Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
What are Rights Management Services (RMS)? |
RMS is security that goes beyond ACL's and Windows Firewall. It is used to safeguard information for files such as MS Office or email. |
|
What role is necessary to implement RMS? |
Active Directory Rights Management Services (AD RMS) |
|
What is the difference between assigning and publishing applications? |
Applications that are assigned appear on a user's desktop, and are installed after being opened. |
|
(T/F) A group policy can only be set for an OU. |
False, group policies can be set for sites, domains, OU's, and local computers |
|
(T/F) The default domain policy is inherited by all child domains. |
True |
|
(T/F) In the event of a conflict, the group policy for computers override the policies set for for users. |
True |
|
What is the default authentication method for Active Directory? |
Kerberos |
|
What features prevents the user from modifying system files, while still allowing them to install software and device drivers? |
User Account Control (UAC)
|
|
What is NTMLv2 and what does it stand for? |
Windows NT LAN Manager version 2, and authentication protocol that comes default with WS2008 |
|
How do IPSec and NAP prevent non-compliant devices from compromising network security? |
All devices on the network must send a Statement of Health (SoH) to the Health Registration Authority (HRA) server |
|
The _____ authentication method uses a _____ ticket |
Kerberos, service |
|
What tool allows you to lock down communications through specific ports and protocols? |
Windows Firewall |
|
What feature can be implemented to prevent attackers from guessing passwords? |
Account Lockout (duration, threshold, count) |
|
How can an administrator import security templates and apply them to a Domain? |
Using the Security Configuration and Analysis Snap-In |
|
What does the command "cipher /s" do? |
Encrypt the current folder, AND contents of subfolders |
|
What is the purpose of a remediation server? |
A server that non-compliant clients can be quarantined in until they are updated and compliant |
|
(T/F) A security policy can be implemented to ensure that age, length and complexity of passwords are governed |
True |
|
What are two advantages of AES? |
AES is fast and strong
|
|
Why should auditing be used sparingly? |
Audits add lines to the Security event log that can grow very large, and the service can use up system resources. |
|
List three events that can be audited through Audit Policies: |
1. Account login/logout 2. Account Management 3. Directory Access 4. Object Access 5. Policy changes/Privilege Use 6. Process Tracking 7. System Events |
|
(T/F) IPSec can be used to secure TCP/IP communication such as FTP/HTTP/HTTPS etc; |
True |
|
What tool is used to configure NAT when securing a WS2008 server? |
Routing and Remote Access Services Tool |