2372 Server Admin. Chapter 18

11 September 2022
4.7 (114 reviews)
16 test answers

Unlock all answers in this set

Unlock answers (12)
question
1. What are examples of password policies? Select all that apply.
answer
a. history b. length c. complexity d. age
question
2. Why primarily are account lockout policies put into place?
answer
b. security
question
3. What is the default setting for password history?
answer
d. 24
question
4. What is the default minimum password length in characters?
answer
b. 7
question
5. What setting can you give for account lockout duration that requires an administrator to manually unlock the account?
answer
a. 0
question
6. By default, who has read/write capability to the Default Domain Policy?
answer
d. domain administrators
question
7. How should you assign Password Settings objects (PSOs) to users?
answer
c. Assign the PSOs to a global security group and add users to the group.
question
8. What is the primary advantage of using Group Policies in a domain environment?
answer
c. centralized management
question
9. What is the secpol.msc utility used for?
answer
b. editing local security policies
question
10. What does the minimum password age setting control?
answer
d. how many days a user must wait before a password reset
question
11. Why should administrator passwords change more often than user passwords?
answer
b. because administrator accounts carry more security sensitivity than users do
question
12. What is the range of password history settings?
answer
c. 0 to 24
question
13. What is an easy method of creating a strong password?
answer
d. Start with a sentence and then add numbers and special characters.
question
14. Why is a setting of 0 for maximum password age not a good idea? Check all that apply.
answer
a. It means that passwords never expire, which is a major security problem.
question
15. Account policies contain various subsets. Which of the following are legitimate subsets of account policies? Check all that apply.
answer
a. Password Policy b. Account Lockout Policy c. Kerberos Policy d.
question
16. By default, which of the following represents the maximum amount of time by which a computer's internal clock can be inaccurate yet still be able to use Kerberos authentication?
answer
c. 5 minutes