Which of the following correctly match the Logon Type with its numerical value?
You are examining the Authentication Logs on your Windows 2003 server. Specifically, you are
looking for types of logon that were successful. Which of the following correctly match the Logon
Type with its numerical value?
which three values are adjusted?
You wish to increase the security of your Windows 2003 system by modifying TCP/IP in the
Registry.
To alter how Windows reacts to SYN Attacks, which three values are adjusted?
What feature of Windows 2003 will allow you to do this?
On your Windows 2003 system, you want to control inbound access to various ports. What feature
of Windows 2003 will allow you to do this?
From the following answers, select the option that is not a Windows 2003 Server Role.
You wish to install a new Windows 2003 Server in your network, and are deciding which of the
server roles will best suit your environment. From the following answers, select the option that is
not a Windows 2003 Server Role.
Which of the following options will Windows 2003’s EFS perform?
You are running a computer that boots to multiple operating systems on multiple partitions and
wish to use Windows 2003 data encryption to protect your files. Which of the following options will
Windows 2003’s EFS perform?
which of the following?
Logging is critical when you want to determine whether or not your server is being attacked. You
must enable logging on your Web servers. To help prevent malicious users from deleting files to
cover their tracks, you should make sure the ACLs on the IIS-generated log files
(%systemroot%\system32\LogFiles) are set to Administrators (Full Control) and System (Full
Control). The ACL for the Everyone group should not be greater than which of the following?
Why is your statement correct?
One of your assistants has configured a Windows 2003 Server to use EFS. This server is only
accessed from internal network clients over a 100BaseT infrastructure. You tell your assistant that
the security offered by EFS in this situation will not increase the security of the data transferred.
Why is your statement correct?
what will the permissions be for this file?
You have recently hired an assistant to help you with managing the security of your network. You
are currently running an all Windows environment, and are describing NTFS permission issues.
You are using some demonstration files to help with your discussion. You have two NTFS
partitions, C:\ and D:\ There is a test file, C:\DIR1\test.txt that is currently set so that only
Administrators have Full Control. If you move this file to the C:\DIR2 folder, what will the
permissions be for this file?
What is the function of The Security Configuration and Analysis snap-in?
You have just become the senior security professional in your office. After you have taken a
complete inventory of the network and resources, you begin to work on planning for a successful
security implementation in the network. You are aware of the many tools provided for securing
Windows 2003 machines in your network. What is the function of The Security Configuration and
Analysis snap-in?
What are the advantages of using NTLM Authentication over LM Authentication in Windows?
Windows 2003 Server can utilize many different forms of authentication, from standard passwords
to Smart Cards. What are the advantages of using NTLM Authentication over LM Authentication in
Windows?