Preview

Microsoft Windows and Exception Firewall Rule

Satisfactory Essays
Open Document
Open Document
306 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft Windows and Exception Firewall Rule
1. Multi-factor Passwords plus smartcards

2 Malware Potentially destructive software

3. Brute force
Automated password guessing

4. PIV
Standard for smart card support

5. Private Key
Decrypts data encrypted with a certificate

6. Windows Biometric Framework
Standard for fingerprint scanners and other devices

7. User rights
Windows authorization mechanism

8. Authenticated exception
Firewall rule requires IPsec

9. Public key
Stored in a digital certificate

10. Rules
Firewall exceptions

Multiple Choice

1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? Disable the Store Passwords Using Reversible Encryption policy

2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? Port Numbers

3. Which of the following NTFS features is incompatible with EFS encryption?
Compression

4. Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files? /noprofile

5. Which of the following actions can you NOT perform from the Win Firewall control panel?
Allow program through firewall on all three profiles
Create Firewall exceptions based on Port numbers

6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by brute force attack?
Increase value of Reset Account Logon Counter After
Enable Password Must Meet Complexity Requirements.

7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?
IPsec

8. Which of the following statements about Win Defender is true?
Windows Defender requires definition updates supplied with Windows Update downloads

9. Which of the parental controls has been removed from Win 7? Internet

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    4. Which of the following is not required when configuring port security without sticky learning?…

    • 920 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    7. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following? Routing method…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    BAT1 Task 1

    • 1871 Words
    • 8 Pages

    c) There should be restrictions on the passwords created by users with regards to complexity, maximum and minimum duration of the password, history of the password etc. Login information should be changed once in three months to keep…

    • 1871 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    9. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee computer. a. Data-leakage prevention c. Professional firewall b. Device authentication d. Network quarantine…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    8. Which password attack exploits situations where users change their passwords by adding a number to their old password?…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    15. Which of the following terms is used to describe computer networks that use the TCP/IP protocol but do not connect to sites outside the firm?…

    • 419 Words
    • 2 Pages
    Satisfactory Essays