Which type of attacker has actions D. Gray Hat
that are considered noble by the
attacker but could cause more harm
than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat
, FedVTE Windows Operating System Security
During which step of Microsofts C. Evaluate and Plan
recommended Update Management
Process would an update be tested?
A. Assess
B. Identify
C. Evaluate and Plan
D. Deploy
, FedVTE Windows Operating System Security
Which execution mode has A. Kernel
unrestricted access to the
underlying hardware?
A. Kernel
B. Operating System
C. User
D. Guest
Which one of the following can be D. All of the above
managed through group policies
(GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above
, FedVTE Windows Operating System Security
The Windows Security Configuration A. True
Wizard can be used to configure the
Windows Firewall with advanced
security support.
A. True
B. False
Which one of the following is a B. Provides a very granular customization of applications
Windows Firewall advantage?
A. Can be configured with the Group
Policy
B. Provides a very granular
customization of applications
C. Can be configured with Netsh or
PowerShell
D. All of the above