7. a. View the system log in Event Viewer. 8. b. Create an additional HTTP virtual server. 9. a.
Explain how Network Access Protection (NAP) creates a security architecture that allows administrators to control access to critical resources and assist users in meeting security requirements. ANSWERS: 1. The function of the following Windows Server 2008 services is as follows: a. Active Directory Federation Services – this is a component in the Windows Server 2008 operating system that provides Web single-sign-on (SSO) technologies to authenticate a user to multiple Web applications over the life of a single online session. b.
Recover Console 9. BranchCache is a client/server application that supports which of the following two operational modes? Distribute cache mode. 10. For stand-alone systems or small networks, Windows 7 includes backup tools that you can use to protect your data.
Multiple Choice 1. Which special identity group controls anonymous access to resources in Windows Server 2008? D. Anonymous Logon 2. What defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure? A.
Unit 3, Assignment 1 Anthony Correll January 16, 2015 NT2580 Remote access security policy involves the policies and conditions that are in place that allow users to connect to servers when out of the network. In the case of Richman industries, they are interested in maintaining connections with their users, and sharing app data that is on a server for their day to day operations. In their case, I would have access policy that is based on Explicit Allow policies. This means that the policy grants “Permission” to access the servers remotely if the connection attempt matches the policy conditions. Some of the requirements would include strict control enforced via one-time password authentication or public keys with strong pass-phrases.
The two companies must each have at least one Internet access link. 2. Which of the following standalone devices can be found near the Internet edge, with a primary purpose of providing some type of network security between an enterprise or SOHO TCP/IP network and the Internet? (Choose two answers) B. IPS D. Firewall 3. Which of the following answers lista concept that is likely to be true about a single POP?
Web Browser - software controlled directly by a user that requests web pages from a web server, and after receiving a page, displays the web page in a window. 9. Web Address - Text that identifies details about one object in a network so that a client can request that object from a server. 10. Web Page - In a web browser, all the text, images, video, and sound that fill the window of the browser when the user opens a link to some web address.
d. The two companies must each connect to a Tier 1 ISP. Answer: B. to send packets through the Internet, a company needs just one connection to an ISP. The ISP then commits to having connections to the rest of the Internet. The two companies do not need a connection to each other, or even to the same ISP. 2.
Research Assignment Part 1 Part 1: In this first section, you will investigate the changes made to the architecture of Windows Server 2008. Research from the ITT Tech Virtual Library and the Internet to answer the following questions: 1. Why Windows Server 2008 comes in different versions? What is the significance of each version? 2.
Roaming User Profile: E. Enables users to access their desktops from any workstation. 3. Admin Approval Mode: A. Switches an account from the standard user token to the administrative token. 4. Special Identity: I. Placeholder for a collection of users with a similar characteristic.