encrypt data and whose public key is published in a digital certificate that confirms the Web server’s identity of Web server?
    a) S/MIME
    b) PGP
    c) EFS
    d) SSL
A

d) SSL

28
Q
  1. Which of the following are factors that you should consider when choosing the length for a certificate’s lifetime? (Choose all that apply.)
    a) The provider of the certificate
    b) The standard practices in the industry
    c) The government regulations
    d) The type of certificate
A

b) The standard practices in the industry
c) The government regulations
d) The type of certificate

29
Q
  1. Which basic type of CA integrates into the Active Directory environment?
    a) subordinate
    b) enterprise
    c) standalone
    d) intermediate
A

b) enterprise

30
Q
  1. Which basic type of CA does not integrate into the Active Directory environment and does not use certificate templates?
    a) subordinate
    b) enterprise
    c) standalone
    d) intermediate
A

c) standalone

31
Q
  1. In which location is a Enterprise Root CA installed?
    a) The domain controller.
    b) The stand-alone server.
    c) The dedicated Windows workstation.
    d) The member server that is part of the Active Directory domain.
A

a) The domain controller.

32
Q
  1. Which of the following template versions provides backward compatibility for CAs running Windows Server 2003, Standard Edition and Windows 2000 family operating systems?
    a) version 1
    b) version 2
    c) version 3
    d) version 4
A

a) version 1

33
Q
  1. Which certificate template version can be issued only by CAs running Windows Server 2008 or Windows Server 2008 R2?
    a) 1
    b) 2
    c) 3
    d) 4
A

c) 3

34
Q
  1. Which term best describes the process in which a client automatically receives a digital certificate?
    a) autoenrollment
    b) web enrollment
    c) self-signed enrollment
    d) manual enrollment
A

a) autoenrollment

35
Q
  1. Which Internet protocol is used to obtain the revocation status of an X.509 digital certificate?
    a) CRL
    b) SCEP
    c) OSCP
    d) CSP
A

c) OSCP