Which user account is, by default, the Recovery Agent, that can decrypt data if need be?
You have recently introduced the users of your Windows 2003 Domain network to EFS, and the
company policy indicates that several users must take advantage of EFS for certain files. Since it
is new, you are concerned with EFS being implemented in ways not defined in the policy. Which
user account is, by default, the Recovery Agent, that can decrypt data if need be?
What is used as the default security for these objects?
It has been decided that the network you manage will implement new Windows 2003 Servers,
using Active Directory. You are configuring several of the Active Directory objects in your Windows
2003 network.
What is used as the default security for these objects?
Where is user account information stored, both for the Domain and the local machine?
You have just finished installing new servers and clients in your office network. All the new client
machines are running Windows 2000 Professional, and the servers are running Windows Server
2003. You are now working on securing all user authentication related areas of the systems.
Where is user account information stored, both for the Domain and the local machine?
What is IAS the Windows implementation of?
There are several clients of your network that require the ability to connect remotely. You are
using Internet Authentication Services (IAS) in Windows Server 2003 for security. What is IAS the
Windows implementation of?
What is file data encrypted with when using EFS?
You are going to use EFS to increase the security of the files and folders on your Windows Server
2003 systems in your network. You wish to have complete knowledge of the process of EFS, so
that you may manage any situations or problems that may arise. What is file data encrypted with
when using EFS?
Which of the following is the correct command for decrypting a subfolder named "March" under a folde
The security policy of your organization defines what data is to be locally encrypted and what is
not to be. You are running Windows Server 2003, which allows for local encryption, and you have
data that has been secured. Which of the following is the correct command for decrypting a
subfolder named “March” under a folder named “Financials”?
What can you do to stop this?
You are making changes to your Windows Server 2003 file server, to increase security. You are
aware from your auditing that attackers have been trying to map your network and perform
reconnaissance. You wish to stop attackers from enumerating share names. What can you do to
stop this?
Which of the following describes the maximum abilities of the Read permission?
You have recently hired an assistant to help you with managing the security of your network. You
are currently running an all Windows Server 2003 environment, and are describing the issues
associated with sharing folders. You describe different shared folder permissions. Which of the
following describes the maximum abilities of the Read permission?