Microsoft Server Installation

Helpfulness: 0
Set Details Share
created 1 year ago by shinklelymas
2 views
For the MCSA course
show moreless
Page to share:
Embed this setcancel
COPY
code changes based on your size selection
Size:
X
Show:
1

You work in a very large data center. Your company wants to upgrade from Windows Server 2012 to Windows Server 2019. You need the windows server edition that allows for unlimited licenses. Which edition would you choose: Datacenter, standard, or essentials

DATACENTER

2

You work in a small large data center. Your company wants to upgrade from Windows Server 2012 to Windows Server 2019. You need the windows server edition that allows for one license. Which edition would you choose: Datacenter, standard, or essentials

stamder

3

A set of cryptographic algorithms.

Cipher Suite

4

The science of securing information by converting it between its normal, readable state (called plaintext) and one in which the data is obscured

cryptography

5

These types of certificates are used primarily to verify the identity of a person or device, authenticate a service, or encrypt files.

Digital certificate

6

Name the locator service in Microsoft Windows, is an industry-standard protocol that locates computers on an IP-based network.

DNS (Domain Name System)

7

A 32-bit format that can contain both vector information and bitmap information. This format is an improvement over the Windows Metafile Format (WMF) and contains extended features.

Enhanced Metafile (EMF)

8

This is a class of security vulnerability that can enable an attacker to inject HTML code into a user's session with a website.

HTML injection

9

It's a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code.

Hypervisor-protected code integrity (HCVI)

10

This is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server.

Internet Authentical Service (IAS)

11

______ is a framework of open standards for helping to ensure private, secure communications over Internet Protocol (IP) networks through the use of cryptographic security services.

IP Security (IPSec)

12

________helps solve an issue associated with entering information in certain languages (such as Chinese, or Japanese) via a keyboard.

Input Method Editor (IME)

13

The _____ role in Windows Server provides a secure, easy-to-manage, modular and extensible platform for reliably hosting websites, services, and applications.

Web Server (IIS)

14

______ is a protocol that is used to mutually authenticate users and services on an open and unsecured network.

Kerberos

15

What port does Kerberos use?

TCP port 80

16

____ refers to a setting, common configuration, or general best-practice, existing in a default state that could reduce the severity of exploitation of a vulnerability.

Mitigation

17

_____ is a client-server networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect to a network service.

...