Filters
Question type

Study Flashcards

What is the default value for the "Maximum password age" setting in the Password Policy?


A) 0 days
B) 30 days
C) 42 days
D) 45 days

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.

Correct Answer

verifed

verified

What are the categories of local security policy settings?

Correct Answer

verifed

verified

The local security policy contains the f...

View Answer

Which part of the motherboard in your computer is used to store encryption keys and certificates?


A) NTFS
B) TPM
C) EFS
D) NAP

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

In Windows 10, advanced audit policies can only be edited at a command-line.

A) True
B) False

Correct Answer

verifed

verified

Match each item with a statement below.

Premises
a feature in Windows 10 that elevates user privileges only when required
Responses
User Account Control (UAC)
Malware
Hashing algorithm
Password policy
BitLocker Drive Encryption
Windows Defender
Secedit
Encrypting File System (EFS)
Auditing

Correct Answer

User Account Control (UAC)
Malware
Hashing algorithm
Password policy
BitLocker Drive Encryption
Windows Defender
Secedit
Encrypting File System (EFS)
Auditing

Account policies settings are located in which of the following?


A) NAP
B) local security policy
C) EFS security policy
D) remote policy

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

The process of taking data and making it unreadable is known as which of the following?


A) Encryption
B) Decryption
C) Signing
D) Verifying

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What type of encryption algorithm uses two keys to encrypt and decrypt data?


A) signing
B) symmetric
C) asymmetric
D) hash

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The most common use for AppLocker is malware prevention.

A) True
B) False

Correct Answer

verifed

verified

Which policy controls password characteristics for local user accounts?


A) account lockout
B) password
C) domain
D) user control

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What are some of the settings available in the user rights assignment?

Correct Answer

verifed

verified

Some of the settings available in the us...

View Answer

Which of the following is considered one of the biggest sources of malware (malicious software) ?


A) the Internet
B) a cloud library
C) a hard disk
D) a router

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Match each item with a statement below.

Premises
a collection of settings to control password characteristics such as length and complexity
Responses
Auditing
Secedit
Encrypting File System (EFS)
User Account Control (UAC)
BitLocker Drive Encryption
Hashing algorithm
Malware
Password policy
Windows Defender

Correct Answer

Auditing
Secedit
Encrypting File System (EFS)
User Account Control (UAC)
BitLocker Drive Encryption
Hashing algorithm
Malware
Password policy
Windows Defender

Which of the following can be used to define which programs are allowed or disallowed in the system?


A) Software restriction policies
B) A network zone
C) Local policies
D) AppLocker

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a threat to privacy and is sometimes installed when you visit a website?


A) Windows Defender
B) EFS
C) Macro script
D) Spyware

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

NTFS permissions can be easily circumvented when you have physical access to a computer.

A) True
B) False

Correct Answer

verifed

verified

Match each item with a statement below.

Premises
the security process that records the occurrence of specific operating system events in the Security log
Responses
Windows Defender
User Account Control (UAC)
Auditing
Password policy
BitLocker Drive Encryption
Encrypting File System (EFS)
Hashing algorithm
Secedit
Malware

Correct Answer

Windows Defender
User Account Control (UAC)
Auditing
Password policy
BitLocker Drive Encryption
Encrypting File System (EFS)
Hashing algorithm
Secedit
Malware

Match each item with a statement below.

Premises
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Responses
Windows Defender
Malware
Encrypting File System (EFS)
User Account Control (UAC)
Password policy
Secedit
Auditing
Hashing algorithm
BitLocker Drive Encryption

Correct Answer

Windows Defender
Malware
Encrypting File System (EFS)
User Account Control (UAC)
Password policy
Secedit
Auditing
Hashing algorithm
BitLocker Drive Encryption

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?


A) NAP
B) Dual Locked Hard Drive
C) BitLocker Drive Encryption
D) TPM

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer