Answers

Comprehensive Test

  1. c, d. Windows 2000 uses domain controllers and member servers. Domain controllers are not divided into primary and backup controllers (choices a and b).

  2. c, d, e. The first controller in a domain (but not the first in the forest) is assigned the relative ID master, PDC emulator, and infrastructure master roles.

  3. a, b, d. Telnet, FTP, and SLIP use clear-text authentication.

  4. c. RADIUS (Remote Access Dial-In User Service) is designed for high volume and centralized record-keeping.

  5. c, d. Enterprise CAs require Active Directory.

  6. c. Clients use a web-based interface to request certificates.

  7. b. EFS (Encrypted Filesystem) and file compression cannot be used on the same files or directories.

  8. a, c. Terminal Services can operate in remote administration mode or application sharing mode.

  9. a, d. PPTP and L2TP are VPN protocols.

  10. b. IAS (Internet Authentication Service) is Microsoft’s implementation of RADIUS.

  11. c. Kerberos is Windows 2000’s standard method of authentication.

  12. c, d. Windows NT 4.0 and Windows 2000 support NTLM.

  13. d. New Macintosh computers support TCP/IP and can access Windows 2000 shares without File Services for Macintosh.

  14. b. SSL (Secure Sockets Library) is used for encrypted communication between web clients and servers.

  15. a, b. Standalone CAs are used to authenticate outside individuals or organizations.

  16. c, d. Both Windows NT and Windows 2000 use case-sensitive passwords. Windows 3.11 and Windows 98 don’t differentiate password case by default.

  17. b. The Disable Ctrl-Alt-Del policy must be set before Windows 2000 can use smart card authentication.

  18. a. RADIUS (Remote Authentication Dial-In User Service) is used along with other protocols in managing dial-up user authentication.

  19. d. Microsoft’s implementation of RADIUS is called Internet Authentication Service (IAS).

  20. b. A certificate is made with a user’s public key and a certificate authority’s root key.

  21. a, b, d. A standalone subordinate certificate authority can issue and accept certificates to and from other SSCAs and can issue a certificate to a user, but it can’t accept a certificate from a user.

Case Study: Multiple Choice

  1. c. MS-CHAP would provide the most security while supporting the computers. MS-CHAP v2 is more secure, but would not support the Windows 98 machine.

  2. b. Auditing could help you determine whether there is a security problem. EFS and smart cards (choices c and d) could improve security, but could not verify that a problem exists in the first place.

  3. c. The only real solution is to move the files to an operating system that supports security, such as Windows 2000. The user should be educated to avoid saving local copies of the files.

Case Study: Create a Tree

Create a Tree Answer # 1

Less Secure

More Secure

LM

NTLM

NAT

Proxy Server

HTTP

SSL

Standard Windows authentication

Digest authentication

Username and password

Smart cards

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.158.32