Submitted by: Submitted by smmartin92
Views: 1159
Words: 508
Pages: 3
Category: Science and Technology
Date Submitted: 11/29/2012 09:03 PM
1.
Which of the following allows administrators to create and manage security profiles?
B) Security Configuration Wizard
2.
This tool allow administrators to view security and update information for multiple network machine?
C) Microsoft Baseline Security Analyzer
3.
Which of the following cannot be performed with the Security Configuration Wizard?
B) Encrypting folders and files
4.
You can configure the Microsoft Baseline Security Analyzer to install all missing Windows security updates.
B) False
5.
Which of these features of Windows Server 2008 allows you to encrypt the entire system volume on a hard
drive?
C) Bitlocker
6.
The _____ is used to access an EFS-encrypted file.
File key
7.
What type of network profile would be applied to a workgroup server that sits on a network protected from
the Internet by a firewall?
C) Private
8.
Which of the following tools can be used for managing IPSec policies?
D) Netsh.exe
9.
Which of the following is not a threat mitigated by IPSec?
B) Social Engineering
10.
Transport Mode is used to set up VPN connections for remote access clients in Windows Server 2008.
A) True
11.
McClantz, Inc, a small publishing company, needs to install client to client IPsec to secure communications
between a web server and a database server. The network is running Active Directory Domain Services
without a PKI infrastructure. They are running Windows Server 2008 and do not want to have to purchase
anything additional to implement their solution. What is the recommended authentication method this
implementation?
C) Kerberos version 5
12.
Which of the following commands will encrypt the folder, f:\Shared\SecureData?
B) Cipher.exe /E f:\Shared\SecureData
13.
Which of the following cannot be enforced by NAP?
C) EFS file encryption
14.
You have a small workgroup environment with two servers, SRV1 and SRV2. SRV1 is a web server hosting a
financial application used by your end users....