Shared Flashcard Set

Details

70-642 study guide 3
NSCOM 221
50
Computer Networking
Professional
08/22/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
In the Reliability and Performance Monitor, which view provides information about system events that can affect a server’s stability, including software installation and un-installation, as well as any application, operating system, or hardware failures that have occurred over a particular time period?
-Performance Monitor
-Reliability Monitor
-Resource
-Network
Definition
Reliability Monitor
Term
Windows Server Update Services (WSUS) is a Web-based tool for managing and distributing software updates that resolve known security vulnerabilities or otherwise improve performance of all of the following operating systems except __________.
-Windows Server 2008
-Windows Server 2003
-Windows XP
-Windows NT
Definition
Windows NT
Term
Which of the following is not a category for the Windows operating system updates?
-Group Policy updates
-critical updates
-recommended downloads
-multilanguage features
Definition
Group Policy updates
Term
Automatic Updates has been enhanced to support WSUS. This enhancement adds all of the following features when used in conjunction with a WSUS server except __________.
-approved content download from a WSUS server
-scheduled content download and installation
-the ability to configure all Automatic Updates options by using Group Policy Object Editor or by editing the registry
-support for Unix-based systems
Definition
support for Unix-based systems
Term
From where can a server that runs WSUS be synchronized?
-public Windows Update servers
-another server running WSUS
-manually configured content distribution point
-all of the above
Definition
all of the above
Term
What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer, regardless of the actual application that is sending or receiving data?
-IPsec
-checksum
-TCP
-UDP
Definition
IPSec
Term
What are the IPSEC default settings for the key lifetime in minutes?
-350
-380
-450
-480
Definition
480
Term
What rule allows you to restrict inbound and outbound connections based on certain sets of criteria, such as membership in a particular Active Directory domain?
-Tunnel
-Authentication exemption
-Isolation
-Server to server
Definition
Isolation
Term
Which rule allows you to specify one or more computers that do not need to be authenticated to pass traffic?
-Tunnel
-Authentication exemption
-Isolation
-Server to server
Definition
Authentication exemption
Term
To set the Netsh IPSec context, what is the first command you enter at the command prompt?
-netsh
-IPsec
-static
-dynamic
Definition
netsh
Term
Which statistic represents the number of failed outbound requests that occurred to establish the SA since the IPSec service started?
-Receive Failures
-Acquire Failures
-Send Failures
-Authentication Failures
Definition
Acquire Failures
Term
The Reliability and Performance Monitor is a tool located within the Administrative Tools folder that combines features that had previously been spread across a number of tools. Which of the following is not a feature?
-Performance Logs and Alerts
-Performance Monitor
-Server Performance Advisor
-System Monitor
Definition
Performance Monitor
Term
The command “set config property=ipsecloginterval value=value” can be set to what range of values?
-0 - 7
-0, 1
60 – 86,400
-0, 1, 2
Definition
60 – 86,400
Term
Which “middle-of-the-road” form of NTLM authentication was used to improve upon the security of LM Authentication?
-LMv2 Authentication
-NTLM Authentication
-NTLMv2 Authentication
-None of the above
Definition
NTLM Authentication
Term
Which process is used to establish trust between communicating systems, after which only trusted systems can communicate with each other?
-shared cryptography
-cryptographic checksum
-mutual authentication
-filtered methodology
Definition
mutual authentication
Term
Which default authentication method is used by IPSec policies deployed within an Active Directory domain and can only be used in an Active Directory environment?
-Kerberos v5 protocol
-PKI certificate from a Certification Authority (CA)
-preshared key
-IPSec Authentication mode
Definition
Kerberos v5 protocol
Term
What allows traffic that is defined in one direction to also be defined in the opposite direction?
-manifestation
-reflection
-mirroring
-evidencing
Definition
mirroring
Term
The driving factor behind combining administration of the Windows Firewall with IPSec policies is to streamline network administration on which type of computer?
-Windows Server 2008
-Windows Server 2003
-Windows Vista
-Windows 2000
Definition
Windows Server 2008
Term
Which field does the IPSec driver use to match the correct SA with the correct packet?
-IPSec Driver field
-IKE Authentication field
-IP Filter field
-SPI field
Definition
SPI field
Term
What is used to determine encryption key material and security protection for use in protecting subsequent main mode or quick mode communications?
-quick mode negotiations
-quick mode messages
-main mode negotiations
-main mode messages
Definition
main mode negotiations
Term
What statistic shows the total number of failed outbound quick mode SA addition requests that have been submitted by IKE to the IPSec driver since the IPSec service was last started?
-Key Addition Failures
-Key Update Failures
-Get SPI Failures
-Receive Failures
Definition
Key Addition Failures
Term
What is the default authentication protocol in an Active Directory network?
-Kerberos v5
-LM Authentication
-NTLM Authentication
-NTLMv2 Authentication
Definition
Kerberos v5
Term
Which of the following is the most frequently used view within the Reliability and Performance Monitor?
-Performance Logs and Alerts
-System Monitor
-Server Performance Advisor
-Performance Monitor
Definition
Performance Monitor
Term
What version of IIS is included in Windows Server 2008?
-4
-5
-6
-7
Definition
7
Term
Which box should you leave checked to make a site active as soon as it is created?
-Directory Services
-Start Web site immediately
-Network Services
-Application Services
Definition
Start Web site immediately
Term
Which role service does not ship with Windows Server 2008, but is available as a free download?
-File Server Resources Manager
-FTP7
-Windows Search Services
-Windows Server Manager
Definition
FTP7
Term
What feature enables IIS7 to log additional diagnostic information and details on reasons for failures?
-directory services
-Failed Request Tracing
-UDDI services
-print services
Definition
Failed Request Tracing
Term
When you create additional Websites on an IIS7 server, what server setting is automatically inherited?

-LAN Service
-Internet Listing
-Default Server Setting
-FTP Management
Definition
Default Server Setting
Term
What type of interface is provided in the modular architecture of IIS7 that can be used to configure a Website’s many properties?
-optical filter
-touchpad interface
-icon-based interface
-print interface
Definition
icon-based interface
Term
The original format for FTP directory listings was based on a format used by which operating system?
-Windows operating system
-UNIX operating systems
-Network File operating systems
-LAN operating systems
Definition
UNIX operating systems
Term
How many different Websites can be configured in IIS?
-100
-1000
-10000
-unlimited
Definition
unlimited
Term
Which of the following is a new feature in FTP7? -IIS7 integration -FTP over Secure Sockets Layer (SSL) -combined FTP and Web hosting -all of the above
Definition
all of the above
Term
What allows a company to host the same documents on several different Websites without copying the documents to each content folder?
-Role Manager
-virtual directory
-Add Role Wizard
-Server Role Administration
Definition
virtual directory
Term
In which view can you view the counters associated with Data Collector Sets?
-Performance Monitor
-System Monitor
-Server Performance Advisor
-Performance Logs and Alerts
Definition
Performance Monitor
Term
What type of IIS authentication is best used for intranet Web servers with clients that are members of the same Active Directory domain and are separated by a firewall or proxy server?
-Basic Authentication
-Anonymous Authentication
-Digest Authentication
-Windows Authentication
Definition
Digest Authentication
Term
When you install the Web Server (IIS) role on a Windows Server 2008 computer, what user account does IIS7 create?
-WWWUSERS
-IIS_IUSRS
-IISUSR
-IUSR
Definition
IISUSR
Term
What authentication protocol is ticket-based and is used by Windows computers that are members of an Active Directory domain?
-NTLM
-NTLMv2
-Kerberos
-Certificate Services
Definition
Kerberos
Term
What is a way to configure an ASP.NET application to run in a security context different from the application’s default context?
-ASP.NET Masquerading
-ASP.NET Impersonation
-ASP.NET Extensible Security
-ASP.NET Enhanced Security
Definition
ASP.NET Impersonation
Term
You are establishing an SSL connection with the server when you click a link or key a URL containing the __________ prefix in your browser.
-http
-https://
-httpssl://
-httpsec://
Definition
https://
Term
What tasks must you complete to install SSL on an IIS server?
-Obtain and install a server certificate.
-Create an SSL binding for your Website
-Configure the Website or FTP7 site to use SSL.
-All of the above
Definition
All of the above
Term
A digital certificate is an electronic credential issued by a __________.
-certificate server
-certificate provider
-certification authority
-certification initiator
Definition
certification authority
Term
Participants in what type of infrastructure are issued two keys, one public and one private?
-public key
-private key
-secure key
-encrypted key
Definition
public key
Term
SSL for FTP7 eliminates one of the major shortcomings of FTP, which is __________.
-slow connections
-transmission of passwords in clear text
-user management
-limited number of concurrent connections
Definition
transmission of passwords in clear text
Term
Permissions tend to run down through a hierarchy, which is called __________.
-permission translation
-permission propagation
-permission flow
-permission inheritance
Definition
permission inheritance
Term
Which of the following is not a built-in Data Collector Set within Windows Server 2008?
-LAN Diagnostics
-System Diagnostics
-System Monitor
-System Performance
Definition
System Monitor
Term
The anonymous user account in IIS7 is a built-in account called IUSR, which is a member of what group?
-WWW_IUSRS
-IIS_WWWUSRS
-IIS_IUSRS
-IIS_GROUP
Definition
IIS_IUSRS
Term
Which log should be the first place you look when you suspect a problem with Active Directory?
-Event Viewer
-Directory Service
-Service Monitor
-Event Monitor
Definition
Directory Service
Term
In which node is Event Viewer located?
-Setup node
-Application node
-Diagnostics node
-Security node
Definition
Diagnostics node
Term
Which log records events associated with server installation, adding and removing server roles, installing applications, and so forth?
-Setup
-System
-Forwarded events
-Security
Definition
Setup
Term
When you first launch Network Monitor, what key do you press to begin capturing network traffic?
-F8
-F9
-F10
-F11
Definition
F10
Supporting users have an ad free experience!