Deck 13: Securing Windows Server 2008

ملء الشاشة (f)
exit full mode
سؤال
The use of ____ in Windows Server 2008 enables you to standardize the working environment of clients and servers by setting policies in Active Directory.

A) server policy
B) user policy
C) group policy
D) machine policy
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ is a server role to complement the client applications that can take advantage of Rights Management Services safeguards.

A) Active Directory Certificate Services
B) Active Directory Lightweight Directory Services
C) Active Directory Rights Management Services
D) Active Directory User Management Services
سؤال
____ is an encryption technique that uses public and private keys along with a computer algorithm that relies on factoring large prime numbers.

A) AES
B) RSA
C) DES
D) Twofish
سؤال
____ is a set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF).

A) IPsec
B) PPTP
C) DES
D) AES
سؤال
If a drive is protected using ____,no one can access information without proper authentication even if the drive has been stolen.

A) BitLocker Drive Encryption
B) BitLocker Drive Vault
C) BitLocker System Encryption
D) BitLocker Volume Encryption
سؤال
A common password policy is to have ____ go into effect after five to 10 unsuccessful logon attempts.

A) logout
B) lockout
C) reboot
D) lock
سؤال
____ encryption is the standard deployed by the U.S.federal government and is intended to be more secure than DES.

A) Advanced Encryption Standard
B) Blowfish
C) PGP
D) RSA
سؤال
IPsec policies for a domain can be managed through the ____.

A) Default Domain Controller Policy
B) Default Computer Policy
C) Default Encryption Policy
D) Default Domain Policy
سؤال
NAP cannot work in conjunction with 802.1X.
سؤال
DHCP is an extremely secure protocol.
سؤال
The first line of defense in Windows Server 2008 is ____ security.

A) user
B) token
C) file
D) password
سؤال
____ applications involves setting up software through a group policy so that the application is available for users to install from a central application distribution server,such as through the Add/Remove Programs capability or an installation window via the user's desktop.

A) Publishing
B) Packaging
C) Licensing
D) Assigning
سؤال
In Kerberos security,the permanent ticket,called a ____ ticket,is good for the duration of a logon session.

A) granting
B) connection
C) service
D) session
سؤال
When an IPsec communication begins between two computers,the computers first exchange ____ to authenticate the receiver and sender.

A) keys
B) certificates
C) passwords
D) tickets
سؤال
NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.
سؤال
____ are security rights developed by Microsoft to provide security for documents,spreadsheets,e-mail,and other types of files created by applications.

A) Client Management Services
B) Rights Configuration Services
C) Rights Management Services
D) Client Rights Services
سؤال
UAC means there is little chance that the installation can destabilize the operating system,because the installation takes place only with the proper authorization and in standard user mode.
سؤال
User ____ enable an account or group to perform predefined tasks.

A) passwords
B) roles
C) services
D) rights
سؤال
For a "strong password" Microsoft recommends a minimum of ____ characters.

A) five
B) six
C) seven
D) eight
سؤال
Computers in the DMZ generally have more security defenses via routers and firewalls.
سؤال
In Windows Server 2008,____ ensures secure access and communication when Terminal Services are used over the Internet.

A) TS RemoteApp
B) TS Server
C) TS Gateway
D) TS Manager
سؤال
One reason for developing ____________________ was to enable the use of more globally available IP addresses.
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Involves the use of tickets that are exchanged between the client who requests logon and network services access,and the server or Active Directory that grants access.
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A portion of a network that is between two networks,such as between a private network and the Internet
سؤال
To determine compliance,NAP uses a server that is a ____.

A) Health Management Authority
B) Health Monitoring Authority
C) Health Policy Authority
D) Health Registration Authority
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Programs that you choose to allow through the firewall in both directions
سؤال
TS Gateway combined with NAP uses the ____________________ server to ensure that a client is compliant with the health and security policies on a network.
سؤال
____________________ policies are a subset of individual policies within a larger group policy for a site,domain,OU,or local computer.
سؤال
In terms of NAP,"____" refers to ensuring that all authenticated computers on the network have the most recent updates and comply with network security policies.

A) healthy
B) examined
C) complete
D) managed
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A security specification for a hardware device that can be used to secure information on a different hardware device,such as a hard drive
سؤال
Through ____________________,NAP allows computers that are considered noncompliant to access the local network.
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A wired and wireless authentication approach offered by the IEEE and is supported in modern Windows operating systems including Windows XP,Windows Vista,Windows 7,and Windows Server 2003/2008
سؤال
____ is used to make the implementation and troubleshooting of group policies much simpler for an administrator.

A) Policy Evaluation
B) Effective Policy
C) Resultant Set of Policy
D) Merged Set of Policy
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Designed to keep the user running in the standard user mode as a way to more fully insulate the kernel and to keep operating system and desktop files stabilized
سؤال
Using NAP,all network clients must contact the HRA server and submit information about their security policy status and recent upgrades-called a ____.

A) Statement of Service
B) Statement of Health
C) Statement of Availability
D) Statement of Function
سؤال
____ applications means an application is automatically represented on the user's desktop,for example as a Start menu option or as an icon on the desktop,and which initially is really a link to the central application distribution server.

A) Packaging
B) Publishing
C) Defining
D) Assigning
سؤال
A(n)____________________ server is one that can provide updates and security policy changes to the client to bring that client into compliance.
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A comprehensive set of security features that monitors and manages a server and its clients
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
An Active Directory object that contains group policy settings (a set of group policies)for a site,domain,OU,or local computer
سؤال
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A relatively new security measure for protecting hard drives
سؤال
List two ways that NAP can be used to keep a network healthy.
سؤال
What happens after the HRA server validates a client's SoH?
سؤال
List two areas where NAP can be used to ensure compliance with network security policies.
سؤال
List and describe two specific password security options that you can configure in Windows Server 2008.
سؤال
Discuss establishing account policies.
سؤال
Discuss why NAT is a good security technique.
سؤال
Explain the purpose of TS Gateway.
سؤال
List the items issued by DHCP with NAP if a client is fully compliant,and if the client is noncompliant.
سؤال
Discuss the two important functions that NAT serves.
سؤال
Discuss the IP addresses that NAT uses.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Securing Windows Server 2008
1
The use of ____ in Windows Server 2008 enables you to standardize the working environment of clients and servers by setting policies in Active Directory.

A) server policy
B) user policy
C) group policy
D) machine policy
C
2
____ is a server role to complement the client applications that can take advantage of Rights Management Services safeguards.

A) Active Directory Certificate Services
B) Active Directory Lightweight Directory Services
C) Active Directory Rights Management Services
D) Active Directory User Management Services
C
3
____ is an encryption technique that uses public and private keys along with a computer algorithm that relies on factoring large prime numbers.

A) AES
B) RSA
C) DES
D) Twofish
B
4
____ is a set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF).

A) IPsec
B) PPTP
C) DES
D) AES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
If a drive is protected using ____,no one can access information without proper authentication even if the drive has been stolen.

A) BitLocker Drive Encryption
B) BitLocker Drive Vault
C) BitLocker System Encryption
D) BitLocker Volume Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
A common password policy is to have ____ go into effect after five to 10 unsuccessful logon attempts.

A) logout
B) lockout
C) reboot
D) lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ encryption is the standard deployed by the U.S.federal government and is intended to be more secure than DES.

A) Advanced Encryption Standard
B) Blowfish
C) PGP
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
IPsec policies for a domain can be managed through the ____.

A) Default Domain Controller Policy
B) Default Computer Policy
C) Default Encryption Policy
D) Default Domain Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
NAP cannot work in conjunction with 802.1X.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
DHCP is an extremely secure protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
The first line of defense in Windows Server 2008 is ____ security.

A) user
B) token
C) file
D) password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ applications involves setting up software through a group policy so that the application is available for users to install from a central application distribution server,such as through the Add/Remove Programs capability or an installation window via the user's desktop.

A) Publishing
B) Packaging
C) Licensing
D) Assigning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
In Kerberos security,the permanent ticket,called a ____ ticket,is good for the duration of a logon session.

A) granting
B) connection
C) service
D) session
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
When an IPsec communication begins between two computers,the computers first exchange ____ to authenticate the receiver and sender.

A) keys
B) certificates
C) passwords
D) tickets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
NAT is not a good security technique because internal IP addresses may be seen by users in the outside world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ are security rights developed by Microsoft to provide security for documents,spreadsheets,e-mail,and other types of files created by applications.

A) Client Management Services
B) Rights Configuration Services
C) Rights Management Services
D) Client Rights Services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
UAC means there is little chance that the installation can destabilize the operating system,because the installation takes place only with the proper authorization and in standard user mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
User ____ enable an account or group to perform predefined tasks.

A) passwords
B) roles
C) services
D) rights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
For a "strong password" Microsoft recommends a minimum of ____ characters.

A) five
B) six
C) seven
D) eight
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Computers in the DMZ generally have more security defenses via routers and firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
In Windows Server 2008,____ ensures secure access and communication when Terminal Services are used over the Internet.

A) TS RemoteApp
B) TS Server
C) TS Gateway
D) TS Manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
One reason for developing ____________________ was to enable the use of more globally available IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Involves the use of tickets that are exchanged between the client who requests logon and network services access,and the server or Active Directory that grants access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A portion of a network that is between two networks,such as between a private network and the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
To determine compliance,NAP uses a server that is a ____.

A) Health Management Authority
B) Health Monitoring Authority
C) Health Policy Authority
D) Health Registration Authority
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Programs that you choose to allow through the firewall in both directions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
TS Gateway combined with NAP uses the ____________________ server to ensure that a client is compliant with the health and security policies on a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
____________________ policies are a subset of individual policies within a larger group policy for a site,domain,OU,or local computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
In terms of NAP,"____" refers to ensuring that all authenticated computers on the network have the most recent updates and comply with network security policies.

A) healthy
B) examined
C) complete
D) managed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A security specification for a hardware device that can be used to secure information on a different hardware device,such as a hard drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Through ____________________,NAP allows computers that are considered noncompliant to access the local network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A wired and wireless authentication approach offered by the IEEE and is supported in modern Windows operating systems including Windows XP,Windows Vista,Windows 7,and Windows Server 2003/2008
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ is used to make the implementation and troubleshooting of group policies much simpler for an administrator.

A) Policy Evaluation
B) Effective Policy
C) Resultant Set of Policy
D) Merged Set of Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
Designed to keep the user running in the standard user mode as a way to more fully insulate the kernel and to keep operating system and desktop files stabilized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Using NAP,all network clients must contact the HRA server and submit information about their security policy status and recent upgrades-called a ____.

A) Statement of Service
B) Statement of Health
C) Statement of Availability
D) Statement of Function
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
____ applications means an application is automatically represented on the user's desktop,for example as a Start menu option or as an icon on the desktop,and which initially is really a link to the central application distribution server.

A) Packaging
B) Publishing
C) Defining
D) Assigning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n)____________________ server is one that can provide updates and security policy changes to the client to bring that client into compliance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A comprehensive set of security features that monitors and manages a server and its clients
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
An Active Directory object that contains group policy settings (a set of group policies)for a site,domain,OU,or local computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match each term with the correct statement below.
a.kerberos security
b.NAP
c.TPM
d.exceptions
e.UAC
f.demilitarized zone
g.BitLocker Drive Encryption
h.802.1X
i.GPO
A relatively new security measure for protecting hard drives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
List two ways that NAP can be used to keep a network healthy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What happens after the HRA server validates a client's SoH?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
List two areas where NAP can be used to ensure compliance with network security policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
List and describe two specific password security options that you can configure in Windows Server 2008.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Discuss establishing account policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Discuss why NAT is a good security technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Explain the purpose of TS Gateway.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
List the items issued by DHCP with NAP if a client is fully compliant,and if the client is noncompliant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discuss the two important functions that NAT serves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Discuss the IP addresses that NAT uses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.