Preview

Microsoft Windows and Exception Firewall Rule

Satisfactory Essays
Open Document
Open Document
306 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft Windows and Exception Firewall Rule
1. Multi-factor Passwords plus smartcards

2 Malware Potentially destructive software

3. Brute force
Automated password guessing

4. PIV
Standard for smart card support

5. Private Key
Decrypts data encrypted with a certificate

6. Windows Biometric Framework
Standard for fingerprint scanners and other devices

7. User rights
Windows authorization mechanism

8. Authenticated exception
Firewall rule requires IPsec

9. Public key
Stored in a digital certificate

10. Rules
Firewall exceptions

Multiple Choice

1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? Disable the Store Passwords Using Reversible Encryption policy

2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? Port Numbers

3. Which of the following NTFS features is incompatible with EFS encryption?
Compression

4. Which of the following command-line parameters will prevent a program executed using Runas.exe from accessing the elevated user’s encrypted files? /noprofile

5. Which of the following actions can you NOT perform from the Win Firewall control panel?
Allow program through firewall on all three profiles
Create Firewall exceptions based on Port numbers

6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by brute force attack?
Increase value of Reset Account Logon Counter After
Enable Password Must Meet Complexity Requirements.

7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?
IPsec

8. Which of the following statements about Win Defender is true?
Windows Defender requires definition updates supplied with Windows Update downloads

9. Which of the parental controls has been removed from Win 7? Internet

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    4. Which of the following is not required when configuring port security without sticky learning?…

    • 920 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    7. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following? Routing method…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    For the workstation domain, password policies should be in place in the event a user does not do what they should. The workstations should be set up to require a certain complexity of passwords, as well as an inactivity timeout and failed password lockout to prevent brute force attacks. Each workstation should also have regular OS patches in place, as well as an up-to-date antivirus and application based firewall. This can be accomplished by setting up the proper GPOs in Active Directory for enforcement across the entire domain.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    5. Which of the following holds true while hardening an organizational network through security controls?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    9. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee computer. a. Data-leakage prevention c. Professional firewall b. Device authentication d. Network quarantine…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    What are the three primary methods for implementing security on this network, as well as the…

    • 403 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    8. Which password attack exploits situations where users change their passwords by adding a number to their old password?…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    15. Which of the following terms is used to describe computer networks that use the TCP/IP protocol but do not connect to sites outside the firm?…

    • 419 Words
    • 2 Pages
    Satisfactory Essays