Aug, 4th ,2012
Mr. Passalacqua
Stacie A. Bullock ,Sarah Gilbert , Michael Rodriguez , Jeremy Randolph and success Johnson
Matching:
1) Multifactor authentication
2) Malware
3) Brute force
4) Personal Identiity Verication ( PIV )
5) Private key ( f ) decrypts data encrypted with a certificate
6) Windows Biometric Framework ( h ) standard for fingerprint scanners and other devices
7) Users rights ( b ) windows authorization mechanism
8) Authenticated exception
9) Public key
10) Rules ( g ) firewall exceptions
Multiple Choice:
1. which of the following account lockout policy modifications could you crystalize to ensure that
substance abuser passwords cannot be intercepted by analyzing captured packers?
2.which of the following mechanisms is more or less often used in firewall rules to allow traffic on to the network ?
3.which of the following NTFS features is incompatible with EFS encryption ?
4.Which of the following command-line parameters exit prevent a program executed using Runas.exe from accessing the el users encrypted files ?
5.
Which of the following actions can you Not come from the Windows firewall control panel ? ( choose all that apply )
( c ) create firewall exceptions based on port numbers.
6. Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute(prenominal) force attack ?
7.Connection sercurity rules require that network traffic allowed finished the firewall use which of the following sercurity mechanisms ?
8.Which of the following statements about Windows Defender is true ?
9. Which of the parental controls has been removed from Windows 7 ?
10. The built-in local groups on a Windows 7 workstation receive their special capabilities?
( d ) user rightsIf you want to get a full essay, order it on our website: Ordercustompaper.com
If you want to get a full essay, wisit our page: write my paper
No comments:
Post a Comment