click below
click below
Normal Size Small Size show me how
IT Fundamentals
Block 5 Unit 3 - 20 April 2023
| Question | Answer |
|---|---|
| By default, administrators should configure firewalls to do what? | Change what Windows features are available to users and to manage system security |
| A software-based firewall is a piece of software installed on a ________________ system | single |
| Packet-filtering firewalls can ____________ or __________ traffic through filtering, based on source or destination IP addresses and port numbers | block or allow |
| Which type of firewall can filter traffic based on the context of the conversation? | Stateful Packet Inspection Firewall |
| Which type of firewall combines features from the packet-filtering firewall and stateful packet inspection firewall? ________________________________________________ | Application-Layer Firewall |
| Proxy servers are typically associated with being able to control ________________ communication by limiting which web sites an employee can visit. | outbound |
| A proxy server provides __________, __________, and _____________________. | security, privacy, and web filtering |
| Network administrators secure a network by implementing permissions on the _____________and ____________. | files and folders |
| By setting permissions on files and allowing only a specific group of users access to the files you are maintaining _______________. This is known as building a/an ______________________________. | confidentiality, access control list (ACL) |
| List Folder Contents, Read, Read and Execute, Write, Modify, and Full Control are examples of __________________________________ Permissions. | New Technology File System (NTFS) |
| Which NTFS Permission gives a user all permissions possible? | Full Control |
| Group policy can be configured on a local computer system or centrally configured for the network through _______________________. | Active Directory |
| User settings are used to restrict ____________settings | desktop |
| Computer settings enforce password policies and restrict ____________that can be used on a system. | software |
| Group policy objects can be configured to change what features are available to users and to manage ____________________. | System Security |