Name:     ID: 
 
    Email: 

Windows Server 2003 Chapter 13 & 14

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

IIS is an application of Windows 2000, but is not a fully-supported feature in Windows Server 2003.
 

 2. 

Installing IIS adds two new group accounts to Active Directory Users and Computers.
 

 3. 

Installing IIS adds several operating-system services to Windows Server 2003.
 

 4. 

IIS version 6.0 is architecturally identical to the 5.0 version included with Windows 2000.
 

 5. 

The IIS metabase files are stored in a format that can be viewed with any text editor.
 

 6. 

Users should generally only be granted the lowest level of access to resources that they require to carry out necessary functions.
 

 7. 

Microsoft only sends critical updates to customers as e-mail attachments.
 

 8. 

A computer running Windows NT can take advantage of security template configurations and deployments.
 

 9. 

Security templates can be applied to either the local machine or the domain.
 

 10. 

Monitoring network events provides evidence of security breaches if or when they occur.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 11. 

Service packs are usually an accumulation of _____ that fix bugs that have been discovered.
a.
utilities
c.
bugs
b.
IP addresses
d.
software patches
 

 12. 

The _____ Web site properties tab configures domain name restrictions as a security measure for a particular Web site.
a.
Domain Security
c.
Web Site
b.
Directory Security
d.
Home Directory
 

 13. 

If you want any information that is stored on multiple servers to be included on your Web site, you can create a(n) _____ that specifically points to the shared folder that stores the data.
a.
virtual directory
c.
server folder share
b.
configuration storage location
d.
data pointer
 

 14. 

The folder C:\WINDOWS\Help\iishelp contains the IIS
a.
sub-folders.
c.
documentation.
b.
dll files.
d.
installation.
 

 15. 

The folder %systemroot%\system32\inetsrv contains all the _____ needed for IIS to function.
a.
sub-folders
c.
documentation
b.
dll files
d.
user accounts
 

 16. 

IIS uses IUSR_servername to provide _____ to the server.
a.
encryption
c.
file sharing services
b.
security
d.
anonymous access
 

 17. 

The Default FTP Site responds to TCP port _____ on all of the server’s configured IP addresses that are not assigned to another FTP site.
a.
10
c.
21
b.
14
d.
42
 

 18. 

The Default Web Site responds to TCP port _____ on all unassigned IP addresses of the server.
a.
14
c.
59
b.
25
d.
80
 

 19. 

The _____ Web site properties tab defines a default Web page search order for the Web site.
a.
Performance
c.
Documents
b.
HTTP Headers
d.
Directory Security
 

 20. 

When a user attempts to access your Web site, IIS uses the _____ user account to provide the required authentication credentials.
a.
IUSR_verify
c.
IWAM_servername
b.
IUSR_servername
d.
IWAM_verify
 

 21. 

In Basic authentication, the user name and password are transmitted using _____ encoding.
a.
Base2
c.
Base32
b.
Base16
d.
Base64
 

 22. 

When using Digest authentication, the user name and password are hashed using _____ to prevent hackers from obtaining the information.
a.
administrator credentials
c.
the MD5 algorithm
b.
the IIS metabase
d.
private key encryption
 

 23. 

To use Digest authentication, which of the following would be best for a user to have running?
a.
Internet Explorer 4.0
c.
Netscape 4.0
b.
Internet Explorer 6.0
d.
Mozilla 3.0
 

 24. 

The _____ protocol is used to encrypt Web traffic between a client and the Web server.
a.
IIS
c.
HTTP
b.
SSL
d.
HTTPS
 

 25. 

_____ is an industry-standard method of transferring files between two hosts running TCP/IP.
a.
FTP
c.
HTTP
b.
SSL
d.
HTTPS
 

 26. 

Windows Server 2003 _____ processes require a user to submit a valid user name and password combination to gain access to desktop systems or domain environments.
a.
encryption
c.
authentication
b.
security
d.
access control
 

 27. 

_____ literally controls which users, groups, and computers can access resources, along with the level of access granted.
a.
Encryption
c.
Authentication
b.
Security
d.
Access control
 

 28. 

If a user only needs to be able to read a file and not make changes, they should be granted no more than the _____ permission to that file.
a.
Read
c.
Modify
b.
Write
d.
Execute
 

 29. 

In Windows Server 2003, the ability to encrypt confidential files is provided by
a.
the Encryption Access.
c.
Access control.
b.
the Encrypting File System.
d.
the File Security System.
 

 30. 

An administrator can analyze policy settings by using the _____ command line utility.
a.
SECEDIT
c.
ANALPOL
b.
GPUPDATE
d.
SECPOL
 

 31. 

In the Microsoft world, updates are released as _____ as soon as a security flaw or other issue is identified and corrected.
a.
service packs
c.
hot fixes
b.
system updates
d.
bug fixes
 

 32. 

Service packs and hot fixes can be downloaded and installed via
a.
email.
c.
Microsoft executables.
b.
Windows Updates.
d.
network proxy.
 

 33. 

_____ help(s) ensure that a consistent security setting can be applied to multiple machines and be easily maintained.
a.
Security templates
b.
The Security Configuration and Analysis tool
c.
Security settings in Group Policy objects
d.
The SECEDIT command-line tool
 

 34. 

A computer running _____ can take advantage of security template configurations and deployments.
a.
Windows ME
c.
Windows NT
b.
Windows 98
d.
Windows 2000
 

 35. 

When Windows Server 2003 is installed, the default security settings applied to the computer are stored in a template called
a.
Security Install.exe.
c.
Security Setup.inf.
b.
Setup Security.inf.
d.
Default Security.exe.
 

 36. 

The purpose of the _____ template is to provide a single file in which all of the original computer security settings are stored.
a.
factory
c.
default
b.
incremental
d.
analysis
 

 37. 

The _____ template weakens the default security to allow legacy applications to run under Windows Server 2003.
a.
Securews.inf
c.
Hisecws.inf
b.
Compatws.inf
d.
Iesacls.inf
 

 38. 

Even if there have been no changes to Group Policy, the security settings are refreshed every
a.
30 minutes
c.
8 hours
b.
90 minutes
d.
16 hours
 

 39. 

The _____ SECEDIT switch configures a system with database and template settings.
a.
/analyze
c.
/dbsettings
b.
/configure
d.
/validate
 

 40. 

_____ specific resources, such as printer and file shares, can tell you how often users are accessing them.
a.
Monitoring
c.
Accounting
b.
Auditing
d.
Securing
 



 
Submit          Reset Help