Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
Do common slang terms make strong passwords?
Q:
Is the Mac OS X Server Admin tool a tool for managing users, groups, and computers that access the server?
Q:
Can ConsoleOne be run from a workstation under the Remote Console NLM?
Q:
In Red Hat Linux, is an account enabled by default even if there is no password specified when the account is created?
Q:
In Red Hat Linux, is every account a member of a least one group?
Q:
In Red Hat Linux, are the group names that a user belongs to included in the /etc/passwd file?
Q:
If the payroll supervisor of a company decides to leave the company, should the administrator disable his or her account?
Q:
Is the option "User must change password at next logon" necessary for accounts used by the server administrator in WIndows 2003?
Q:
Which operating system uses the dialog in the figure above to configure password settings?a. Windows Server 2003 b. Red Hat Linux c. Mac OS Xd. Netware 6.x
Q:
Which operating system uses the dialog in the figure above to create accounts?a. Windows Server 2003 b. Red Hat Linx c. Mac OS Xd. Netware 6.x
Q:
Which operating system uses the dialog in the figure above to create accounts?a. Windows Server 2003 b. Red Hat Linux c. Mac OS Xd. Netware 6.x
Q:
Which useradd command parameter designates the default shell associated with the account?a. -q b. -R c. -sd. -f
Q:
Which useradd command parameter specifies an account expiration date?a. -p b. -G c. -Md. -e
Q:
Which useradd command parameter gives an account description?a. -c b. -d c. -ed. -f
Q:
What is the largest number that a Linux UID can be?a. 20,000 b. 40,000 c. 60,000d. 100,000
Q:
Which account properties Dial-in tab option enables the server to verify that a call is from a known location?a. Allow access b. Callback security c. Static routingd. None of the above
Q:
Which of the following options is available in the account properties Address tab?a. Street address b. Postal code c. Stated. Post Office Boxe. All of the above
Q:
Which of the following tabs is available only in Windows Server 2003?a. Terminal Services Profileb. Remote Control c. Environmentd. COM+
Q:
Which account properties tab is used to add the account to an existing group of users?a. Organization b. Profile c. Member Ofd. Sessions
Q:
Which account properties tab provides information about the logon name, domain name, and account options?a. General b. Account c. Addressd. Environment
Q:
Which account properties tab enables you to enter or modify personal information about the account holder, including the first name and last name?a. Address b. General c. Accountd. Profile
Q:
Which user account option should be used for a utility account needed to run a program process?a. Password never expires b. User cannot change password c. Account is disabledd. None of the above
Q:
How are new accounts set up for servers that use Active Directory?
a. MMC Local Users and Groups Snap-in
b. Computer Management tool
c. MMC Active Directory Users and Computers
d. Active Directory Users and Computers option on the Administrative Tools menu
e. Both c and d
Q:
How are new accounts set up for servers that do not use Active Directory?
a. MMC Local Users and Groups Snap-in
b. Computer Management tool
c. MMC Active Directory Users and Computers Snap-in
d. Both a and b
e. Both b and c
Q:
What type of accounts are created when Active Directory is not installed on Windows Server 2003?a. Domain b. Local c. Enterprised. OUs
Q:
Which operating system may come configured to automatically boot into an account without an account or password screen enabled?a. Windows XP Professional b. Red Hat Linux c. Netware 6.xd. Both a and be. Both a and c
Q:
Which of the following operating systems are capable of monitoring unsuccessful logon attempts?a. Windows Server 2003b. NetWare 6.x c. Mac OS Xd. Both a and be. Both a and c
Q:
How many characters does Windows 2000 limit its user account names to?a. 15b. 20 c. 128d. 256
Q:
Which functional area in the Windows Server 2003 is used to govern the certificate rules that are used on applications?a. Devices b. Network security c. System cryptographyd. System settings
Q:
Which functional area in the Windows Server 2003 is used to control the use of keys and algorithms for encryption?a. Network security b. System cryptography c. System objectsd. System security
Q:
Which functional area in the Windows Server 2003 is used to manage authentication options when NTLM is used instead of Kerberos for older clients?a. Microsoft network server b. Network access c. Network securityd. System cryptography
Q:
Which functional area in the Windows Server 2003 is used to require digitally signed communications with the server and to control what happens when a user's session is idle or when the logon hours expire?a. Microsoft network client b. Microsoft network server c. Network accessd. Network security
Q:
Which functional area in the Windows Server 2003 is used to manage who can perform specific tasks on a server designated as a domain controller?a. Domain controller b. Domain member c. Microsoft network clientd. Network security
Q:
Which preconfigured Windows Server 2003 administrative template is used for dial-up, language, and temporary Internet files settings in Internet Explorer?a. Inetcorp.adm b. Inetres.adm c. Inetset.admd. Conf.adm
Q:
Which preconfigured Windows Server 2003 administrative template is used for managing Internet Explorer in Windows 2000 Professional clients?a. Inetcorp.adm b. Inetres.adm c. Inetset.admd. System.adm
Q:
Which preconfigured Windows Server 2003 administrative template is used for managing Windows 95 and 98 clients?a. Conf.adm b. System.adm c. Winnt.admd. Windows.adm
Q:
Which preconfigured Windows Server 2003 administrative template is used for managing desktop settings that are common to all of Windows 95, 98, and NT?a. Common.adm b. Inetres.adm c. Inetcorp.admd. System.adm
Q:
Which User Configuration component controls access to Logon/Logoff capabilities, scripts, and Task Manager functions?a. Desktop b. Network c. Systemd. Control Panel
Q:
Administrative templatesare preconfigured group policies for which of the following?a. Client connectivity b. Using Softwarec. Managing Accountsd. Both a and b e. Both b and c
Q:
Nonlocal GPOs apply to which of the following?a. Sites b. Domains c. OUsd. All of the above
Q:
Where are group policy settings stored?a. In the registry b. In a secure ini file c. In a group policy objectd. In a system policy object
Q:
On which of the following can you set a group policy?a. Site b. Domain c. Userd. Both a and be. a, b, and c
Q:
_____ is a set of basic user account and computer parameters that can be configured using Poledit.exe.a. User policy b. System policy c. Account policyd. Group policy
Q:
Windows 2000 Professional is typically installed with an Administrator account and a Guest account. _________________________
Q:
A password expiration period requires users to change passwords at regular intervals. _________________________
Q:
The first step in developing an account policy in a company is usually to establish conventions for account names. _________________________
Q:
The Windows 2003 Common.adm administrative template is the default for managing Windows 2000 Professional and Windows XP Professional clients. _________________________
Q:
Windows 2003 access rights give the server administrator important security controls over who can access server and Active Directory resources. _________________________
Q:
A Netware 6.x user template, is an object stored in NDS that contains properties associated with designated accounts. _________________________
Q:
To configure the security settings for an account, open the Red Hat Security Manager and select the account you want to configure. _________________________
Q:
An effective defense against attackers is the use of long passwords. _________________________
Q:
The useradd -mcommand enables you to create a new user and establishes the home directory, if it has not previously been set up. _________________________
Q:
Information about groups is stored in the /etc/shadow file, which typically contains an entry for each group, consisting of the name of the group, an encrypted group password, the GID, and a list of group members. _________________________
Q:
The Mac OS X Server Admin tool allows you to create and manage accounts and groups.
Q:
Accounts in NetWare 6.x can be created using the ConsoleOne tool.
Q:
In Red Hat Linux, user accounts and groups can be created by editing the password, shadow, and group files.
Q:
In many UNIX systems, including Red Hat Linux, any account that has a UID of 1 automatically has access to anything in the system.
Q:
Under most circumstances, it is best for the network administrator to create and control all user passwords.
Q:
If Active Directory is installed and you are working on a DC, Windows 2000 Server and Windows Server 2003 will not allow you to use the Local Users and Groups tool.
Q:
Windows 2000/XP Professional is designed to effectively support up to 25 simultaneous users over a LAN.
Q:
Red Hat Linux is capable of monitoring unsuccessful logon attempts, in case an attacker attempts to break into an account by trying various password combinations or employing a brute force attack.
Q:
Which seven specific fields are contained in the ESP?
Q:
List the six specific fields in the AH.
Q:
In Windows 2000 and Windows 2003, a computer that is configured to use IPSec communication can function in three roles. What are they?
Q:
List six applications that can be used with SSL.
Q:
When following the ISO X.509format, what basic set of encrypted information does a digital certificate include?
Q:
List six of the common authentication methods in use today.
Q:
List and provide the key lengths for the three different flavors of RSA used by MPPE.
Q:
List the four hashing algorithms typically used.
Q:
List eight different encryption techniques that are designed to help protect stored or transmitted data.
Q:
____________________ encryption can work well on a computer for files that are only accessed by an authorized account, but it is difficult to achieve secrecy over a network using this method.
Q:
The DES, AES, and MPPE encryption methods are all forms of the ____________________ encryption method, but use different block sizes, key sizes, and algorithms.
Q:
____________________ is the science of creating secret messages.
Q:
In a(n) ____________________ attack every character combination is used in an attempt to determine the password of an account.
Q:
Deploying _________________________ with NAT can interfere with the security established by IPSec.
Q:
The ____________________ field in the ESP is used in the same way as in the AH, to store the Integrity Check Value.
Q:
The ____________________ field in the AH uses a special counter to activate anti-replay so that the receiver can determine if it has already received a packet.
Q:
When Windows 2000 Server or Windows Server 2003 is contacted by a client using IPSec configured in the Client (____________________) role, it will respond by using IPSec communication.
Q:
____________________ authentication method is an application-independent form of authentication that is modeled after SSL and uses RSA encryption.
Q:
____________________ authenticates by using tickets to verify client and server communications, and employs private-key encryption.