Server Ch.10
Kerberos and Windows Server 2016 Quiz
Test your knowledge on Kerberos, Windows Server 2016 security features, and network management with our comprehensive quiz!
- 20 engaging questions
- Multiple choice and checkbox formats
- Explore key concepts in server security
Kerberos on Windows Server 2016 authenticates which of the following? (Choose all that apply.)
The TCP communications port
The client requesting server access
The Group Policy that applies to the client requesting server access
The server the client is trying to access
In your organization, the server administrators perform server maintenance once a week or more in the early morning hours before users come in for work. They often encounter users who are still signed in to the servers. Which of the following is one way in Kerberos to make sure that users are not still signed in during the earlier morning hours?
Limit the maximum lifetime for service tickets.
Set the Kerberos duration threshold to minimum.
Have the Kerberos Monitor automatically sign out users at 10 PM.
Use Kerberos Manager to freeze sign-in access.
You have received a Word memo from your supervisor outlining the five-year strategic plan for your company, which operates in a very competitive field. When you try to copy the memo or print it out, you discover you don’t have the rights to complete these actions. What Windows Server 2016 and Word capability did your supervisor use to safeguard the memo?
NAT application protection
GUID access
Rights Management Services
XPS View Control
What is a TPM chip and how is it used with Windows Server 2016?
This is a chip equipped with security specifications based on Trusted Platform Module (TPM) to control access to a hardware device, such as a disk drive. It can be used with BitLocker Drive Encryption in Windows Server 2016 to control access to a hard drive.
Your company is considering the use of Network Address Translation for remote access communications. Which of the following are advantages of Network Address Translation? (Choose all that apply.)
It doubles the speed of network protocol transfer.
It enables an organization to automatically assign its own IP addresses on an internal network without having to obtain a globally unique address.
It broadcasts the IP addresses of internal network computers so they can be registered on DNS servers throughout the Internet for faster lookup.
It changes MAC addresses to the loopback address for disguising clients.
Security definition updates for Windows Defender are performed through the __________ function in Windows Server 2016.
Windows Update
You need to lock down a server and ensure that only necessary TCP and UDP port communications are used for inbound and outbound network communications. What tool enables you to lock down communications through these ports?
Port Switch Service
NAT
Windows Firewall
Group Policy Editor
The GUI used to manually perform scans via Windows Defender is installed as a __________ through Server Manager.
Feature
When users change passwords on your organization’s server, they frequently go back to passwords they have used before in the last few months. What Group Policy element for the Default Domain Policy can you configure to prevent users from repeating the same passwords so frequently?
Set maximum password age to a lower value.
Turn off password repeat.
Turn on store password.
Increase the setting for enforce password history.
Which of the following can you configure when creating a security template? (Choose all that apply.)
File system security
Group restrictions
Account policies
Event log tracking policies
You are in the Windows PowerShell window and decide to encrypt a folder. Which of the following commands do you use?
Cipher /e
Attrib /s
Cipher /k
Attrib /c
There is no Windows PowerShell command to encrypt a folder.
AD RMS is installed as a __________ through __________.
(server) role; Server Manager
You have configured security policies for the domain and for nested OUs. After completing the configuration, users in two OUs do not have the access to resources that they need. What tool can you use to quickly troubleshoot the problem?
Security Templates snap-in
Resultant Set of Policy tool
Network Access Protection Analysis tool
Group Policy Object Editor
Your organization has a DHCP server, but users cannot access it after another server administrator worked on the DHCP server last night. Which of the following might you check on the DHCP server as a step in troubleshooting the problem?
New Windows Defender virus definitions
Application exceptions that are configured in Windows Firewall
DHCP access time windows
Group policy auditing settings for DHCP
Name two advantages of Advanced Encryption Standard (AES).
AES is fast and AES uses a minimal amount of memory
Your company employs a part-time person whose sole job is to install software for users. That person is now leaving and the company wants to automate the process so that users can reliably install their own software. Which of the following Windows Server 2016 capabilities can you use?
Pushing applications
Automated Application Installation Wizard
Publishing applications
GPO application installation
Your assistant wants to audit all kinds of activities on a server, from every time someone accesses the server to every time a file or printer is used. What is your response?
Auditing all of these activities is vital for good server security.
It is not possible to audit logon events.
Auditing access to all processes should be added to the list.
Use auditing sparingly; it creates high maintenance for the security logs.
Group policies can be set for which of the following? (Choose all that apply.)
Local computer
OU
Site
Domain
Name two Internet communications protocols that IPsec can help secure.
HTTP and FTP
In Windows Defender, where can you view malware items that have been detected or quarantined to find out how Windows Defender has addressed them?
The History tab in the Windows Defender GUI
{"name":"Server Ch.10", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on Kerberos, Windows Server 2016 security features, and network management with our comprehensive quiz!20 engaging questionsMultiple choice and checkbox formatsExplore key concepts in server security","img":"https:/images/course1.png"}