Preview

Microsoft Windows and Exception Firewall Rule

Satisfactory Essays
Open Document
Open Document
306 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft Windows and Exception Firewall Rule
1. Multi-factor Passwords plus smartcards

2 Malware Potentially destructive software

3. Brute force
Automated password guessing

4. PIV
Standard for smart card support

5. Private Key
Decrypts data encrypted with a certificate

6. Windows Biometric Framework
Standard for fingerprint scanners and other devices

7. User rights
Windows authorization mechanism

8. Authenticated exception
Firewall rule requires IPsec

9. Public key
Stored in a digital certificate

10. Rules
Firewall exceptions

Multiple Choice

1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? Disable the Store Passwords Using Reversible Encryption policy

2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? Port Numbers

3. Which of the following NTFS features is incompatible with EFS encryption?
Compression

4. Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files? /noprofile

5. Which of the following actions can you NOT perform from the Win Firewall control panel?
Allow program through firewall on all three profiles
Create Firewall exceptions based on Port numbers

6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by brute force attack?
Increase value of Reset Account Logon Counter After
Enable Password Must Meet Complexity Requirements.

7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?
IPsec

8. Which of the following statements about Win Defender is true?
Windows Defender requires definition updates supplied with Windows Update downloads

9. Which of the parental controls has been removed from Win 7? Internet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    8. Which password attack exploits situations where users change their passwords by adding a number to their old password?…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    9. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee computer. a. Data-leakage prevention c. Professional firewall b. Device authentication d. Network quarantine…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    5. Which of the following holds true while hardening an organizational network through security controls?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    What are the three primary methods for implementing security on this network, as well as the…

    • 403 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 - Info Sec

    • 2576 Words
    • 10 Pages

    4. What options are available to prevent brute force authentication attacks in a Windows-based domain?…

    • 2576 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    The ____ is the most important part of any network, so usually it is given a higher level of security.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Unauthorized access from public internet – Operating system, software patches, updates, change passwords often, and hardware or software firewall.…

    • 868 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    8. Is the order of the rules important? If you deny something within the IP network layer, but permit something within the TCP transport layer that uses the IP network layer that you just denied, will your TCP traffic be permitted?…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Often, the first thing people tend to think of in network perimeter defense is a firewall (Posey, 2003). In most common environments, firewalls would be placed at the terminal ends of every network segments (Cole, Krutz and Conley, 2005). A firewall’s basic job is to permit or stop packets from flowing into or out of a network. For perimeter security implementation, firewalls are available as a software (installed inside a route) or as a stand-alone hardware appliance (Mosson, 2009).…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    1. What is the typical relationship among the untrusted network, the firewall, and the trusted network?…

    • 2028 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications.…

    • 746 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Windows 7 Config

    • 10250 Words
    • 41 Pages

    How and why a UAC prompt might occur Here are some scenarios which would trigger a UAC prompt: a. While trying to install/uninstall a program b. To gain access to a system utility like msconfig c. Any kind of program which checks for updates for new programs (third party tools like secunia psi or File hippo's updatechecker), Windows updates and changing the time. d. While trying to delete/add folders to the program files directory or the system directory (usually c:\windows)…

    • 10250 Words
    • 41 Pages
    Good Essays
  • Satisfactory Essays

    Windows Firewall: Quiz

    • 436 Words
    • 3 Pages

    Which of the following is not an item that can be used when building Windows Firewall rules?…

    • 436 Words
    • 3 Pages
    Satisfactory Essays