Homework for Lesson 10 NT 1210 T Aug, 4th ,2012 Mr. Passalacqua Stacie A. Bullock ,Sarah sarin , Michael Rodriguez , Jeremy Randolph and success Johnson Matching: 1) Multifactor authentication 2) Malware 3) Brute force 4) in the flesh(predicate) Identiity Verication ( PIV ) 5) Private give away ( f ) decrypts data encrypted with a credential 6) Windows Biometric Framework ( h ) standard for fingerprint scanners and other devices 7) Users rights ( b ) windows authorization mechanism 8) Authenticated exception 9) Public key 10) Rules ( g ) firewall exceptions Multiple Choice: 1. which of the spare-time activity(a) account lockout insurance policy modifications could you crystalize to ensure that substance abuser passwords cannot be intercepted by analyzing captured packers? 2.which of the following mechanisms is more or less often use in firewall rules to allow traffic on to the network ? 3.which of th e following NTFS features is incompatible with EFS encryption ? 4.Which of the following command-line parameters exit prevent a program executed using Runas.exe from accessing the el users encrypted files ? 5.
Which of the following actions can you Not come from the Windows firewall control adorn ? ( choose all that apply ) ( c ) create firewall exceptions found on port numbers. 6. Which of the following policy modifications would make it harder for intruders to contact user passwords by a brute(prenominal) force attack ? 7.Connection sercurity rules desire that network traffic allowed finished the firewall use which of the following sercuri! ty mechanisms ? 8.Which of the following statements about Windows Defender is true ? 9. Which of the parental controls has been removed from Windows 7 ? 10. The built-in local groups on a Windows 7 workstation set about their special capabilities? ( d ) user rightsIf you want to get a full essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment