• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back
What port does RPC over HTTP use?
Port 443
What port does NNTP use?
Port 119
What is a Firewall?
Protects network from unauthorized access/attacks
What is a TCP Port?
abstract endpoint that provides a path for TCP segmented delivery
(secure communication path/port)
What is a Virus?
executable code that can attach itself to files/programs then replicate and spread.
What is a Worm?
executable code that can attach itself to files/programs then replicate and spread.
A worm doesn't require a host program and can auto replicate when an application or OS transfers/copies files
What is a Trojan Horse?
Program that pretends to be one thing but does damage when its run.
Cant replicate itself, users spread thru email.
What enables you to specify how viruses are processed?
Firewall setup & Anti-virus Software
What does the Microsoft Baseline Security Analyzer (MBSA) check for?
Missing Patches, Blank or weak passwords and vulnerablilities on servers.
What helps keep Windows based computers and server up to date with the latest critical updates?
Microsoft Software Update Services (SUS)
What automates the distribution and installation of the recommended security fixes for large companies with multiple locations?
Microsoft System Management Server (SMS)
What does Exchange Server 2k3 do if it receives an unauthenticated email message from an external source?
It evaluates the source IP against the Accept and Deny list and rejects it if the IP is on the deny list.
In the Spam confidence Level (SCL) value range, what would the lower value tell you?
Lower Value = Higher probability that the email is SPAM
(ie:. range 1-10 / 1=spam)
What is the main benefit of encrypting email messages?
A 3rd party intercepts it they will be unable to read the message.
What provides security by authenticating that the message is actually from the sender?
Digital Signature (Private Key of Sender)
What is a Digital Signature?
a code attached to an email that ensures that the sender is who they say they are.
What is Encryption email?
Cryptographic technique that translates the content of an email into an unreadable format.
What is PKI?
Public Key Infrastructure
What are the 5 components of Public Key Infrastructure (PKI)?
- Digital Signature
- Certificate Template
- Certification Revocation List
- CA
- Certificate Services
What are the 3 Administrative models in Admin Groups?
- Centralized
- Distributed
- Hybrid (Mixed)
What objects can the Admin Group contain?
- System Policy
- Routing Group
- Public Folder Tree
- Server
Exchange Full Admin, Exchange Admin and Exchange View only Admin are what?
Exchange Administrator Roles
What services must you install and enable (startup not req) for Exchange Server 2k3 to run?
- NNTP (Network News Transfer Protocol)
- SMTP (Simple Mail Transfer Protocol)
- WWW Publishing Service (W3C)
- IIS Admin Service (Internet Information Service)
What services are required to Administer ExSvr2k3?
- Microsoft Exchange System Attendant
- Microsoft Exchange Management
- Windows management Instrumentation
What services are required to enable ExSvr2k3 to route messages?
Microsoft Exchange Routing Engines
IIS Admin Service
SMTP
What is the default log file format for SMTP?
W3C format (WWW Consortium)
What is the default log file for NNTP?
Microsoft IIS format
What are the 3 ASCII format options?
(American Standard Code for Information Interchange)
- W3C Extended format
- Microsoft IIS format
- NCSA format