0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
4K Ansichten1 Seite
The document appears to be a knowledge assessment assignment for a student named Todd Tomasko. It consists of 10 multiple choice questions testing knowledge of Windows 2008 server implementation and support topics such as security principals, password complexity, effective permissions, biometric authentication, firewall rules, BitLocker encryption, password history Group Policy settings, resource ownership, public key encryption, and permissions.
Originalbeschreibung:
70-646 Windows Server 2008 Administrator Knowledge Assessment Chapter 8 with answers
The document appears to be a knowledge assessment assignment for a student named Todd Tomasko. It consists of 10 multiple choice questions testing knowledge of Windows 2008 server implementation and support topics such as security principals, password complexity, effective permissions, biometric authentication, firewall rules, BitLocker encryption, password history Group Policy settings, resource ownership, public key encryption, and permissions.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als PDF, TXT herunterladen oder online auf Scribd lesen
The document appears to be a knowledge assessment assignment for a student named Todd Tomasko. It consists of 10 multiple choice questions testing knowledge of Windows 2008 server implementation and support topics such as security principals, password complexity, effective permissions, biometric authentication, firewall rules, BitLocker encryption, password history Group Policy settings, resource ownership, public key encryption, and permissions.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als PDF, TXT herunterladen oder online auf Scribd lesen
Implement & Support Microsoft Windows 2008 Servers Chapter 8 - Knowledge Assessment Assignment
Student: Todd Tomasko Date: April 15, 2013
1. Which of the following is the best description of a security principal? B. the network resource receiving permissions 2. Which of the following is an example of a complex password by Microsofts definition? D. 1%@3tty7& 3. Which of the following statements about effective permissions is not true? A. Inherited permissions take precedence over explicit permissions 4. Which of the following biometric authentication mechanisms is suitable for verification but not identification? C. hand geometry 5. Which of the following is the filter criterion most used in firewall rules? D. port numbers 6. Which of the following devices is BitLocker unable to use to store its volume encryption key? A. a floppy disk B. the system BIOS 7. Which of the following Group Policy settings prevents users from changing their passwords and then changing them immediately back again? A. Enforce Password History 8. Which of the following statements is not true in reference to resource ownership? D. It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one at all, including the owner of the file or folder 9. Which of the following statements about pubic key encryption are true? B. Data encrypted with the public key can be decrypted only with the private key D. Data encrypted with the private key can be decrypted only using the public key 10. Which of the following statements about permissions are true? D. All of the above