I&CW7-Ch 10

Cards

Front Back
1) Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? Disable the Store Passwords Using Reversible Encryption policy.
2) Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? Port Numbers
3) Which of the following NTFS features is incompatible with EFS encryption? Compression
4) Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files? /noprofile
5) Which of the following actions can you NOT perform from the Win Firewall control panel? (choose all that apply) Allow program through firewall on all three profiles and Create Firewall exceptions based on Port numbers
6) Which of the following policy modifications would make it harder for intruders to penetrate user passwords by brute force attack? (choose all that apply) Increase value of Reset Account Logon Counter After and Enable Password Must Meet Complexity Requirements.
7) Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms? IPsec
8) Which of the following statements about Win Defender is true? Windows Defender requires definition updates supplied with Windows Update downloads
9) Which of the parental controls has been removed from Win 7? Internet Filtering
10) The built-in local groups on a Win 7 workstation receive their special capabilities through which of the following mechanisms? NTFS Permissions
1) Multi-factor authentication uses Passwords plus smartcards
2) These are potentially destructive software Malware
3) Automated password guessing is known as Brute force
4) What is the standard for smart card support PIV
5) Decrypts data encrypted with a certificate Private Key
6) Standard for fingerprint scanners and other devices Windows Biometric Framework
7) Windows authorization mechanism User rights
8) What firewall rule requires IPsec authenticated exception
9) This key is stored in a digital certificate public key
10) Firewall exceptions are called rules