Server 4-11 Chapter 15 – Flashcards

Unlock all answers in this set

Unlock answers
question
Kerberos security and authentication are based on what type of technology?
answer
secret key
question
Which three components make up a service principal name (SPN)?
answer
service class, host name, and port number
question
Identify another utility that you can use to add SPNs to an account
answer
setspn
question
Which tool can you use to add SPNs to an account?
answer
ADSI Edit
question
What happens if a client submits a service ticket request for an SPN that does not exist in the identity store?
answer
The client receives an access denied error.
question
NTLM uses a challenge-response mechanism for authentication without doing what?
answer
sending a password to the server
question
What is the default authentication protocol for non-domain computers?
answer
NTLM
question
What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?
answer
5 minutes
question
What type of account is an account under which an operating system, process, or service runs?
answer
service
question
By default, which service accounts will the Windows PowerShell cmdlets manage?
answer
group MSAs
question
To verify a NAP client's configuration, which command would you run?
answer
netsh nap client show state
question
Identify two remediation server types.
answer
Anti-virus/anti-malware servers
question
When you fully engage NAP for remediation enforcement, what mode do you place the policy in?
answer
isolation
question
DHCP enforcement is not available for what kind of clients?
answer
IPv6
question
Where do you look to find out which computers are blocked and which are granted access via NAP?
answer
the NAP Server Event Viewer
question
What does the acronym NTLM stand for?
answer
NT LAN Manager
question
When creating accounts for operating systems, processes, and services, you should always configure them with which of the following in mind?
answer
using strong passwords
question
What type of protocol is Kerberos?
answer
a secure network authentication protocol
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New