Question: What are different methods for configuring Windows server user authentication?
Question: What are the methods used to harden and manage firewall technologies?
Question: Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task/system monitors used?