Term
In the Reliability and Performance Monitor, which view provides information about system events that can affect a server’s stability, including software installation and un-installation, as well as any application, operating system, or hardware failures that have occurred over a particular time period? -Performance Monitor -Reliability Monitor -Resource -Network |
|
Definition
|
|
Term
Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________. -Windows Server 2008 -Windows Server 2003 -Windows XP -Windows NT |
|
Definition
|
|
Term
Which of the following is not a category for the Windows operating system updates? -Group Policy updates -critical updates -recommended downloads -multilanguage features |
|
Definition
|
|
Term
Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________. -approved content download from a WSUS server -scheduled content download and installation -the ability to configure all Automatic Updates options by using Group Policy Object Editor or by editing the registry -support for Unix-based systems |
|
Definition
support for Unix-based systems |
|
|
Term
From where can a server that runs WSUS be synchronized? -public Windows Update servers -another server running WSUS -manually configured content distribution point -all of the above |
|
Definition
|
|
Term
What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is sending or receiving data? -IPsec -checksum -TCP -UDP |
|
Definition
|
|
Term
What are the IPSEC default settings for the key lifetime in minutes? -350 -380 -450 -480 |
|
Definition
|
|
Term
What rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as membership in a particular Active Directory domain? -Tunnel -Authentication exemption -Isolation -Server to server |
|
Definition
|
|
Term
Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic? -Tunnel -Authentication exemption -Isolation -Server to server |
|
Definition
|
|
Term
To set the Netsh IPSec context, what is the first command you enter at the command prompt? -netsh -IPsec -static -dynamic |
|
Definition
|
|
Term
Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started? -Receive Failures -Acquire Failures -Send Failures -Authentication Failures |
|
Definition
|
|
Term
The Reliability and Performance Monitor is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools. Which of the following is not a feature? -Performance Logs and Alerts -Performance Monitor -Server Performance Advisor -System Monitor |
|
Definition
|
|
Term
The command “set config property=ipsecloginterval value=value” can be set to what range of values? -0 - 7 -0, 1 60 – 86,400 -0, 1, 2 |
|
Definition
|
|
Term
Which “middle-of-the-road” form of NTLM authentication was used to improve upon the security of LM Authentication? -LMv2 Authentication -NTLM Authentication -NTLMv2 Authentication -None of the above |
|
Definition
|
|
Term
Which process is used to establish trust between communicating systems, after which only trusted systems can communicate with each other? -shared cryptography -cryptographic checksum -mutual authentication -filtered methodology |
|
Definition
|
|
Term
Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment? -Kerberos v5 protocol -PKI certificate from a Certification Authority (CA) -preshared key -IPSec Authentication mode |
|
Definition
|
|
Term
What allows traffic that is defined in one direction to also be defined in the opposite direction? -manifestation -reflection -mirroring -evidencing |
|
Definition
|
|
Term
The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer? -Windows Server 2008 -Windows Server 2003 -Windows Vista -Windows 2000 |
|
Definition
|
|
Term
Which field does the IPSec driver use to match the correct SA with the correct packet? -IPSec Driver field -IKE Authentication field -IP Filter field -SPI field |
|
Definition
|
|
Term
What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications? -quick mode negotiations -quick mode messages -main mode negotiations -main mode messages |
|
Definition
|
|
Term
What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started? -Key Addition Failures -Key Update Failures -Get SPI Failures -Receive Failures |
|
Definition
|
|
Term
What is the default authentication protocol in an Active Directory network? -Kerberos v5 -LM Authentication -NTLM Authentication -NTLMv2 Authentication |
|
Definition
|
|
Term
Which of the following is the most frequently used view within the Reliability and Performance Monitor? -Performance Logs and Alerts -System Monitor -Server Performance Advisor -Performance Monitor |
|
Definition
|
|
Term
What version of IIS is included in Windows Server 2008? -4 -5 -6 -7 |
|
Definition
|
|
Term
Which box should you leave checked to make a site active as soon as it is created? -Directory Services -Start Web site immediately -Network Services -Application Services |
|
Definition
Start Web site immediately |
|
|
Term
Which role service does not ship with Windows Server 2008, but is available as a free download? -File Server Resources Manager -FTP7 -Windows Search Services -Windows Server Manager |
|
Definition
|
|
Term
What feature enables IIS7 to log additional diagnostic information and details on reasons for failures? -directory services -Failed Request Tracing -UDDI services -print services |
|
Definition
|
|
Term
When you create additional Websites on an IIS7 server, what server setting is automatically inherited?
