NT 1230
Unit 5 Problem Set 1
Matching
Complete the following exercise by matching the terms with their corresponding definitions.
a. automated password guessing
b. Windows authorization mechanism
c. passwords plus smartcards
d. stored in a digital certificate
e. standard for smart card support
f. decrypts data encrypted with a certificate
g. firewall exceptions
h. standard for fingerprint scanners and other devices
i. potentially destructive software
j. firewall rule requiring IPsec
___C____ 1. multifactor authentication
___I____ 2. malware
___A____ 3. brute force
___E____ 4. Personal Identity Verification (PIV)
____F___ 5. private key
___H____ 6. Windows Biometric Framework
___B____ 7. user rights
___J____ 8. authenticated exception
___D____ 9. public key
___G____ 10. Rules
Multiple Choice
Select one or more correct answers for each of the following questions. 1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? a. Increase the Enforce Password History value b. Enable the Password Must Meet Complexity Requirements setting c. Decrease the Account Lockout Threshold value d. Disable the Store Passwords Using Reversible Encryption policy 2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? a. hardware addresses b. IP addresses c. protocol numbers d. port numbers 3. Which of the following NTFS features is incompatible with EFS encryption? a. compression b. IPsec c. permissions d. parental controls
4. Which of the following command-line parameters will prevent a program executed using
Runas.exe from accessing the elevated user’s encrypted files? a. /env b. /noprofile c. /showcred d. /profile 5. Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.) a. Allow a program through the firewall in all three profiles b. Manage firewall exceptions for the domain profile c. Create firewall exceptions based on port numbers d. Turn Windows firewall off for all three profiles 6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute force attack? (Choose all that apply.) a. Increase the value of the Reset Account Logon Counter After policy b. Enable the Password Must Meet Complexity Requirements policy c. Increase the Account Lockout Threshold value d. Reduce the value of the Minimum Password Age policy 7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms? a. EFS b. IPsec c. UAC d. PIV 8. Which of the following statements about Windows Defender is true? a. Windows Defender uses rules that you create to control its scans. b. Windows Defender can detect spyware that is already present on the system, but it cannot prevent the infiltration of new spyware. c. Windows Defender eliminates the need for third-party anti-virus software. d. Windows Defender requires definition updates that are supplied free with the regularly scheduled Windows Update downloads. 9. Which of the parental controls has been removed from Windows 7? a. Application restrictions b. User time limits c. Restricted access to games
d. Internet filtering 10. The built-in local groups on a Windows 7 workstation receive their special capabilities through which of the following mechanisms? a. parental controls b. Windows firewall rules c. NTFS permissions d. user rights
You May Also Find These Documents Helpful
-
1. Forward Biased LED: A bias voltage that is applied to a pn-junction in the direction that causes a large current flow; used in some semiconductor diode circuits.…
- 1118 Words
- 5 Pages
Powerful Essays -
Horizontal cable- Horizontal Cable-The cabling between and including the telecommunications outlet and the horizontal cross-connect. Horizontal cabling is considered the permanent portion of a link; may also be called horizontal wiring.…
- 1072 Words
- 4 Pages
Satisfactory Essays -
1. Which of the following service priority guidelines are not accurate D- You should rate departmental issues according to how the issues affect senior management.…
- 669 Words
- 2 Pages
Satisfactory Essays -
1. A newer form of the periodic table has been established, but is not universally used at this time. Go to http://www.sciencenews.org/view/generic/id/67938/description/Periodic_table_gets_some_flex and read the article to answer the following questions:…
- 465 Words
- 2 Pages
Satisfactory Essays -
Assuming that each of the systems in question have 16 GB of available hard disk space, it does look like your machines may meet the minimum hardware requirements to have Windows 7 installed. The systems only have to have a processor speed of 1 GHz or faster, 1 GB of system memory, as well as a DirectX 9 graphics adapter with WDDM 1.0 or higher driver, which you’ve shared with me that each of your workstations have.…
- 270 Words
- 1 Page
Satisfactory Essays -
4. A computer running Windows PE will automatically reboot after 72 hours of continuous operation.…
- 220 Words
- 1 Page
Satisfactory Essays -
6. Upgrading a computer running Windows 7 Starter to Windows 7 Ultimate using Windows Anytime Upgrade requires 0 megabytes of additional hard disk space.…
- 750 Words
- 3 Pages
Satisfactory Essays -
To solve your first problem I would create a mandatory user profile for each intern. A mandatory user profile is a type of profile that administrators can use to specify settings for users. Only system administrators can make changes to mandatory user profiles. Changes made by users to desktop settings are lost when the user logs off.…
- 236 Words
- 1 Page
Satisfactory Essays -
a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…
- 928 Words
- 3 Pages
Good Essays -
Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…
- 1097 Words
- 5 Pages
Better Essays -
3. Which of the following Windows 7 tools does not aid in the network troubleshooting process? B…
- 466 Words
- 4 Pages
Satisfactory Essays -
The Windows Firewall in Windows 8.1 can have rules configured that allows traffic to flow in which direction(s)?…
- 436 Words
- 3 Pages
Satisfactory Essays -
The company’s strong password policy is: Passwords must be at least seven characters in length and a combination of upper and lower-case letters, numbers and symbols. Passwords will be rotated every 90 days and the new password can’t be one of 5 previous passwords.…
- 822 Words
- 4 Pages
Good Essays -
The project will be about a Gift Shop database system. Because transaction records on papers can be lost or tampered, a simple yet effective and functional shop database system can be of use. This can also reduce the overall cost for managing the records that is paper based. This type of database system can be more secured and easy to manage.…
- 2344 Words
- 10 Pages
Powerful Essays -
Sure enough, we have all heard before how stress can actually drive people out of procrastination and inertia, and into achieving results. But, did you know that this claim only works if the pressure remains at a moderate amount?…
- 584 Words
- 3 Pages
Good Essays