What are the advantages of using NTLM Authentication over LM Authentication in Windows?
Windows 2003 Server can utilize many different forms of authentication, from standard passwords
to Smart Cards. What are the advantages of using NTLM Authentication over LM Authentication in
Windows?
What are the two versions of ISA Server 2006?
You are going to lead the deployment of a new firewall solution in your office, and are discussing
the options with your team. What are the two versions of ISA Server 2006?
which of the following computers must implement IPSec method 3?
In Windows 2003, there are four methods of implementing IPSec. They are:
1 – Require Security
2 – Request Security
3 – Respond Only
4 – No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations
in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic
security.
-You have servers numbered 10-19, which have a policy stating they are not required to be
secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure
and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are
required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers
must implement IPSec method 3?
Which of the following are issues where a firewall cannot help to secure the network?
You have just installed a new firewall and explained the benefits to your CEO. Next you are asked
what some of the limitations of the firewall are. Which of the following are issues where a firewall
cannot help to secure the network?
What is the SAM?
You are the main person responsible for the security of a mid-sized company. To have control
over all the aspects of the security of the network, you study and analyze each component
thoroughly. Your network is running all Windows 2003 servers, and you are studying the logon
process. You know there are many components of the process, and are now at the point where
you are analyzing the Security Accounts Manager (SAM). What is the SAM?
Which of the following best describes a Single Packet Filtering Device?
You have been given the task of installing a new firewall system for your network. You are
analyzing the different implementation options. Which of the following best describes a Single
Packet Filtering Device?
Which user account is, by default, the Recovery Agent, that can decrypt data if need be?
You have recently introduced the users of your Windows 2003 Domain network to EFS, and the
company policy indicates that several users must take advantage of EFS for certain files. Since it
is new, you are concerned with EFS being implemented in ways not defined in the policy. Which
user account is, by default, the Recovery Agent, that can decrypt data if need be?
Which of the following best describes a Multi-homed Device?
You have been given the task of installing a new firewall system for your network. You are
analyzing the different implementation options. Which of the following best describes a Multi-homed Device?
What is used as the default security for these objects?
It has been decided that the network you manage will implement new Windows 2003 Servers,
using Active Directory. You are configuring several of the Active Directory objects in your Windows
2003 network.
What is used as the default security for these objects?
Which of the following are sections found in the firewall policy?
You are in the process of configuring your network firewall policy. As you begin building the
content of the policy you start to organize the document into sections. Which of the following are
sections found in the firewall policy?