Sie sind auf Seite 1von 1

Implement & Support Microsoft Windows 2008 Servers Chapter 8 - Knowledge Assessment Assignment

Student: Todd Tomasko Date: April 15, 2013


1. Which of the following is the best description of a security principal? B. the network resource receiving permissions 2. Which of the following is an example of a complex password by Microsofts definition? D. 1%@3tty7& 3. Which of the following statements about effective permissions is not true? A. Inherited permissions take precedence over explicit permissions 4. Which of the following biometric authentication mechanisms is suitable for verification but not identification? C. hand geometry 5. Which of the following is the filter criterion most used in firewall rules? D. port numbers 6. Which of the following devices is BitLocker unable to use to store its volume encryption key? A. a floppy disk B. the system BIOS 7. Which of the following Group Policy settings prevents users from changing their passwords and then changing them immediately back again? A. Enforce Password History 8. Which of the following statements is not true in reference to resource ownership? D. It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one at all, including the owner of the file or folder 9. Which of the following statements about pubic key encryption are true? B. Data encrypted with the public key can be decrypted only with the private key D. Data encrypted with the private key can be decrypted only using the public key 10. Which of the following statements about permissions are true? D. All of the above

Das könnte Ihnen auch gefallen