saldex2

Card Set Information

Author:
saldex2
ID:
216195
Filename:
saldex2
Updated:
2013-04-27 20:31:17
Tags:
Security Planning Administrative Delegation
Folders:

Description:
Chapter 6
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user saldex2 on FreezingBlue Flashcards. What would you like to do?


  1. A __________ is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource.
    password
  2. What can be defined as a password that follows guidelines that make it difficult for a potential hacker to determine the user’s password?
    strong password
  3. Password-__________ is an attempt to discover a user’s password.
    cracking
  4. Which of the following is not a characteristic of a strong password?
    contains your birth date
  5. What is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise?
    smart card
  6. What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?
    PKI
  7. Which of the following is a benefit of implementing a public key infrastructure (PKI)?
    • a) Users no longer need to remember passwords.
    • b) All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.
    • c) Smart cards can be used from remote locations, such as a home office, to provide authentication services.
    • d) All of the above
  8. What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?
    runas
  9. Which OU is created by default when Active Directory is installed?
    Domain Controllers
  10. What tool allows you to utilize a simple interface to delegate permissions for domains, OUs, or containers?
    Delegation of Control Wizard
  11. What typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or smart card?
    PIN
  12. Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated __________ attack
    dictionary
  13. A password should be __________ characters in length to be considered a strong password.
    12
  14. Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.
    127
  15. What method of authentication requires a smart card and a PIN to provide more secure access to company resources?
    two-factor authentication
  16. To implement PKI, what must be installed on your Windows 2008 Server?
    Active Directory Certificate Services
  17. What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?
    smart card enrollment station
  18. What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?
    enrollment agent
  19. What component issues and manages certificates for individuals, computers, and organizations?
    Certification Authority
  20. Where is the certificate database located on a Certification Authority?
    C:\Windows\system32\CertLog
  21. A strong password can be similar to a previously used password.
    False
  22. A password is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise.
    False
  23. When configuring Certificate Services, you must install your CAs as enterprise CAs.
    True
  24. Enrollment agent certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization.
    True
  25. OUs represent the functional or geographical model of your company so that resources can be placed according to the users who need them.
    True
  26. A(n) __________ is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource.
    password
  27. In Windows Server 2008, __________ passwords are required when Active Directory is installed.
    strong
  28. A strong password contains uppercase and lowercase letters, __________, and nonalphabetic characters.
    numbers
  29. A Public Key __________ is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography.
    Infrastructure
  30. The use of PKI requires you to install Active Directory __________ Services in your Windows Server 2008 environment.
    Certificate
  31. You must set up at least one computer as a smart card __________ station, which is a dedicated workstation that allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation.
    enrollment
  32. After determining the cost of implementing smart cards, you need to define a(n) __________ process.
    support
  33. The recommended solution for reducing the risks associated with the Administrator account is to use a standard user account and use the Run as __________ option.
    administrator
  34. By allowing administrative authority over an OU structure as opposed to an entire domain or site, you minimize the number of administrators with __________ privileges.
    global
  35. The __________ option in Active Directory Users and Computers offers a safer method than the drag-and-drop feature, but has the same results.
    move
  36. What is an attempt to discover a user’s password?
    password-cracking
  37. Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of what automated attack?
    dictionary attack
  38. What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?
    public key infrastructure, PKI
  39. What type of CA can issue certificates only to users and computers in its own forest?
    enterprise CA
  40. What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?
    enrollment agent
  41. What allows you to connect to a CA via a Web browser to perform such common tasks as requesting certificates, retrieving the CA’s Certificate Revocation List (CRL), or performing smart card certificate enrollment?
    Certification Web Enrollment
  42. Run as administrator and runas require what service to be running?
    Secondary Logon
  43. What wizard allows you to utilize a simple interface to delegate permissions for domains, OUs, or containers?
    Delegation of Control Wizard

What would you like to do?

Home > Flashcards > Print Preview