click below
click below
Normal Size Small Size show me how
IT Fundamentals
Block 5 Unit 3 - 20 April 2023
Question | Answer |
---|---|
By default, administrators should configure firewalls to do what? | Change what Windows features are available to users and to manage system security |
A software-based firewall is a piece of software installed on a ________________ system | single |
Packet-filtering firewalls can ____________ or __________ traffic through filtering, based on source or destination IP addresses and port numbers | block or allow |
Which type of firewall can filter traffic based on the context of the conversation? | Stateful Packet Inspection Firewall |
Which type of firewall combines features from the packet-filtering firewall and stateful packet inspection firewall? ________________________________________________ | Application-Layer Firewall |
Proxy servers are typically associated with being able to control ________________ communication by limiting which web sites an employee can visit. | outbound |
A proxy server provides __________, __________, and _____________________. | security, privacy, and web filtering |
Network administrators secure a network by implementing permissions on the _____________and ____________. | files and folders |
By setting permissions on files and allowing only a specific group of users access to the files you are maintaining _______________. This is known as building a/an ______________________________. | confidentiality, access control list (ACL) |
List Folder Contents, Read, Read and Execute, Write, Modify, and Full Control are examples of __________________________________ Permissions. | New Technology File System (NTFS) |
Which NTFS Permission gives a user all permissions possible? | Full Control |
Group policy can be configured on a local computer system or centrally configured for the network through _______________________. | Active Directory |
User settings are used to restrict ____________settings | desktop |
Computer settings enforce password policies and restrict ____________that can be used on a system. | software |
Group policy objects can be configured to change what features are available to users and to manage ____________________. | System Security |