Top-Rated Free Essay
Preview

Unit 5 Problem Set 1

Satisfactory Essays
522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Problem Set 1
Baldeo Persaud
NT 1230
Unit 5 Problem Set 1
Matching
Complete the following exercise by matching the terms with their corresponding definitions.
a. automated password guessing
b. Windows authorization mechanism
c. passwords plus smartcards
d. stored in a digital certificate
e. standard for smart card support
f. decrypts data encrypted with a certificate
g. firewall exceptions
h. standard for fingerprint scanners and other devices
i. potentially destructive software
j. firewall rule requiring IPsec
___C____ 1. multifactor authentication
___I____ 2. malware
___A____ 3. brute force
___E____ 4. Personal Identity Verification (PIV)
____F___ 5. private key
___H____ 6. Windows Biometric Framework
___B____ 7. user rights
___J____ 8. authenticated exception
___D____ 9. public key
___G____ 10. Rules

Multiple Choice
Select one or more correct answers for each of the following questions. 1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? a. Increase the Enforce Password History value b. Enable the Password Must Meet Complexity Requirements setting c. Decrease the Account Lockout Threshold value d. Disable the Store Passwords Using Reversible Encryption policy 2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? a. hardware addresses b. IP addresses c. protocol numbers d. port numbers 3. Which of the following NTFS features is incompatible with EFS encryption? a. compression b. IPsec c. permissions d. parental controls
4. Which of the following command-line parameters will prevent a program executed using
Runas.exe from accessing the elevated user’s encrypted files? a. /env b. /noprofile c. /showcred d. /profile 5. Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.) a. Allow a program through the firewall in all three profiles b. Manage firewall exceptions for the domain profile c. Create firewall exceptions based on port numbers d. Turn Windows firewall off for all three profiles 6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute force attack? (Choose all that apply.) a. Increase the value of the Reset Account Logon Counter After policy b. Enable the Password Must Meet Complexity Requirements policy c. Increase the Account Lockout Threshold value d. Reduce the value of the Minimum Password Age policy 7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms? a. EFS b. IPsec c. UAC d. PIV 8. Which of the following statements about Windows Defender is true? a. Windows Defender uses rules that you create to control its scans. b. Windows Defender can detect spyware that is already present on the system, but it cannot prevent the infiltration of new spyware. c. Windows Defender eliminates the need for third-party anti-virus software. d. Windows Defender requires definition updates that are supplied free with the regularly scheduled Windows Update downloads. 9. Which of the parental controls has been removed from Windows 7? a. Application restrictions b. User time limits c. Restricted access to games
d. Internet filtering 10. The built-in local groups on a Windows 7 workstation receive their special capabilities through which of the following mechanisms? a. parental controls b. Windows firewall rules c. NTFS permissions d. user rights

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Exercise 1

    • 1072 Words
    • 4 Pages

    Horizontal cable- Horizontal Cable-The cabling between and including the telecommunications outlet and the horizontal cross-connect. Horizontal cabling is considered the permanent portion of a link; may also be called horizontal wiring.…

    • 1072 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Problem Set 1

    • 174 Words
    • 1 Page

    1. By default, Windows 7 standard users are permitted to install Plug and Play devices only if their drivers are Digitally Signed.…

    • 174 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. A newer form of the periodic table has been established, but is not universally used at this time. Go to http://www.sciencenews.org/view/generic/id/67938/description/Periodic_table_gets_some_flex and read the article to answer the following questions:…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assignment 1

    • 297 Words
    • 2 Pages

    Due to the location, the Dulhasti Power Plant Project costed more than the estimate. The project manager should have accounted for the problems.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Problem Set 2

    • 220 Words
    • 1 Page

    4. A computer running Windows PE will automatically reboot after 72 hours of continuous operation.…

    • 220 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Problem Set 1

    • 750 Words
    • 3 Pages

    6. Upgrading a computer running Windows 7 Starter to Windows 7 Ultimate using Windows Anytime Upgrade requires 0 megabytes of additional hard disk space.…

    • 750 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Exercise 1

    • 236 Words
    • 1 Page

    To solve your first problem I would create a mandatory user profile for each intern. A mandatory user profile is a type of profile that administrators can use to specify settings for users. Only system administrators can make changes to mandatory user profiles. Changes made by users to desktop settings are lost when the user logs off.…

    • 236 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Assignment 2

    • 343 Words
    • 1 Page

    Today I read LET’S STOP SCARING OURSELVES by Michael Crichton. It is about a man who is taking a look back at his life and the different views that have captivated the country, and even the world, over his lifetime. He talks about the different scares like how power lines caused radiation that would cause cancer, how we would run out of natural resources like oil and gold by 1993, and how the population would be at 14 billion by 2030 which would cause starvation and famine before that. Each of these claims turned out to be nothing soon after they were publicized. Most people feared these things and would take drastic measures to avoid them, only to find out that they didn’t even exist in the first place.…

    • 343 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    3. Which of the following Windows 7 tools does not aid in the network troubleshooting process? B…

    • 466 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows Firewall: Quiz

    • 436 Words
    • 3 Pages

    The Windows Firewall in Windows 8.1 can have rules configured that allows traffic to flow in which direction(s)?…

    • 436 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Personal Device Policy

    • 822 Words
    • 4 Pages

    The company’s strong password policy is: Passwords must be at least seven characters in length and a combination of upper and lower-case letters, numbers and symbols. Passwords will be rotated every 90 days and the new password can’t be one of 5 previous passwords.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 1 Problem set 1

    • 584 Words
    • 3 Pages

    Sure enough, we have all heard before how stress can actually drive people out of procrastination and inertia, and into achieving results. But, did you know that this claim only works if the pressure remains at a moderate amount?…

    • 584 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The project will be about a Gift Shop database system. Because transaction records on papers can be lost or tampered, a simple yet effective and functional shop database system can be of use. This can also reduce the overall cost for managing the records that is paper based. This type of database system can be more secured and easy to manage.…

    • 2344 Words
    • 10 Pages
    Powerful Essays