Keiser University Week 4 Web Server Administration?? Questions Web Server Administration week 4 study guide questions i need the correct answers in order t

Keiser University Week 4 Web Server Administration?? Questions Web Server Administration week 4 study guide questions i need the correct answers in order to study for the real test thank you in advance. Study questions
Web Server Administration
Question 1
Which of the following are ESAE forest benefits? (Choose all that apply)
Simple way to improve security
Locked-down accounts
Allow Aliasing of accounts
Selective authentication
Question 2
Which of the following is used to determine encryption key material and security protection for
use in protecting subsequent main mode or quick mode communications?
quick mode negotiations
quick mode messages
main mode negotiations
main mode messages
Question 3
Which files are needed for Just-Enough Administration? (Choose two answers)
Session-configuration file
Just-Enough configuration file
Role-capability files
virtual account configuration file
Question 4
Which of the following are advantages of using virtual accounts for JEA? (Choose all that apply)
The virtual account can be used to access any system.
Limits activities defined by JEA.
Limits accounts to specified accounts in the JEA.
User credentials are not stored on the remote system.
Question 5
IKE main mode has a default lifetime of _____ hours.
6
8
10
12
Question 6
Which predefined IPSec policy is used to configure computers to negotiate security and
authentication methods when requested?
Client (Respond Only)
Server (Request Security)
Secure Server (Require Security)
Secure Request (Optional)
Question 7
Server Message Block (SMB) 3.0 provides many changes that add functionality and improve
performance. Which of the following features encrypts traffic?
SMB Transparent Failover
SMB Encryption
SMB Scale Out
SMB Directory Leasing
Question 8
Which of the following is a special Active Directory forest, separate from the production Active
Directory Domain Services forest, that hosts privileged accounts?
Clean forest
PAM forest
Principal forest
ESAE forest
Question 9
Which access type is based on the role a user plays in the organization?
MIM access control
Mandatory access control
Discretionary access control
Role-based access control
Question 10
Which of the following statements are true of ESAE forests? (Choose all that apply)
Servers should be on isolated networks.
A one-way trust must be configured in which the production forests trust the ESAE forest
so that users from the ESAE forest can access resources in the production forest
Servers should be able to access USB devices if they use encryption
Installation media used in the ESAE forest should be validated and tightly controlled.
Question 11
Which management functionality was introduced with SMB 3.0?
The SMB Management Console
The SMB node of the Failover Cluster Console
PowerShell cmdlets for SMB
Windows Remote support for SMB
Question 12
Which file is a special type of file that specifies what can be done in a JEA session?
Session-configuration file
Just-Enough configuration file
Role-capability files
virtual account configuration file
Question 13
Which of the following is the standard that defines a mechanism to establish SAs?
Security Parameters
Internet Security Association and Key Management Protocol
Security association
Internet Key Exchange (IKE)
Question 14
Which of the following is a Windows PowerShell endpoint that is configured so that only
specified authenticated users can connect to the endpoint and execute the allowed Windows
PowerShell cmdlets, parameters, and values?
Session endpoint
Shadow endpoint
Control endpoint
JEA endpoint
Question 15
Which isolation zone communicates only with computers within the same domain?
Server isolation
Subnet isolation
Site isolation
Domain isolation
Question 16
Which Microsoft component creates a ESAE forest?
Privileged Access Management
Shadow Principal Manager
Just-in-time Manager
Microsoft Identity Manager
Question 17
Which of the following are types of isolation zones? (Choose two answers)
Server isolation
Subnet isolation
Site isolation
Domain isolation
Question 18
Which of the following statements are true of isolation zones? (Choose all answers that apply)
Computers in the isolated network will be configured to initiate communications with any
computer, regardless of whether they are isolated
You will configure computers that are not in the isolated network so that they can initiate
computers with other computers that are not in the isolated network and they cannot
initiate communications with computers in the isolated network.
To create an isolation zone, you will create a subnet with the various types of computers.
Exception rules are defined with Windows Firewall with Security console.
Question 19
Which of the following are accounts that emulate a Network Service account that has the name
NT Serviceservicename?
Virtual accounts
Just-enough account
Alias account
Shadow principal
Question 20
Which of the following statements are true of ESAE forests? (Choose all that apply)
The ESAE forest is limited to the hosting accounts of administrative users for the
production forest.
The ESAE forest should be a single-domain Active Directory forest.
The ESAE should only run on the newest version of Windows server and build.
The ESAE forest should have strict security policies, including authentication
requirements.
Question 21
Which type of account is used by JEA?
Virtual accounts
Just-enough account
Alias account
Shadow principal
Question 22
With PAM, which of the following is a copy of an account or group that exists in the production
or source forest?
Shadow principal
Just-in-time account
Identity Manager client account
ESAE account
Question 23
Which of the following automates the provisioning of temporary admin access using a shadow
high-security admin forest?
Privileged Access Management
Shadow Principal Manager
Just-in-Time (JIT) Administration
Microsoft Identity Manager
Question 24
Which of the following best describes a clean source principal?
Specifies that all security dependencies are as trustworthy as the items being secured
Users newly created accounts based on a secure template
Users included a specified universal security group
Accounts that pass a PAM audit
Question 25
Which file allows you to define JEA roles, including what the role can do in Windows PowerShell
session?
Session-configuration file
Just-Enough configuration file
Role-capability files
virtual account configuration file
Question 26
Which type of access control is Just-Enough Administration based on?
MIM access control
Mandatory access control
Discretionary access control
Role-based access control
Question 27
Which of the following is an on-premise identity and access management solution that allows
you to manage users, credentials, policies, access, certificates, and privileged identities?
Privileged Access Management
Shadow Principal Manager
Just-in-time Manager
Microsoft Identity Manager
Question 28
Which file used in JEA maps the JEA roles to users or a group?
Session-configuration file
Just-Enough configuration file
Role-capability files
virtual account configuration file
Question 29
Which of the following requires that a user, system, or application be given no more privilege
than necessary to perform its function or job?
Separation of duties
DREAD
Defense in depth
Principle of Least Privilege
Question 30
In IPSec, which of the following is the combination of security services, protection mechanisms,
and cryptographic keys mutually agreed to by communicating peers?
Security Parameters
Internet Security Association and Key Management Protocol
Security association
Internet Key Exchange (IKE)

