CIST 2601 Final Exam Gwinnett Technical
College (Need Test 4) Questions and Correct
Answers. Accurate 2025 Exam. Graded A+.
Approximately what percentage of computers use the Windows operating
system? - ANS >> 90
Which encryption method is not automatically enabled with the operating system
and must be enabled after installation? - ANS >> BitLocker in Windows Server
2008 R2
What acronym describes each entry in a DACL? - ANS >> ACE
____________________ is an approach to securing an IT environment that uses a
collection of strategies. - ANS >> Defense in depth
The ______________ is the collection of all computers and network devices
connected to one or more networks that make up an IT environment. - ANS >> IT
infrastructure
What is the older Windows authentication method that was popular before
Kerberos? - ANS >> NTLM
Why is encryption used as a common security control? - ANS >> Encryption
provides an effective layer of protection in a multi-layered defense.
What is the primary benefit of using kernel loadable modules? - ANS >> The
primary benefit of using Kernel Loadable modules is that the kernel is less
Memory intensive. As a secondary benefit, loading only the modules that you will
be using to the kernel decreases the attack surface by not loading modules that
will not be used.
,CIST 2601: Implementing Operating System Security
Which Microsoft Server 2008 R2 edition is a cost-effective, entry-level server
operating system for small businesses? - ANS >> Foundation
Which structure does Windows use to store access control rules for objects? -
ANS >> Access Control List
Which level of EFS may leave traces of unencrypted data on the disk? - ANS >>
File
Which core part of an operating system provides essential services? - ANS >>
Kernel
Which operating system is the ancestor of today's Microsoft Windows? - ANS >>
DOS
In which process would a user be asked to enter a token-generated password? -
ANS >> Authorization
Which default Windows group provides only limited administrative rights,
including the ability to install software? - ANS >> Power Users
Which of the following well-known attacks used a worm to exploit vulnerabilities
in Microsoft Internet Information Services (IIS) starting in July of 2001? - ANS >>
Code Red
Which authentication method uses data object classification labels? - ANS >>
Mandatory Access Control
What does a client need to access a protected resource when using the
Kerberos protocol? - ANS >> Access ticket
, CIST 2601: Implementing Operating System Security
Which of the following actions allow an attacker to access restricted parts of the
operating system? - ANS >> Change a user mode process to supervisor mode.
The ability to run a backup is an example of which Windows feature? - ANS >>
Right
____________ is the common name of the United States Department of Defense
Trusted Computer System Evaluation Criteria. - ANS >> Orange Book
Which element in a PKI infrastructure authorizes a client to request a
certificate? - ANS >> RA
Which run mode allows processes to access more restricted parts of a
computer system? - ANS >> Supervisor
Which Windows feature prompts users before escalating to administrator
privileges? - ANS >> UAC
Which security tenet ensures that only authorized users can modify information?
- ANS >> Integrity
What Windows feature makes encrypting removable media easy? - ANS >>
BitLocker To Go
Which security tenet of the A-I-C triad does a successful DoS attack
compromise? - ANS >> Availability
Which of the following best defines an ACL? - ANS >> List of access permissions
Encrypting File System (EFS) supports which file system(s)? - ANS >> NTFS