Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
What port does RPC over HTTP use?
|
Port 443
|
|
What port does NNTP use?
|
Port 119
|
|
What is a Firewall?
|
Protects network from unauthorized access/attacks
|
|
What is a TCP Port?
|
abstract endpoint that provides a path for TCP segmented delivery
(secure communication path/port) |
|
What is a Virus?
|
executable code that can attach itself to files/programs then replicate and spread.
|
|
What is a Worm?
|
executable code that can attach itself to files/programs then replicate and spread.
A worm doesn't require a host program and can auto replicate when an application or OS transfers/copies files |
|
What is a Trojan Horse?
|
Program that pretends to be one thing but does damage when its run.
Cant replicate itself, users spread thru email. |
|
What enables you to specify how viruses are processed?
|
Firewall setup & Anti-virus Software
|
|
What does the Microsoft Baseline Security Analyzer (MBSA) check for?
|
Missing Patches, Blank or weak passwords and vulnerablilities on servers.
|
|
What helps keep Windows based computers and server up to date with the latest critical updates?
|
Microsoft Software Update Services (SUS)
|
|
What automates the distribution and installation of the recommended security fixes for large companies with multiple locations?
|
Microsoft System Management Server (SMS)
|
|
What does Exchange Server 2k3 do if it receives an unauthenticated email message from an external source?
|
It evaluates the source IP against the Accept and Deny list and rejects it if the IP is on the deny list.
|
|
In the Spam confidence Level (SCL) value range, what would the lower value tell you?
|
Lower Value = Higher probability that the email is SPAM
(ie:. range 1-10 / 1=spam) |
|
What is the main benefit of encrypting email messages?
|
A 3rd party intercepts it they will be unable to read the message.
|
|
What provides security by authenticating that the message is actually from the sender?
|
Digital Signature (Private Key of Sender)
|
|
What is a Digital Signature?
|
a code attached to an email that ensures that the sender is who they say they are.
|
|
What is Encryption email?
|
Cryptographic technique that translates the content of an email into an unreadable format.
|
|
What is PKI?
|
Public Key Infrastructure
|
|
What are the 5 components of Public Key Infrastructure (PKI)?
|
- Digital Signature
- Certificate Template - Certification Revocation List - CA - Certificate Services |
|
What are the 3 Administrative models in Admin Groups?
|
- Centralized
- Distributed - Hybrid (Mixed) |
|
What objects can the Admin Group contain?
|
- System Policy
- Routing Group - Public Folder Tree - Server |
|
Exchange Full Admin, Exchange Admin and Exchange View only Admin are what?
|
Exchange Administrator Roles
|
|
What services must you install and enable (startup not req) for Exchange Server 2k3 to run?
|
- NNTP (Network News Transfer Protocol)
- SMTP (Simple Mail Transfer Protocol) - WWW Publishing Service (W3C) - IIS Admin Service (Internet Information Service) |
|
What services are required to Administer ExSvr2k3?
|
- Microsoft Exchange System Attendant
- Microsoft Exchange Management - Windows management Instrumentation |
|
What services are required to enable ExSvr2k3 to route messages?
|
Microsoft Exchange Routing Engines
IIS Admin Service SMTP |
|
What is the default log file format for SMTP?
|
W3C format (WWW Consortium)
|
|
What is the default log file for NNTP?
|
Microsoft IIS format
|
|
What are the 3 ASCII format options?
(American Standard Code for Information Interchange) |
- W3C Extended format
- Microsoft IIS format - NCSA format |