100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

FedVTE - Windows Operating System Security Exam Questions and Answers

Puntuación
-
Vendido
-
Páginas
4
Grado
A+
Subido en
05-06-2023
Escrito en
2022/2023

Which value in the PowerShell "execution policy" allows loading of all configuration files and scripts? - Answer- Unrestricted Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates? - Answer- B. Online Responder D. Network Device Enrollment Service Which key command in PowerShell shows an objects methods and properties? - Answer- All of the above Which one of the following steps is not part of securing the Microsoft patch process? - Answer- Apply patches while on the road Of the following methods which one is a tool that centrally manages and configures Windows operating systems and applications and user settings? - Answer- Group Policy In which one of the Social Engineering stages would you establish credibility? - Answer- Relationship Development Microsoft Security Configuration Wizard is a management tool that is based upon machine roles such as a file server a print server a domain controller etc. - Answer- True Which option is best for a server to connect to a network? - Answer- Wired Authenticode is a means of code signing that allows users to verify the source and author of the signed software. - Answer- False Which type of permissions are created by default on non child objects or based by user assignment? - Answer- Explicit Which one of the following could be categorized as a misconfiguration? - Answer- All of the above Which one of the following is a Windows Firewall advantage? - Answer- B. Provides a very granular customization of applications C. Can be configured with Netsh or PowerShell What are the four service startup types? - Answer- Manual; Automatic; Automatic (Delayed); Disabled Which method can start PowerShell in Windows 8? - Answer- Charm Search type PowerShell click Windows PowerShell The Windows Security Configuration Wizard can be used to configure the Windows Firewall with advanced security support. - Answer- True Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion Prevention Systems are not 100% compatible with IPv6. - Answer- True Which one of the following creates and manages and exports (for deployment) security policies across multiple Windows operating systems roles and Microsoft applications? - Answer- Microsoft Security Compliance Manager In a Hardening Process which method uses plaintext files containing software and driver installation configuration settings? - Answer- A. Security Templates D. Group Policy Security Templates provide a standardized way to organize and express and measure security related information. - Answer- False Network Access Protection (NAP) is a Windows feature that provides which one of the following? - Answer- Automatic Remediation Which two of the following categories of monitoring are in the Action Center formerly known as the Windows Security Center? - Answer- Security and Maintenance In a Kerberos Authentication process which one of the following sends a Ticket Granting Ticket secret key and a session key as a function? - Answer- AS_RESPONSE User Account Control (UAC) was introduced in Windows XP and Server 2003. - Answer- False Which Internet Protocol Security (IPsec) protocol provides confidentiality by encrypting data? - Answer- Encapsulating Security Payload (ESP) CVE is short for Critical Vulnerabilities and Exploits. - Answer- False During which step of Microsofts recommended Update Management Process would an update be tested? - Answer- Evaluate and Plan Which description best defines a Hotfix? - Answer- An update to fix a very specific issue In which multi tasking mode can an operating system take control of the processor without consent from the task? - Answer- Preemptive multi-tasking A Virtual Private Network allows two systems to connect over a public network and have the assurance of which of the following? - Answer- All of the above Which one of the following default rights can be performed by a member of the Windows User Group? - Answer- Increase a process working set Which vulnerability allows remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file? - Answer- Kernel Mode Driver - CVE- An API is a set of functions that an application can call to allow the application to operate within Windows. - Answer- True Which one of the following is a benefit of Dynamic Access Control? - Answer- All of the above Which built-in Windows security feature prevents users from loading unauthorized and unapproved applications? - Answer- Windows AppLocker Which Dynamic Access Control capability allows for "safety net" policies? - Answer- Centralize Access Policies PowerShell is built on top of the .Net CRL and .Net Framework. - Answer- True Which method scans systems to identify common security misconfigurations and missing security updates? - Answer- Microsoft Baseline Security Analyzer In the Windows Registry what is a collection of discrete files called? - Answer- Hives A logical Patch Management process is a one-time process that businesses should establish to ensure success. - Answer- False Which Network Access Protection (NAP) client collects and maintains a system health status? - Answer- NAP Agent Which solution is best to avoid downloading an untrusted patch? - Answer- All of the above Which one of the following can be audited using the Windows Security Auditing feature? - Answer- All of the above Which one of the following can be managed through group policies (GPO)? - Answer- All of the above Which one of the following DLL file handles the memory management? - Answer- K Which one of the following is required for Windows BitLocker configuration? - Answer- Trusted Platform Module (TPM) Which type of attacker has actions that are considered noble by the attacker but could cause more harm than good? - Answer- Gr

Mostrar más Leer menos
Institución
FedVTE
Grado
FedVTE

Vista previa del contenido

FedVTE - Windows Operating System Security Exam Questions and Answers
Which value in the PowerShell "execution policy" allows loading of all configuration files and scripts? - Answer- Unrestricted
Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates? - Answer- B. Online Responder
D. Network Device Enrollment Service
Which key command in PowerShell shows an objects methods and properties? - Answer- All of the above
Which one of the following steps is not part of securing the Microsoft patch process? - Answer- Apply patches while on the road
Of the following methods which one is a tool that centrally manages and configures Windows operating systems and applications and user settings? - Answer- Group Policy
In which one of the Social Engineering stages would you establish credibility? - Answer-
Relationship Development
Microsoft Security Configuration Wizard is a management tool that is based upon machine roles such as a file server a print server a domain controller etc. - Answer- True
Which option is best for a server to connect to a network? - Answer- Wired
Authenticode is a means of code signing that allows users to verify the source and author of the signed software. - Answer- False
Which type of permissions are created by default on non child objects or based by user assignment? - Answer- Explicit
Which one of the following could be categorized as a misconfiguration? - Answer- All of the above
Which one of the following is a Windows Firewall advantage? - Answer- B. Provides a very granular customization of applications

Escuela, estudio y materia

Institución
FedVTE
Grado
FedVTE

Información del documento

Subido en
5 de junio de 2023
Número de páginas
4
Escrito en
2022/2023
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
UPPERFRONT Boston University School Of Medicine
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
359
Miembro desde
3 año
Número de seguidores
238
Documentos
7903
Última venta
2 días hace
UPPER FRONT

HELLO!! THIS IS YOUR ONE STOP STORE FOR EXAMS AND ALL ACCADEMIC EXECCELENCY MATERIALS. BEST OF LUCK

3.8

82 reseñas

5
31
4
26
3
12
2
7
1
6

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes