Term
A password should be __________ characters in length to be considered a strong password. -12 -6 -8 -10 |
|
Definition
|
|
Term
A __________ is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource. -PIN -biometric -password -SecureID |
|
Definition
|
|
Term
Administrators find that Group Policy implementation helps them to achieve __________. -faster performance -virus-free networks -centralized management -enhanced security |
|
Definition
|
|
Term
By implementing the __________ feature when Folder Redirection is also configured, administrators can control the amount of information that is stored on the server. -File System Quotas -Disk Quotas -File System Caching -Disk Caching |
|
Definition
|
|
Term
Configuring what setting on an individual GPO link forces a particular GPO's settings to flow down through the Active Directory without being blocked by any child OUs? -Loopback Processing -Propagate -Block Policy Inheritance -Enforce |
|
Definition
|
|
Term
Group policy is divided into two subcategories, or nodes, that are named Computer Configuration and __________. -Domain Configuration -User Configuration -Security Configuration -Network Configuration |
|
Definition
|
|
Term
How often are Computer Configuration group policies refreshed by default? -every 90 minutes -every 30 minutes -every 120 minutes -every 60 minutes |
|
Definition
|
|
Term
If you set the refresh interval to zero, the system attempts to update the policy at what interval? -every minute -every second -every 7 minutes -every 7 seconds |
|
Definition
|
|
Term
Local GPO settings are stored in what folder on a computer? -%systemroot%/System/GroupPolicy -%systemroot%/System32/Drivers/GroupPolicy -%systemroot%/System32/Drivers/Etc/GroupPolicy -%systemroot%/System32/GroupPolicy |
|
Definition
%systemroot%/System32/GroupPolicy |
|
|
Term
Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated __________ attack -cracking -work -brute force -dictionary |
|
Definition
|
|
Term
Password-__________ is an attempt to discover a user's password. -cracking -sniffing -tracing -recovery |
|
Definition
|
|
Term
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length. -142 -68 -127 -97 |
|
Definition
|
|
Term
Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI). -PKI Policies -Private Key Policies -Public Key Policies -Secure Key Policies |
|
Definition
|
|
Term
The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain. -Default Domain -Default -Domain -Default Domain Controller |
|
Definition
|
|
Term
To implement PKI, what must be installed on your Windows 2008 Server? -Active Directory Certificate Services -Active Directory Users and Computers -Microsoft AdminPak -Microsoft Advanced Security Pack |
|
Definition
Active Directory Certificate Services |
|
|
Term
What advanced technique allows you to apply GPO settings to only one or more users or groups within a container by selectively granting the “Apply Group Policy” permission to one or more users or security groups? -Group Policy filtering -security group filtering -linking -nesting |
|
Definition
|
|
Term
What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run? -Reverse Processing -Switchback Processing -Repeat Processing -Loopback Processing |
|
Definition
|
|