Purchase answer to see full
attachment

Don't use plagiarized sources. Get Your Custom Essay on
Keiser University Week 4 Web Server Administration?? Questions Web Server Administration week 4 study guide questions i need the correct answers in order t
Just from $13/Page
Order Essay
Homework Writings Pro
Calculate your paper price
Pages (550 words)
Approximate price: -

Why should I choose Homework Writings Pro as my essay writing service?

We Follow Instructions and Give Quality Papers

We are strict in following paper instructions. You are welcome to provide directions to your writer, who will follow it as a law in customizing your paper. Quality is guaranteed! Every paper is carefully checked before delivery. Our writers are professionals and always deliver the highest quality work.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Reasonable Prices and Free Unlimited Revisions

Typical student budget? No problem. Affordable rates, generous discounts - the more you order, the more you save. We reward loyalty and welcome new customers. Furthermore, if you think we missed something, please send your order for a free review. You can do this yourself by logging into your personal account or by contacting our support..

Essay Delivered On Time and 100% Money-Back-Guarantee

Your essay will arrive on time, or even before your deadline – even if you request your paper within hours. You won’t be kept waiting, so relax and work on other tasks.We also guatantee a refund in case you decide to cancel your order.

100% Original Essay and Confidentiality

Anti-plagiarism policy. The authenticity of each essay is carefully checked, resulting in truly unique works. Our collaboration is a secret kept safe with us. We only need your email address to send you a unique username and password. We never share personal customer information.

24/7 Customer Support

We recognize that people around the world use our services in different time zones, so we have a support team that is happy to help you use our service. Our writing service has a 24/7 support policy. Contact us and discover all the details that may interest you!

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Our reputation for excellence in providing professional tailor-made essay writing services to students of different academic levels is the best proof of our reliability and quality of service we offer.

Essays

Essay Writing Service

When using our academic writing services, you can get help with different types of work including college essays, research articles, writing, essay writing, various academic reports, book reports and so on. Whatever your task, homeworkwritingspro.com has experienced specialists qualified enough to handle it professionally.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our professional editor will check your grammar to make sure it is free from errors. You can rest assured that we will do our best to provide you with a piece of dignified academic writing. Homeworkwritingpro experts can manage any assignment in any academic field.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.