Lesson 9 Review - Lesson 9 True/False Indicate whether the sentence or statement is true or false 1 , network 2 ,

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Lesson 9 True/False Indicate whether the sentence or statement is true or false. 1. To plan security by server role, you must first identify the role or services that the server performs on the  network. 2. When planning security by server role, you should never document whether these servers are member  servers, domain controllers, or stand-alone servers. 3. Security templates allow baseline security for computers that share similar security requirements. 4. Security templates define security based on seven configuration categories. 5. When analyzing security settings with the Security Configuration and Analysis Tool, comparing current  security to desired security identifies current security weaknesses. 6. To automate deployment of security templates in a workgroup, use the Secedit or Gpupdate command  within a batch file to apply the security template.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/01/2011 for the course CNS 1 taught by Professor Idk during the Spring '11 term at Texas State Technical Colleges.

Page1 / 4

Lesson 9 Review - Lesson 9 True/False Indicate whether the sentence or statement is true or false 1 , network 2 ,

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online