Deck 10: Securing Windows Server 2008
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/43
Play
Full screen (f)
Deck 10: Securing Windows Server 2008
1
The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.
True
2
Windows Firewall does not allow you to create exceptions for inbound traffic.
False
3
IPSec's ____ provides secure communications between two networks through a single node.
A) transport mode
C) socket
B) routing table
D) tunnel mode
A) transport mode
C) socket
B) routing table
D) tunnel mode
D
4
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.
A) Repudiation
C) Identity spoofing
B) Network traffic sniffing
D) Denial of service
A) Repudiation
C) Identity spoofing
B) Network traffic sniffing
D) Denial of service
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
5
EFS uses a combination of private and public key encryption for securing a user's data.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
6
Secure Socket Layer (SSL) and Secure Shell (SSH) can protect Transport layer protocols and information such as TCP and UDP.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
7
____ attacks are performed by flooding a host or a network router with more traffic than it can handle.
A) Man-in-the-middle attacks
C) Denial of service
B) Identity spoofing
D) Data tampering
A) Man-in-the-middle attacks
C) Denial of service
B) Identity spoofing
D) Data tampering
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
8
When a user encrypts a file, a symmetric file encryption key (FEK) is generated that EFS uses to encrypt the file.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
9
IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) solutions for remote access.
A) transport mode
C) socket
B) routing table
D) tunnel mode
A) transport mode
C) socket
B) routing table
D) tunnel mode
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
10
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.
A) tunnel mode
C) VPN
B) public key encryption
D) BitLocker
A) tunnel mode
C) VPN
B) public key encryption
D) BitLocker
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
11
____ provides hard drive-based encryption of servers and Windows Vista computers.
A) BitLocker
C) Symmetric encryption
B) Internet Key Exchange
D) Multifactor authentication
A) BitLocker
C) Symmetric encryption
B) Internet Key Exchange
D) Multifactor authentication
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
12
A(n) ____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.
A) man-in-the-middle
C) denial of service
B) identity spoofing
D) data tampering
A) man-in-the-middle
C) denial of service
B) identity spoofing
D) data tampering
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
13
____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.
A) Man-in-the-middle attack
C) Repudiation
B) Identity spoofing
D) Data tampering
A) Man-in-the-middle attack
C) Repudiation
B) Identity spoofing
D) Data tampering
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
14
Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.
A) RADIUS
C) Layer 2 Tunneling
B) VPN
D) enhanced security mode
A) RADIUS
C) Layer 2 Tunneling
B) VPN
D) enhanced security mode
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ is a microchip that performs basic security tasks with encryption keys.
A) stub zone
C) root hint
B) Trusted Protection Module
D) DHCP relay agent
A) stub zone
C) root hint
B) Trusted Protection Module
D) DHCP relay agent
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
16
____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.
A) Netsh
C) Cipher.exe
B) Ipconfig
D) Ping
A) Netsh
C) Cipher.exe
B) Ipconfig
D) Ping
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.
A) disk quota
C) exception
B) BitLocker
D) rule
A) disk quota
C) exception
B) BitLocker
D) rule
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
18
Along with providing file security through Access Control Lists, ____ allows users to perform file-based encryption through the Encrypting File Service (EFS).
A) network address translation
C) DFS
B) dial-up networking
D) New Technology File System
A) network address translation
C) DFS
B) dial-up networking
D) New Technology File System
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
19
____ uses a single key and is faster and more efficient than public key encryption, especially for very large files.
A) Network Access Protection
C) Network address translation
B) Symmetric encryption
D) Demand-dial routing
A) Network Access Protection
C) Network address translation
B) Symmetric encryption
D) Demand-dial routing
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
20
Clients use a(n) ____ to determine to what type of network they are connected.
A) network profile
C) exception
B) label
D) forwarder
A) network profile
C) exception
B) label
D) forwarder
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
21
Briefly describe the following authentication modes used by BitLocker: BitLocker with a TPM and BitLocker with Universal Serial Bus (USB) flash drive in place of TPM
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
22
In Active Directory domain environments, _________________________ is used by clients for host authentication.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
23
Windows Server 2008 has two tools for managing EFS: file and folder properties and _________________________.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
24
The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.
A) digital certificate
C) Kerberos
B) header
D) preshared keys
A) digital certificate
C) Kerberos
B) header
D) preshared keys
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
25
Briefly describe the following network profiles: Public, Private, and Domain.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
26
The ____ is responsible for managing the network health and connectivity policies on a network.
A) System Health Validator
C) System Health Agent
B) Remediation Server
D) Network Policy Server
A) System Health Validator
C) System Health Agent
B) Remediation Server
D) Network Policy Server
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
27
____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.
A) DHCP
C) Encapsulating Security Payload
B) UDP
D) Kerberos
A) DHCP
C) Encapsulating Security Payload
B) UDP
D) Kerberos
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
28
List four areas that you are allowed to manage through the Windows Firewall Advanced Security console.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
29
_________________________ involves the malicious modification of data stored on Web sites or in databases or being passed between two computers on a network.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
30
Briefly discuss the two phases used by IPSec to perform transactions.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
31
What are the limitations of BitLocker?
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
32
The term _________________________ refers to a form of authentication that uses certificates issued by a trusted authority, or certification authority (CA).
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
33
____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.
A) Internet Key Exchange
C) BitLocker
B) Authentication Header
D) Encapsulating Security Payload
A) Internet Key Exchange
C) BitLocker
B) Authentication Header
D) Encapsulating Security Payload
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
34
_____________________________________________ is an open-standards framework for securing network communications.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
35
How does BitLocker prevent threats to Windows systems, including: compromised system files and data access from outside the OS?
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
36
IPSec meets three basic goals. Briefly discuss these goals.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
37
All forms of NTLM use the ____.
A) challenge-response protocol
C) tunnel mode
B) Internet Key Exchange
D) public key encryption
A) challenge-response protocol
C) tunnel mode
B) Internet Key Exchange
D) public key encryption
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
38
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.
A) IGMP
C) UDP
B) Internet Key Exchange
D) L2TP
A) IGMP
C) UDP
B) Internet Key Exchange
D) L2TP
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly discuss the three scenarios available when deploying IPSec: site to site, client to client, and client to site.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
40
List three authentication protocols supported by Windows Server 2008.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
41
What is the purpose of the System Health Validator?
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
43
Match between columns
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck