• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back
What port is used with L2TP?
port 50
What must be done when a CA has been compromised?
the CA's certificate must be revoked
What are the six levels of the pyramid approach to management?
shareholders, chairman of the board, board of directors, senior management, middle management, and staff
What two security features does Terminal Services offer?
encryption, and the ability to limit logon attempts and connection time
What three types of business structures does Microsoft recognize?
international, national, and regional
What are the three levels of Terminal Services encryption?
low, medium, and high
What are the three phases of network design?
planning and design, implementation, and management
What are the four aspects of design criteria?
functionality, security, availability, and performance
What is a domain consolidation also known as?
a domain restructure
What is a strategic inflection point?
a point where two or more alternatives diverge
What are the five types of end users?
external authenticated user, internet user, regular user, roaming user, and traveling user
What is an external authenticated user?
a user who does not work for a company, but needs access to their network
What are the three models of distributed management?
by responsibility, by location, and hybrid
What are the three major advantages of centralized management?
ease of communication, ability to create and enforce a clear vision, and streamlined decision-making
What is a risk contingency trigger?
an event that causes a risk contingency plan to go into effect
Analyzing the service and product life cycles is a part of which section of the design cycle?
planning and design
In the pyramid approach to management, how many levels are there?
six
In a typical VPN setup, what protocol is used between the VPN server and the private network?
TCP/IP
Can SSL be used as part of SSO in a cross-platform environment?
yes
What MS product can be used to ensure that incompatible applications are not used after the Windows 2000 rollout?
SMS
Which default IPSec policy is the most secure?
Secure Server
What is a certificate trust list?
a list of self-signed certificates that are to be trusted by your organization
Can drives be mapped by a default Terminal Services client?
no
If a user does not have a user account for a 2000 domain, which security protocol will allow that user to connect to a resource in that domain?
Public Key Certificate authentication
How many firewalls are necessary for a screened subnet design?
two
What is a "quick win"?
making a new feature available as soon as possible to showcase benefits
What are the two firewall configuration models?
bastion host and screened subnet
What are the three approaches to threat assessment?
tiger team, think tank, and system security engineering process
What drawback does Network Monitor have for analyzing a network's traffic?
it does not run in promiscuous mode
Where are remote access policies stored?
in IAS.MDB on the RAS server
What standard does Windows 2000 use for smart cards?
PC/SC
If an unencrypted file is copied into an encrypted folder, is the copy encrypted?
yes
If an unencrypted file is moved into an encrypted folder, is the file encrypted?
no
What are the three types of EFS recovery policies?
no recovery policy, empty recovery policy, and recovery-agent policy
Who is the recovery agent if the domain recovery policy is deleted?
the local administrator
What recovery policy is in place if the recovery policy is deleted from the first domain controller?
no recovery policy
What recovery policy is in effect if an administrator deletes all recovery policies and their public-key certificates?
an empty recovery policy
What is the effect of an empty recovery policy?
EFS is turned off
What must be done before encrypted files can be stored on a remote server?
the server must be trusted for delegation