• Aucun résultat trouvé

1. A security template is ___________________.

A. A method of applying security settings to a Group Policy B. A way to discover the current security settings

C. A set of guidelines published by Microsoft for securing a server D. A physical layout of the server room’s security system

2. A Group Policy contains which of the two following configuration settings?

A. Network B. System C. User D. Computer

3. A limitation of L2TP/IPSec is ___________________.

A. It is unable to traverse NAT implementations.

B. It isn’t as secure as PPTP.

C. It works only with Windows XP Professional clients.

D. It requires that Active Directory be in native mode.

4. Which of the following are EFS features in Windows XP Professional? (Choose all that apply.) A. Sharing EFS files with multiple users

B. Encrypting offline files

C. Using web folders for encrypted files

D. Encryption without an enterprise certificate authority

5. Which of the following terms describes the process of tracking noteworthy events on your network?

A. Process tracking B. Auditing

C. Resource recovery D. Countermeasure

6. Which of the following is a popular Microsoft tool designed to secure an Internet Information Services (IIS) 5 website? (Choose all that apply.)

A. URLScan B. IIS Lockdown C. Security Toolbox D. Snort

Assessment Test xxxv

7. When you have confidence that a message could only have been sent by the person claiming to be the sender, you have ___________________.

A. Nonrepudiation B. Integrity C. Confidentiality D. Anti-replay

8. Your co-worker states that he is still able to successfully use a certificate that was revoked yesterday. What is the most likely reason?

A. A new CRL with the information for his certificate has not been published yet.

B. The CRL distribution point (CDP) is offline.

C. The revocation must still be in the pending requests folder on the CA.

D. The CA’s chain must be broken.

9. When you have confidence that a message has not been altered in transit, you have ___________________.

A. Nonrepudiation B. Integrity C. Confidentiality D. Anti-replay

10. The Microsoft server software used with 802.1x to authenticate wireless users to your Active Directory is called ___________________.

A. Kerberos Server

B. Key Distribution Center (KDC) C. RADIUS Server

D. Internet Authentication Server (IAS)

11. Which of the following operating systems support Kerberos v5? (Choose all that apply.) A. Windows 9x

B. Windows 9x with the Directory Services client C. Windows NT 4 Workstation

D. Windows 2000 Professional

12. The graphical tool used to determine which service packs and hotfixes are missing from a Windows Server 2003 computer is called ___________________.

A. HFNetChk B. EventComb C. MBSA

D. Server Monitor

4332.book Page xxxv Sunday, June 6, 2004 1:52 PM

13. The method of incorporating service pack updates into the base set of installation files is called ___________________.

A. Service pack installation B. Hotfix installation C. Windows updates D. Slipstreaming

14. The method of ensuring that the latest service packs and hotfixes are automatically updated on all your Windows Server 2003 computers is called ___________________.

A. Service pack installation B. Hotfix installation C. Slipstreaming

D. Software Update Services

15. The process of inserting a digital signature into each packet is called ___________________.

A. Slipstreaming B. Digital signing C. SMB signing D. Encryption

16. When a person sends a message as if they are another person, this process is called ___________________.

A. Eavesdropping B. Impersonation C. Nonrepudiation D. Confidentiality

17. Another term for the network name in wireless networks is ___________________.

A. Security set identifier (SSID) B. Wired Equivalent Privacy (WEP) C. Wireless access point (WAP) D. Beacon

18. Which of the following authentication methods can Windows 2000 Professional clients use?

(Choose all that apply.) A. CHAP

B. MS-CHAP C. MS-CHAPv2 D. EAP

Assessment Test xxxvii

19. When the computer portion of a Group Policy is applied last, this process is called ___________________.

A. Reverse Policy Assignment B. Loopback

C. Missing Policy Assignment D. Impersonation

20. Before data can be securely exchanged between two computers, what must be accomplished?

A. Negotiation of a common dialect B. Negotiation of a session key C. Negotiation of the window size D. Negotiation of a security association 21. A limitation of PPTP is ___________________.

A. It is Microsoft-specific.

B. It isn’t as secure as L2TP/IPSec.

C. It works only with Windows XP Professional clients.

D. It requires server and client certificates.

22. When an encrypted packet is sent to an endpoint, it is said to be in ___________________.

A. Tunnel mode B. Transport mode C. Mixed mode D. Native mode

23. Which two of the following are methods to test an IPSec policy assignment?

A. Net View B. PING C. Telnet D. IPSec Monitor E. Network Monitor F. MBSA

4332.book Page xxxvii Sunday, June 6, 2004 1:52 PM

24. A warning message in the System Log indicates that ___________________.

A. An event of no importance has occurred. You can safely ignore the message.

B. An event of importance has occurred. You should investigate.

C. A serious catastrophe has occurred. You should shut down the servers and plan on being fired.

D. Without knowing a warning message’s contents, you cannot discern if it is important or not.

25. Secure Sockets Layer (SSL) can be used with which of the following technologies? (Choose all that apply.)

A. SMTP B. HTTP C. FTP D. IMAP4

26. A certificate contains which of the following pieces of information? (Choose all that apply.) A. Expiration date

B. Issuing certificate authority name C. Length of the key

D. CRL publication interval

27. If you want to audit access to objects that exist in the configuration partition, you should enable ___________________.

A. Directory Services auditing B. Object Access auditing C. Process auditing D. Logon auditing

28. To view the packets that have passed between two computers, which of the following tools should you use?

A. Systems Management Server

B. Microsoft Security Baseline Analyzer C. Network Monitor

D. IPSec Monitor

29. To summarize a group of Application Logs across multiple Windows Server 2003–based computers, which of the following tools should you use?

A. MSBA

B. Network Monitor C. IPSec Monitor D. EventComb

Assessment Test xxxix

30. The physical address of a network device is referred to as its ___________________ address.

A. Media access control (MAC) B. Security set identifier (SSID) C. Host name

D. NetBIOS name

31. Which of the following are user certificate types? (Choose all that apply.) A. EFS

B. S/MIME C. Computer D. IPSEC

32. Wired equivalent privacy (WEP) can be broken using new technologies and is being replaced by ___________________.

A. Pre-Shared Key mode (PSK) B. Wi-Fi protected access (WPA) C. Media access control (MAC) filtering D. Security set identifier (SSID) beaconing

33. You need to deploy 802.1x authentication for your wireless network. Which of the following are required to support 802.1x authentication? (Choose all that apply.)

A. Windows XP Professional clients B. Active Directory

C. RADIUS

D. 802.11g wireless access points

34. Public key cryptography uses which kind of keys?

A. Symmetric keys B. Asymmetric keys C. Shared secret keys D. Pairs of shared secret keys

35. A wireless access point (WAP) that is deployed on your network by unauthorized personnel is often called a ___________________.

A. User deployed WLAN (wireless local area network) B. Wi-Fi protected access (WPA) point

C. User supported WAP D. Rogue WAP

4332.book Page xxxix Sunday, June 6, 2004 1:52 PM