-LAN Service -Internet Listing -Default Server Setting -FTP Management |
|
Definition
|
|
Term
What type of interface is provided in the modular architecture of IIS7 that can be used to configure a Website’s many properties? -optical filter -touchpad interface -icon-based interface -print interface |
|
Definition
|
|
Term
The original format for FTP directory listings was based on a format used by which operating system? -Windows operating system -UNIX operating systems -Network File operating systems -LAN operating systems |
|
Definition
|
|
Term
How many different Websites can be configured in IIS? -100 -1000 -10000 -unlimited |
|
Definition
|
|
Term
Which of the following is a new feature in FTP7? -IIS7 integration -FTP over Secure Sockets Layer (SSL) -combined FTP and Web hosting -all of the above |
|
Definition
|
|
Term
What allows a company to host the same documents on several different Websites without copying the documents to each content folder? -Role Manager -virtual directory -Add Role Wizard -Server Role Administration |
|
Definition
|
|
Term
In which view can you view the counters associated with Data Collector Sets? -Performance Monitor -System Monitor -Server Performance Advisor -Performance Logs and Alerts |
|
Definition
|
|
Term
What type of IIS authentication is best used for intranet Web servers with clients that are members of the same Active Directory domain and are separated by a firewall or proxy server? -Basic Authentication -Anonymous Authentication -Digest Authentication -Windows Authentication |
|
Definition
|
|
Term
When you install the Web Server (IIS) role on a Windows Server 2008 computer, what user account does IIS7 create? -WWWUSERS -IIS_IUSRS -IISUSR -IUSR |
|
Definition
|
|
Term
What authentication protocol is ticket-based and is used by Windows computers that are members of an Active Directory domain? -NTLM -NTLMv2 -Kerberos -Certificate Services |
|
Definition
|
|
Term
What is a way to configure an ASP.NET application to run in a security context different from the application’s default context? -ASP.NET Masquerading -ASP.NET Impersonation -ASP.NET Extensible Security -ASP.NET Enhanced Security |
|
Definition
|
|
Term
You are establishing an SSL connection with the server when you click a link or key a URL containing the __________ prefix in your browser. -http -https:// -httpssl:// -httpsec:// |
|
Definition
|
|
Term
What tasks must you complete to install SSL on an IIS server? -Obtain and install a server certificate. -Create an SSL binding for your Website -Configure the Website or FTP7 site to use SSL. -All of the above |
|
Definition
|
|
Term
A digital certificate is an electronic credential issued by a __________. -certificate server -certificate provider -certification authority -certification initiator |
|
Definition
|
|
Term
Participants in what type of infrastructure are issued two keys, one public and one private? -public key -private key -secure key -encrypted key |
|
Definition
|
|
Term
SSL for FTP7 eliminates one of the major shortcomings of FTP, which is __________. -slow connections -transmission of passwords in clear text -user management -limited number of concurrent connections |
|
Definition
transmission of passwords in clear text |
|
|
Term
Permissions tend to run down through a hierarchy, which is called __________. -permission translation -permission propagation -permission flow -permission inheritance |
|
Definition
|
|
Term
Which of the following is not a built-in Data Collector Set within Windows Server 2008? -LAN Diagnostics -System Diagnostics -System Monitor -System Performance |
|
Definition
|
|
Term
The anonymous user account in IIS7 is a built-in account called IUSR, which is a member of what group? -WWW_IUSRS -IIS_WWWUSRS -IIS_IUSRS -IIS_GROUP |
|
Definition
|
|
Term
Which log should be the first place you look when you suspect a problem with Active Directory? -Event Viewer -Directory Service -Service Monitor -Event Monitor |
|
Definition
|
|
Term
In which node is Event Viewer located? -Setup node -Application node -Diagnostics node -Security node |
|
Definition
|
|
Term
Which log records events associated with server installation, adding and removing server roles, installing applications, and so forth? -Setup -System -Forwarded events -Security |
|
Definition
|
|
Term
When you first launch Network Monitor, what key do you press to begin capturing network traffic? -F8 -F9 -F10 -F11 |
|
Definition
|
|