Where is user account information stored, both for the Domain and the local machine?
You have just finished installing new servers and clients in your office network. All the new client
machines are running Windows 2000 Professional, and the servers are running Windows Server
2003. You are now working on securing all user authentication related areas of the systems.
Where is user account information stored, both for the Domain and the local machine?
Which of the following rules will you have to implement to make this happen?
You are building the rules of your new firewall. You wish to allow only (Internal) access to standard
www sites on the Internet (External). You wish for all other traffic to be disallowed. Which of the
following rules will you have to implement to make this happen?
What is IAS the Windows implementation of?
There are several clients of your network that require the ability to connect remotely. You are
using Internet Authentication Services (IAS) in Windows Server 2003 for security. What is IAS the
Windows implementation of?
Which of the following rules will you have to implement to make this happen?
You are building the rules of your new firewall. You wish to allow only (Internal) access to secure
www sites on the Internet (External). You wish for all other traffic to be disallowed. Which of the
following rules will you have to implement to make this happen?
What is file data encrypted with when using EFS?
You are going to use EFS to increase the security of the files and folders on your Windows Server
2003 systems in your network. You wish to have complete knowledge of the process of EFS, so
that you may manage any situations or problems that may arise. What is file data encrypted with
when using EFS?
Which of the following rules will you have to implement to make this happen?
You are building the rules of your new firewall. You wish to allow only (Internal) access to smtp
email on the Internet (External). You wish for all other traffic to be disallowed. Which of the
following rules will you have to implement to make this happen?
Which of the following is the correct command for decrypting a subfolder named "March" under a folde
The security policy of your organization defines what data is to be locally encrypted and what is
not to be. You are running Windows Server 2003, which allows for local encryption, and you have
data that has been secured. Which of the following is the correct command for decrypting a
subfolder named “March” under a folder named “Financials”?
What are the two options for you to configure on ISA Server 2006 for logging?
After you configure the monitoring options on your ISA Server 2006, you wish to configure logging.
What are the two options for you to configure on ISA Server 2006 for logging?
What can you do to stop this?
You are making changes to your Windows Server 2003 file server, to increase security. You are
aware from your auditing that attackers have been trying to map your network and perform
reconnaissance. You wish to stop attackers from enumerating share names. What can you do to
stop this?
What does ISA Server 2006 use to prioritize packets?
Your company has many different services that go through your ISA Server 2006, and you need to
prioritize the network traffic. What does ISA Server 2006 use to prioritize packets?