Why is it important to prestage Computer Objects?
Month: June 2008
Place these steps in order they occur: CA administrator approves certificate Request is set to pending User check back later to obtain certificate User completes form User request certificate
Which of the follow are Qualified Subordination Constraint types? Application Basic Cross-certification Internet Intranet Name Policy Qualified Answer: Application Basic Name Policy
Which of the follow are Qualified Subordination Constraint types? Application Basic Cross-certification Internet Intranet Name Policy Qualified
A user is added into a new security group, When does membership get evaluated? a) Logon b) Every 5 Minutes c) Every 30 minutes d) Logoff Answer a) logon
I posted this early because of the long weekend. This weeks reading for the self study group is: 5.1 Creating Computer and Joining the Domain 16 42 5.2 Automating the Creation of Computer Objects 10 5.3 Supportign Computer Object and Accounts 16 Have a great long weekend too. Try not to study […]
What are the components of a Public Key Infrastructure? Answer: Digital Certificates Certification Authority (CA) Certification Hierarchy Certificate Revocation List Certificate Policy Statement
What are the components of a Public Key Infrastructure?
What are the five pillars of information security? Answer: Authentication Authorization Confidentiality Integrity Nonrepudiation
What are the five pillars of information security?