Section A (Multiple Choice)
1. You can enforce a password policy through Group Policy. (True or false)
[15 marks]
2. Any permission explicitly assigned to an object is retained when you remove inherited
permissions. (True or false)
3. If you want to audit all accessto a folder, all you have to do is enable Object Accessauditing
in the Audit Policy. (True or false)
4. If you want to ensure that an audit-log entry records each time a system is shut down, you
should enable Successful entries for ______
auditing.
5. You can secure audit logs with WORM media. (True or false)
6. lffiles are encrypted on a server using EFS,they're automatically encrypted when a user
uses offline folders. (True or false)
7. Fill in the missing option so the user of the bob account can't change his password:
passwd __ 99999 -M 99998 bob
8. What tool can you use to create a comprehensive security policy as an XML file on a
Windows Server system?
A. Microsoft Baseline Security Analyzer (MBSA}
B. System Center Configuration Manager (SCCM}
C. Security Configuration Wizard (SCW}
D. Windows Server Update Services (WSUS}
9. What is the difference between identification and authentication?
A. Nothing. They're the same.
B. Identification proves an identity.
C. Authentication proves an identity.
D. Identification authenticates an individual, and authentication provides
authorization.
10. Of the following choices, what isn't a valid use of a RADIUSserver?
A. Authenticate VPN clients.
B. Authenticate wireless clients.
C. Provide port-based authentication.
D. Provide authentication for 802x database servers.
Page 11