A special mode that allows administrators to created an offline copy of Active Directory is called ___?
DIRECTORY SERVICE RESTORE MODE (DSRM)
A rule that handles addressing and encapsulating is called ___?
ENCAPSULATING PROTOCOL
The process of making configuration changes and deploying controls to reduce the attack surface is called ___?
HARDENING
A solution that defines and implements a policy that describes the requirements to access your network is called ___?
NETWORK ACCESS CONTROL (NAC)
An open source utility used to scan one or more computers or network devices for open ports and other information is called ___?
Nmap
A general approach to handling encryption keys using trusted entities and digital certificates; the hardware, software, policies, and procedures to manage all aspects of digital certificates is called ___?
PUBLIC KEY INFRASTRUCTURE (PKI)
A predefined set of services, programs, and configuration settings that enable a computer to fulfill a specific set of requirements is called ___?
ROLES
A Microsoft utility that provides guidance to administrators and creates policies based on the least privilege principle for the server roles you have selected either during installation or afterward using the server Manager Utility is called ___?
SECURITY CONFIGURATION WIZARD (SCW)
A Windows Server 2008 R2 installation option that provides a minimal environment that only includes programs necessary for the roles you select is called ___?
SERVER CORE INSTALLATION
A technique that creates a virtual encrypted connection and allow applications to use any protocol to communicate with servers and services without having to worry about addressing or privacy concerns is called ___?
TUNNELING
TRUE
TRUE OR FALSE
FALSE
Hardening
Role
Server core
SCW
TRUE OR FALSE
TRUE
Disable the service
Administrator
FALSE
Nmap
NAC
FALSE
SSTP