Friday, April 17, 2009

Chapter 24 (cont'd)

Answer the following concerning CHAPTER 24:
  • Items in the Control Panel are manipulated using what type of policy?
  • What is a GPO? GPE?
  • List 6 possible {reasonable} responsibilities of a network administrator.
  • List 4 password attributes that can be set for a domain.
  • What is system auditing?
  • How many tcp/ip port numbers are there?
  • What are the port numbers assigned to the following: ftp, http, https, smtp, rdp, telnet.
  • Who is able to access files protected by EFS?
  • What is malware?

.

No comments: