• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

What are Rights Management Services (RMS)?

RMS is security that goes beyond ACL's and Windows Firewall. It is used to safeguard information for files such as MS Office or email.

What role is necessary to implement RMS?

Active Directory Rights Management Services (AD RMS)

What is the difference between assigning and publishing applications?

Applications that are assigned appear on a user's desktop, and are installed after being opened.

Applications that are published are available for installation from the distribution server, through a group policy.

(T/F) A group policy can only be set for an OU.

False, group policies can be set for sites, domains, OU's, and local computers

(T/F) The default domain policy is inherited by all child domains.

True

(T/F) In the event of a conflict, the group policy for computers override the policies set for for users.

True

What is the default authentication method for Active Directory?

Kerberos

What features prevents the user from modifying system files, while still allowing them to install software and device drivers?

User Account Control (UAC)

What is NTMLv2 and what does it stand for?

Windows NT LAN Manager version 2, and authentication protocol that comes default with WS2008

How do IPSec and NAP prevent non-compliant devices from compromising network security?

All devices on the network must send a Statement of Health (SoH) to the Health Registration Authority (HRA) server

The _____ authentication method uses a _____ ticket

Kerberos, service

What tool allows you to lock down communications through specific ports and protocols?

Windows Firewall

What feature can be implemented to prevent attackers from guessing passwords?

Account Lockout (duration, threshold, count)

How can an administrator import security templates and apply them to a Domain?

Using the Security Configuration and Analysis Snap-In

What does the command "cipher /s" do?

Encrypt the current folder, AND contents of subfolders

What is the purpose of a remediation server?

A server that non-compliant clients can be quarantined in until they are updated and compliant

(T/F) A security policy can be implemented to ensure that age, length and complexity of passwords are governed

True

What are two advantages of AES?

AES is fast and strong

Why should auditing be used sparingly?

Audits add lines to the Security event log that can grow very large, and the service can use up system resources.

List three events that can be audited through Audit Policies:

1. Account login/logout


2. Account Management


3. Directory Access


4. Object Access


5. Policy changes/Privilege Use


6. Process Tracking


7. System Events

(T/F) IPSec can be used to secure TCP/IP communication such as FTP/HTTP/HTTPS etc;

True

What tool is used to configure NAT when securing a WS2008 server?

Routing and Remote Access Services Tool