work cards lesson 10

Card Set Information

work cards lesson 10
2011-09-22 03:07:50
work cards lesson 10

work cards lesson 10
Show Answers:

  1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?
    Disable the Store Passwords Using Reversible Encryption policy.
  2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network?
    Port Numbers
  3. Which of the following NTFS features is incompatible with EFS encryption?
  4. Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files?
  5. Which of the following actions can you NOT perform from the Win Firewall control panel?
    Allow program through firewall on all three profiles and Create Firewall exceptions based on Port numbers
  6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by brute force attack?
    Increase value of Reset Account Logon Counter After and Enable Password Must Meet Complexity Requirements.
  7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?
  8. Which of the following statements about Win Defender is true?
    Windows Defender requires definition updates supplied with Windows Update downloads
  9. of the parental controls has been removed from Win 7?
    Internet Filtering
  10. The built-in local groups on a Win 7 workstation receive their special capabilities through which of the following mechanisms?
    NTFS Permissions
  11. Multi-factor authentication
    uses Passwords plus smart cards
  12. Malware
    These are potentially destructive software
  13. Automated password guessing is known as
    Brute force
  14. What is the standard for smart card support
    Personal Identity Verification(PIV)
  15. Private Key
    Decrypts data encrypted with a certificate
  16. Windows Biometric Framework
    Standard for fingerprint scanners and other devices
  17. User rights
    Windows authorization mechanism
  18. What firewall rule requires IPsec
    authenticated exception
  19. This key is stored in a digital certificate
    public key
  20. Firewall exceptions are called