Msft2700 Quiz10 Ad640 Security

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 11,281
| Attempts: 408 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?

Explanation

Smart cards contain a chip that stores user information such as the user’s private key for certificate-related services; user credentials, such as the username; and a public key certificate. This requires the implementation of a public key infrastructure (PKI). PKI is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography.

Submit
Please wait...
About This Quiz
Msft2700 Quiz10 Ad640 Security - Quiz

This quiz, MSFT2700 Quiz10 AD640 Security, covers key aspects of access management and security protocols, including OUs, password systems, PKI, and smart card technologies.

2. Enrollment agent certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization.

Explanation

Enrollment agent certificates are indeed generated by the enterprise CA (Certificate Authority). These certificates are specifically used to generate a smart card logon certificate for users within the organization. This process enables users to securely log in using a smart card, providing an additional layer of authentication and security.

Submit
3. A strong password can be similar to a previously used password.

Explanation

A strong password should not be similar to a previously used password because reusing passwords increases the risk of compromise. If a previous password is compromised, using a similar password makes it easier for attackers to guess the new one. To ensure security, it is recommended to create unique and complex passwords that are not similar to any previously used passwords.

Submit
4. OUs represent the functional or geographical model of your company so that resources can be placed according to the users who need them.

Explanation

OUs, or Organizational Units, are used to represent the functional or geographical model of a company. This means that resources can be organized and placed according to the specific users who require them. By utilizing OUs, companies can effectively manage and allocate resources based on the needs and structure of their organization. Therefore, the statement that OUs represent the functional or geographical model of a company so that resources can be placed according to the users who need them is true.

Submit
5. What typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or smart card?

Explanation

Passwords and personal identification numbers (PINs) are becoming common in many areas of life including banking, email, voice mail, and keyless entry systems, such as garage door openers. A PIN typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or a smart card.

Submit
6. Which of the following is not a characteristic of a strong password?

Explanation

A strong password has the following characteristics: at least eight characters in length; contains uppercase and lowercase letters, numbers, and nonalphabetic characters; at least one character from each of the previous character types; and differs significantly from other previously used passwords.

Submit
7. A password should be __________ characters in length to be considered a strong password.

Explanation

A strong password has the following characteristics: at least eight characters in length; contains uppercase and lowercase letters, numbers, and nonalphabetic characters; at least one character from each of the previous character types; and differs significantly from other previously used passwords.

Submit
8. Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.

Explanation

Windows passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be up to 127 characters in length.

Submit
9. Which of the following is a benefit of implementing a public key infrastructure (PKI)?

Explanation

The benefits of implementing a PKI include: users no longer need to remember passwords; all information is stored on the smart card, making it difficult for anyone except the intended user to use or access it; security operations, such as cryptographic functions, are performed on the smart card itself rather than on the network server or local computer; smart cards can be used from remote locations, such as a home office, to provide authentication services; and the risk of remote attacks using a username and password is significantly reduced by smart cards.

Submit
10. What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?

Explanation

The recommended solution for reducing the risks associated with the Administrator account is to use a standard user account and use the Run as administrator option in the GUI or the runas command-line tool when it is necessary to perform an administrative task.

Submit
11. What can be defined as a password that follows guidelines that make it difficult for a potential hacker to determine the user’s password?

Explanation

A strong password can be simply defined as a password that follows guidelines that make it difficult for a potential hacker to determine the user’s password. Configuring strong passwords on a Windows Server 2008 network is a combination of creating a minimum required password length, a password history, requiring multiple types of characters within a password, and setting a minimum password age.

Submit
12. Where is the certificate database located on a Certification Authority?

Explanation

When configuring certificate services, you can can specify a location for the certification database. This defaults to C:\Windows\system32\CertLog.

Submit
13. What tool allows you to utilize a simple interface to delegate permissions for domains, OUs, or containers?

Explanation

Using the Delegation of Control Wizard, you utilize a simple interface to delegate permissions for domains, OUs, or containers. The interface allows you to specify to which users or groups you want to delegate management permissions and the specific tasks you wish them to be able to perform.

Submit
14. What is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise?

Explanation

A smart card is a credit card-sized device or a token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise.

Submit
15. Which OU is created by default when Active Directory is installed?

Explanation

When Active Directory is installed, only one OU is created by default: the Domain Controllers OU.

Submit
16. Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated __________ attack

Explanation

Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated dictionary attack. Automated password-cracking tools will try every possible combination of characters until the correct sequence of characters is finally discovered.

Submit
17. To implement PKI, what must be installed on your Windows 2008 Server?

Explanation

PKI requires you to install Active Directory Certificate Services in your Windows Server 2008 environment. Active Directory Certificate Services is a server role available in Windows Server 2008 that allows you to create and administer PKI certificates for your users, computers, and applications.

Submit
18. What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?

Explanation

Enrollment agent certificates are generated by the enterprise CA and are used to generate a smart card logon certificate for users in the organization. Because these enrollment agent certificates can generate smart cards with authentication credentials for anyone in the organization, you should make sure strong security policies are in place for issuing enrollment agent certificates.

Submit
19. What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?

Explanation

Enrollment agent certificates are generated by the enterprise CA and are used to generate a smart card logon certificate for users in the organization. Because these enrollment agent certificates can generate smart cards with authentication credentials for anyone in the organization, you should make sure strong security policies are in place for issuing enrollment agent certificates.

Submit
20. What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?

Explanation

Prior to deploying smart cards, you must set up at least one computer as a smart card enrollment station, which is a dedicated workstation that allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2008
    Quiz Created by
    Svolore
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is a system of digital ...
Enrollment agent certificates are ...
A strong password can be similar to a previously used password.
OUs represent the functional or ...
What typically consists of at least four ...
Which of the following is not a characteristic of a strong password?
A password should be __________ characters in length to be considered...
Passwords for Windows Server 2008, ...
Which of the following is a benefit of implementing a public key...
What command-line tool can be used with a standard user account to...
What can be defined as a password that ...
Where is the certificate database located on a Certification...
What tool allows you to utilize a simple interface to delegate...
What is a credit card–sized or ...
Which OU is created by default when Active Directory is installed?
Password-cracking can be accomplished by ...
To implement PKI, what must be installed on your Windows 2008 Server?
What types of certificates are generated ...
What types of certificates are generated ...
What dedicated workstation allows an ...
Alert!

Advertisement