Filters
Question type

Study Flashcards

Match each item with a statement below.

Premises
a feature in Windows 10 that elevates user privileges only when required
Responses
User Account Control (UAC)
Malware
Hashing algorithm
Password policy
BitLocker Drive Encryption
Windows Defender
Secedit
Encrypting File System (EFS)
Auditing

Correct Answer

User Account Control (UAC)
Malware
Hashing algorithm
Password policy
BitLocker Drive Encryption
Windows Defender
Secedit
Encrypting File System (EFS)
Auditing

The process of taking data and making it unreadable is known as which of the following?


A) Encryption
B) Decryption
C) Signing
D) Verifying

Correct Answer

verifed

verified

In Windows 10, advanced audit policies can only be edited at a command-line.

Correct Answer

verifed

verified

Match each item with a statement below.

Premises
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Responses
Windows Defender
Malware
Encrypting File System (EFS)
User Account Control (UAC)
Password policy
Secedit
Auditing
Hashing algorithm
BitLocker Drive Encryption

Correct Answer

Windows Defender
Malware
Encrypting File System (EFS)
User Account Control (UAC)
Password policy
Secedit
Auditing
Hashing algorithm
BitLocker Drive Encryption

Which of the following is considered one of the biggest sources of malware (malicious software) ?


A) the Internet
B) a cloud library
C) a hard disk
D) a router

Correct Answer

verifed

verified

Which of the following is a threat to privacy and is sometimes installed when you visit a website?


A) Windows Defender
B) EFS
C) Macro script
D) Spyware

Correct Answer

verifed

verified

What are some of the settings available in the user rights assignment?

Correct Answer

verifed

verified

Some of the settings available in the us...

View Answer

Which part of the motherboard in your computer is used to store encryption keys and certificates?


A) NTFS
B) TPM
C) EFS
D) NAP

Correct Answer

verifed

verified

Which of the following can be used to define which programs are allowed or disallowed in the system?


A) Software restriction policies
B) A network zone
C) Local policies
D) AppLocker

Correct Answer

verifed

verified

The most common use for AppLocker is malware prevention.

Correct Answer

verifed

verified

Match each item with a statement below.

Premises
the security process that records the occurrence of specific operating system events in the Security log
Responses
Windows Defender
User Account Control (UAC)
Auditing
Password policy
BitLocker Drive Encryption
Encrypting File System (EFS)
Hashing algorithm
Secedit
Malware

Correct Answer

Windows Defender
User Account Control (UAC)
Auditing
Password policy
BitLocker Drive Encryption
Encrypting File System (EFS)
Hashing algorithm
Secedit
Malware

NTFS permissions can be easily circumvented when you have physical access to a computer.

Correct Answer

verifed

verified

Match each item with a statement below.

Premises
a collection of settings to control password characteristics such as length and complexity
Responses
Auditing
Secedit
Encrypting File System (EFS)
User Account Control (UAC)
BitLocker Drive Encryption
Hashing algorithm
Malware
Password policy
Windows Defender

Correct Answer

Auditing
Secedit
Encrypting File System (EFS)
User Account Control (UAC)
BitLocker Drive Encryption
Hashing algorithm
Malware
Password policy
Windows Defender

What type of encryption algorithm uses two keys to encrypt and decrypt data?


A) signing
B) symmetric
C) asymmetric
D) hash

Correct Answer

verifed

verified

What is the default value for the "Maximum password age" setting in the Password Policy?


A) 0 days
B) 30 days
C) 42 days
D) 45 days

Correct Answer

verifed

verified

Account policies settings are located in which of the following?


A) NAP
B) local security policy
C) EFS security policy
D) remote policy

Correct Answer

verifed

verified

Which policy controls password characteristics for local user accounts?


A) account lockout
B) password
C) domain
D) user control

Correct Answer

verifed

verified

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?


A) NAP
B) Dual Locked Hard Drive
C) BitLocker Drive Encryption
D) TPM

Correct Answer

verifed

verified

What are the categories of local security policy settings?

Correct Answer

verifed

verified

The local security policy contains the f...

View Answer

____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer