Lesson 10 Page 397

341 Words2 Pages
Lesson 10 pg. 397 1.) Multi-factor authentication uses c. Passwords plus smartcards 2) Malware i. Potentially destructive software 3) Brute force a. automated password guessing 4) PIV e. standard for smart card support 5) Private Key f. Decrypts data encrypted with a certificate 6) Windows Biometric Framework h. Standard for fingerprint scanners and other devices 7) User rights b. Windows authorization mechanism 8) Authenticated exception j. What firewall rule requires IPsec 9) Public key d. stored in a digital certificate 10) Rules g. Firewall exceptions 1) Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? D. Disable the Store Passwords Using Reversible Encryption policy. 2) Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? D. Port Numbers 3) Which of the following NTFS features is incompatible with EFS encryption? A. Compression 4) Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files? B. /noprofile 5) Which of the following actions can you NOT perform from the Win Firewall control panel? (choose all that apply) A. Allow program through firewall on all three profiles C. Create Firewall exceptions based on Port numbers 6) Which of the following policy modifications would make it harder for intruders to penetrate user passwords by brute force attack? (choose all that apply) B. Enable Password Must Meet Complexity Requirements. D. Reduce the of the Minimum Password Age policy. 7) Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms? B. IPsec 8) Which of the following

More about Lesson 10 Page 397

Open Document