with complete solution
Which type of attacker has actions that are considered noble by the attacker but
could cause more harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat
D. Gray Hat
During which step of Microsofts recommended Update Management Process
would an update be tested?
A. Assess
B. Identify
C. Evaluate and Plan
D. Deploy
C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying hardware?
A. Kernel
B. Operating System
C. User
D. Guest
A. Kernel
Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
, C. IPsec connections
D. All of the above
D. All of the above
The Windows Security Configuration Wizard can be used to configure the
Windows Firewall with advanced security support.
A. True
B. False
A. True
Which one of the following is a Windows Firewall advantage?
A. Can be configured with the Group Policy
B. Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
D. All of the above
B. Provides a very granular customization of applications
Many current network security tools such as Firewalls and Intrusion Detection
Systems and Intrusion Prevention Systems are not 100% compatible with IPv6.
A. True
B. False
A. True
Which one of the following default rights can be performed by a member of the
Windows User Group?
A. Increase a process working set
B. Allow logons through the Remote Desktop Services
C. Create global objects
D. Load and unload device drivers
A. Increase a process working set
Security Templates provide a standardized way to organize and express and
measure security related information.