• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
Tip : Credential Manager cannot be used to back up EFS certificates
Tip : Credential Manager cannot be used to back up EFS certificates
Tip : The Windows 7 certificate Management Console - certmgr.msc
Tip : The Windows 7 certificate Management Console - certmgr.msc
EFS certificates can be backed up using three tools ?
Certificates Console
(Certmgr.msc), the Manage File Encryption Certificates tool, and the Cipher.exe commandline
tool.
Where are the Windows 7 login credentials stored ?
Windows Vault
What does the Credential Manager do ?
Credential Manager allows you to manage passwords for Web sites, terminal services
and remote desktop sessions, stand-alone network resources, and smart card
certificates.
Tip : You can assign rights to users by adding them to the appropriate built-in local group or by assigning them rights through Group Policy
Tip : You can assign rights to users by adding them to the appropriate built-in local group or by assigning them rights through Group Policy
You have used Runas with the /savecred option to save the credentials of an
administrator account on a client running Windows 7. You have finished performing the tasks that you needed to and now want to remove those credentials from the computer. Which of the following tools could you use to do this?

A. Runas
B. Credential Manager
C . The Certificates console
D. UAC settings
B. Credential Manager
You want to ensure that users are forcibly logged off from their computers running Windows 7 if they remove their smart cards. Which of the following policies and settings should you configure to accomplish this goal? (Choose all that apply; each answer forms part of a complete solution.)

A. Interactive Logon: Smart Card Removal Behavior Properties: No Action
B. Interactive Logon: Smart Card Removal Behavior Properties: Lock Workstation
C . Interactive Logon: Smart Card Removal Behavior Properties: Force Logoff
D. Interactive Logon: Require Smart Card: Enabled
C . Interactive Logon: Smart Card Removal Behavior Properties: Force Logoff
D. Interactive Logon: Require Smart Card: Enabled
A user has forgotten the password to the stand-alone desktop computer running Windows 7 that she uses at your organization. The user does not have a reset disk. You have an account on this computer that is a member of the local Administrators group. Which of the following steps can you take to resolve this user’s authentication problem?

A. Unlock her account
B. Reset her password
C . Create a password reset disk for her account
D. Create a password reset disk for your account
B. Correct: You need to reset her password.

The user loses access to encrypted files if she
has not backed up her EFS key. The user also loses access to any saved credentials stored
in Windows Vault.
You want to ensure that users of stand-alone clients running Windows 7 in your organization change their passwords every three weeks. Which of the following policies should you configure on each computer to accomplish this goal?

A. Enforce Password History
B. Minimum Password Length
C. Minimum Password Age
D. Maximum Password Age
D. Maximum Password Age

D. Correct: The Maximum Password Age policy ensures that a user must change his
password after a certain amount of time has expired. In this case, you would set the
policy to 21 days.
Which of the following tools can users use to back up EFS certificates created when they encrypt a file on a stand-alone computer running Windows 7? (Choose all that apply.)

A. Credential Manager
B. The Manage File Encryption Certificates tool
C . The Certificate Manager console
D. Cipher.exe
B. The Manage File Encryption Certificates tool
C . The Certificate Manager console
D. Cipher.exe
What is Credential Roaming ?
Active Directory Domain Services stores the certificates and private keys separately from application state or configuration information.
Tip:

Group Policy is used to configure credential roaming to automatically run when a user logs in.
Tip:

Group Policy is used to configure credential roaming to automatically run when a user logs in.
Tip:

Credentials stored on one domain controller only become available on another domain controller once replication has occurred.
Tip:

Credentials stored on one domain controller only become available on another domain controller once replication has occurred.
Abbrev : CRLs
certificate revocation lists
Group Policy can help you manage certificates. How ?
GP can help you specify

Root Certificates
Trusted Publishers
Network Retrieval and Path Validation
Revocation Checking Policy
You can use credential roaming and certificate path validation to manage various tasks.

Match each task with the appropriate method.

Options:

1. Manage responses from online responders
2. Specify the root certification authorities that you trust
3. Store your certificates and private keys in AD DS
4. Store certificates only on machines where trusted users have logged on

Targets:

1. Credential roaming
2. Certificate path validation
Credential roaming enables you to use AD DS to store your certificates and private keys. This enhances security by ensuring that certificates are only stored for trusted users.

Certificate path validation enables you to better manage certificates and public keys by managing responses from online responders, and indicating which root certification authorities you trust.

Correct answer(s):

Target 1 = Option C, Option D

Target 2 = Option B, Option A
Methods to obtain a certificate ?
You can use four methods to obtain a certificate:

the Certificates snap-in
the Certificate Request Wizard
the Internet
requesting certificates on behalf of users