Top-Rated Free Essay
Preview

lesson10

Satisfactory Essays
285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lesson10
Gary Fugitt

NT1230 client-server networking 1

Lesson 10

Oct 27, 2013

1. C/ multifactor authentication
2. I/ malware
3. A/ brute force
4. E/ Personal Identity Verification (PIV)
5. F/ private key
6. H/ Windows Biometric Framework
7. B/ user rights
8. J/ authenticated exception
9. D/ public key
10. G/ rules

1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing capture packets?
d. Disable the store passwords using reversible encryption policy
2. Which of the following mechanism is most often used in firewall rules to allow traffic on to the network?
d. Port numbers
3. Which of the following NTFS features is incompatible with EFS encryption?
a. Compression
4. Which of the following command-line parameters will prevent a program executed using Runas.exe from the elevated user’s encrypted files?
b. /noprofile
5. Which of the following actions can you NOT perform from the windows firewall control panel?
a. Allow a program through the firewall in all three profiles
c. Create firewall exception based on port numbers
6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute force attack?
a. Increase the value of the reset account logon counter after policy
b. Enable the password must meet complexity requirement policy
7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanism?
b. IPsec
8. Which of the following statement about windows defenders is true?
d. windows defender requires definition updates that are supplied free with the regularly scheduled windows update downloads.
9. Which of the parental controls has been removed from windows 7?
d. Internet filtering
10. The built-in local groups on a windows 7 workstation receive their special capabilities through which of the following mechanisms? d user rights

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The firewall process can tightly control what is allowed to traverse from one side to the other. As with most aspects of security, deciding what type of firewall to use will depend upon factors such as traffic levels, services needing protection and the complexity of rules required. The difficulty for firewalls is distinguishing between legitimate and illegitimate traffic. Firewalls, if configured correctly, can be a reasonable form of protection from external threats including some denial of service (DOS) attacks. If not configured correctly they can be major security holes in an organization. The most basic protection a firewall provides is the ability to block network traffic to certain destinations. This includes both IP addresses and particular network service ports.…

    • 1578 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Which of the following is a GPO on a Vista computer (Choose all that apply)…

    • 1935 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Unit 8 eCommerce P1

    • 1328 Words
    • 6 Pages

    Firewall: A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analysing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.…

    • 1328 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    9. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee computer. a. Data-leakage prevention c. Professional firewall b. Device authentication d. Network quarantine…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    type of access controls and permissions are probably configured? What type of Access Control would…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2 Lab Manual

    • 1433 Words
    • 6 Pages

    2. Explain why you would want to limit the type of incoming connections that you allow on a computer. Use your textbook and Internet research to support your answer…

    • 1433 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control?…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    8. Which password attack exploits situations where users change their passwords by adding a number to their old password?…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cisa

    • 12601 Words
    • 51 Pages

    C. Access to the operating system command line is granted through an access restriction tool with preapproved rights…

    • 12601 Words
    • 51 Pages
    Better Essays