70-411 chapter 7 & 11 – 12 – Flashcards

Unlock all answers in this set

Unlock answers
question
Authentication is used for what purpose?
answer
to verify a user's identity
question
Authorization is used for what purpose?
answer
To grant access to users
question
Auditing is used for what purpose?
answer
recording user's actions
question
Why is choosing what to audit, instead of auditing everything that a user does, a good idea?
answer
High levels of auditing can affect system performance.
question
Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of how many audit subsettings?
answer
56
question
What is the purpose of implementing new audit subsettings?
answer
so that you can focus on important audit items
question
Why should you avoid using basic audit policy settings and advanced audit policy settings together?
answer
Audit policies might cause conflicts or erratic behavior.
question
Which command do you use to manage auditing at the command prompt?
answer
AuditPol.exe
question
Where can you view audit events?
answer
in Security logs in Event Viewer
question
Which auditing feature allows you to define computer-wide system access control lists for the file system or the registry?
answer
Global Object Access Auditing
question
By using what type of policy can you track, limit, or deny a user's ability to use removable storage devices such as USB drives in Windows Server 2012?
answer
Removable Storage Access
question
Which utility do you use to access advanced audit policy settings?
answer
Group Policy Editor
question
What type of audit event notifies you that an account failed to log on?
answer
Logon/Logoff
question
Shutting down the system is an example of what kind of audit event?
answer
Privilege Use
question
When resetting audit settings back to basic mode, what file must you remove as part of the process?
answer
audit.csv
question
Why is it a good idea (other than the effect on system performance) to set up auditing for only those objects that you really need to focus on? Choose the Best option according to Microsoft.
answer
Searching through too many events makes finding problems more difficult.
question
Why are success audits as important as failure audits? Choose the Best option according to Microsoft.
answer
Successes allow you to track activity such as new account creation.
question
Why would auditing include logon and logoff times? Choose the Best option according to Microsoft.
answer
Logon and logoff times can help pinpoint who was logged on during a failure.
question
Order the following steps for setting up Printer Event Auditing.
answer
Choose Control Panel > View devices and printers. Right-click and select Printer properties. On the Security tab, click Advanced. Select the Auditing tab. Click the Add button to open the Auditing Entry for Microsoft XPS Document Writer dialog box. To specify a user or group, click Select a principal. For Type, select Success, Fail, or All.
question
Order the following steps required to audit account logon.
answer
-Server Manager->Tools->Group Policy Management. -Expand the Domain Controllers to show the Default Domain Controllers Policy. -Right-click the Default Domain Control Default Policy and click Edit. -Expand Computer Configuration, Windows Settings, Security Settings, Local Policies, and select Audit Policy. -Double-click Audit account logon events. -Select Define these policy settings and select both Success and Failure.
question
Order the following steps required to configure monitoring of removable storage devices
answer
-Choose Server Manager > Tools > Group Policy Management. -In the console tree, right-click a group policy object, and then click Edit. -Double-click Computer Configuration, double-click Security Settings, double-click Advanced Audit Policy Configuration, and double-click Object Access. -Double-click Audit Removable Storage. -Select the Configure the following audit events check box, select the Success check box, and then click OK.
question
The powerful auditpol.exe command-line utility is widely used in automated scripting solutions. Select the correct action for the auditpol.exe /remove /allusers command.
answer
Remove the per-user audit policy for all users.
question
The powerful auditpol.exe command-line utility is widely used in automated scripting solutions. Select the correct action for the auditpol.exe /get /category:* command.
answer
Show an authoritative report on what audit settings are being applied.
question
The powerful auditpol.exe command-line utility is widely used in automated scripting solutions. Select the correct action for the auditpol.exe /clear command.
answer
Delete the per-user audit policy for all users, reset or disable the system audit policy for all subcategories, and then set the audit policies settings to disable.
question
The powerful auditpol.exe command-line utility is widely used in automated scripting solutions. Select the correct action for the auditpol.exe /remove /user:usernamecommand.
answer
Remove the per-user audit policy for a single user's account.
question
DirectAccess was introduced with which workstation/server pair?
answer
Windows 7/Windows Server 2008 R2
question
What kind of connectivity does DirectAccess establish between workstation and server?
answer
bi-directional
question
What type of server is the network location server (NLS)?
answer
Web
question
What does the acronym ISATAP stand for?
answer
Intra-Site Automatic Tunnel Addressing Protocol
question
What utility do you use to configure DirectAccess?
answer
Remote Access Management Console
question
Windows Server 2012 varies from the Windows Server 2008 R2 implementation in that it does not require which one of the following?
answer
two consecutive public IP addresses
question
What is the most basic requirement for a DirectAccess implementation?
answer
The DirectAccess server must be part of an Active Directory domain
question
If the client cannot reach the DirectAccess server using 6to4 or Teredo tunneling, the client tries to connect using what protocol?
answer
IP-HTTPS
question
What does the netsh namespace show policy command do?
answer
Shows the NRPT rules as configured on the group policy
question
What does the netsh namespace show effectivepolicy command do?
answer
Show results of network location detection and the IPv6 address of the intranet DNS servers
question
What kind of connectivity does DirectAccess provide between client computers and network resources?
answer
seamless and always on
question
DirectAccess is for clients connected to which network?
answer
Internet
question
How do the DirectAccess server and DirectAccess client authenticate each other?
answer
computer and user credentials
question
Which one of the following operating systems may not act as a DirectAccess client?
answer
Windows Server 2008
question
In addition to meeting operating system requirements, a DirectAccess client must be a member of what?
answer
an AD domain
question
Unlike traditional VPN connections, DirectAccess connections are established automatically and provide what kind of connectivity?
answer
always on and seamless
question
What is the best reason for deploying DirectAccess connectivity for remote users?
answer
Remote user's computers can be easily managed and kept up to date
question
Which one of the Remote Access Management interfaces gives you the most control?
answer
the Run the Remote Access Setup Wizard
question
Using what feature can streamline the creation and setup of RADIUS servers?
answer
templates
question
What is the final step in the authentication, authorization, and accounting scenario between an access client and the RADIUS server?
answer
an Accounting-Response to the access server
question
What is a RADIUS server known as in Microsoft parlance?
answer
Network Policy Server
question
What process determines what a user is permitted to do on a computer or on a network?
answer
authorization
question
Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?
answer
priority
question
Which system, in a RADIUS infrastructure, handles the switchboard duties of relaying requests to the RADIUS server and back to the client?
answer
the access server
question
Which ports do Microsoft RADIUS servers use officially?
answer
1812 and 1813
question
To configure RADIUS service load balancing, you must have more than one kind of what system per remote RADIUS server group?
answer
RADIUS server
question
What information does the Accounting-Start message contain?
answer
the type of service and the user it's delivered to
question
What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?
answer
a RADIUS proxy server
question
What type of NPS authentication is recommended over password authentication?
answer
certificate
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New