Lesson 9: Securing Infrastructure Services Flashcards
1
Q
- Which of the following types of connections is established between two computers involved in the tunneling process?
a) VPN
b) PPP
c) PPTP
d) SSTP
A
b) PPP
2
Q
- For authentication, PPTP supports all of the following authentication protocols except __________.
a) Microsoft Challenge Handshake Authentication Protocol version 1
b) Microsoft Challenge Handshake Authentication Protocol version 2
c) Microsoft Point-to-Point Encryption (MPPE)
d) Extensible Authentication Protocol
A
c) Microsoft Point-to-Point Encryption (MPPE)
3
Q
- Secure Socket Tunneling Protocol (SSTP) is supported only on clients running which of the following operating systems?
a) Windows Vista
b) Windows Vista with Service Pack 1
c) Windows Server 2008
d) Windows XP with Service Pack 2
A
b) Windows Vista with Service Pack 1
4
Q
- Which of the following do attackers use if they want to find an organization’s dial-up ports?
a) VPN requests
b) port scanner
c) war dialer
d) application fuzzer
A
c) war dialer
5
Q
- Which of the following is the strongest authentication protocol supported by Windows Server 2008?
a) Microsoft Encrypted Authentication Version 2
b) Challenge Handshake Authentication Protocol
c) Password Authentication Protocol (PAP)
d) Extensible Authentication Protocol (EAP)
A
d) Extensible Authentication Protocol (EAP)
6
Q
- Which of the following methods enables the server to support authentication with smart cards or other types of digital certificates?
a) Extensible Authentication Protocol-Transport Level Security (EAP-TLS)
b) Protected EAP (PEAP)
c) Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2)
d) Encrypted Authentication
A
a) Extensible Authentication Protocol-Transport Level Security (EAP-TLS)
7
Q
- Which of the following allows designated recovery agents to create public keys that can decode encrypted information?
a) Internet authentication
b) digital signatures
c) Encrypting File System
d) IP Security
A
c) Encrypting File System
8
Q
- Which of the following authentication devices verifies the identity of a user during logon?
a) IP Security
b) smart card
c) software code signing
d) Internet authentication
A
b) smart card
9
Q
- Which of the following terms specifies the functions for which a digital certificate can be used?
a) public key
b) key usage
c) enhanced key usage
d) subject
A
c) enhanced key usage
10
Q
- Which of the following specifies a value assigned by the CA that uniquely identifies the certificate?
a) signature algorithm
b) serial number
c) version
d) subject
A
b) serial number
11
Q
- Which of the following contains a digest of the certificate data used for digital signing?
a) certificate policies
b) friendly name
c) thumbprint algorithm
d) thumbprint
A
d) thumbprint
12
Q
- Which of the following is not a factor that administrators should consider when choosing the length for a certificate’s lifetime?
a) provider of the certificate
b) standard practices in the industry
c) government regulations
d) type of certificate
A
a) provider of the certificate
13
Q
- In Windows Server 2008, a root CA’s self-generated certificate defaults to a validity period of __________.
a) 6 months
b) 1 year
c) 3 years
d) 5 years
A
d) 5 years
14
Q
- Which of the following is not a role that can be selected when you install Active Directory Certificate Services on a Windows Server 2008 computer?
a) subordinate
b) enterprise
c) standalone
d) intermediate
A
d) intermediate
15
Q
- Which of the following is not a required permission that must be granted to the same user or group for the autoenrollment certificate template permission to function correctly?
a) Allow Autoenroll
b) Allow Enroll
c) Allow Read
d) Allow Write
A
d) Allow Write