FedVTE - Windows Operating System
Security 2024-2025. Questions and 100%
Correct Answers. Graded A+
A logical Patch Management process is a one-time process that businesses should
establish to ensure success. - ANSFalse
A Virtual Private Network allows two systems to connect over a public network and have
the assurance of which of the following? - ANSAll of the above
An API is a set of functions that an application can call to allow the application to
operate within Windows. - ANSTrue
Authenticode is a means of code signing that allows users to verify the source and
author of the signed software. - ANSFalse
CVE is short for Critical Vulnerabilities and Exploits. - ANSFalse
During which step of Microsofts recommended Update Management Process would an
update be tested? - ANSEvaluate and Plan
In a Hardening Process which method uses plaintext files containing software and driver
installation configuration settings? - ANSA. Security Templates
D. Group Policy
In a Kerberos Authentication process which one of the following sends a Ticket Granting
Ticket secret key and a session key as a function? - ANSAS_RESPONSE
In a PowerShell environment the WhatIf parameter allows PowerShell users to test the
command before actually executing. - ANSTrue
In the Windows Registry what is a collection of discrete files called? - ANSHives
In which multi tasking mode can an operating system take control of the processor
without consent from the task? - ANSPreemptive multi-tasking
In which one of the Social Engineering stages would you establish credibility? -
ANSRelationship Development
Many current network security tools such as Firewalls and Intrusion Detection Systems
and Intrusion Prevention Systems are not 100% compatible with IPv6. - ANSTrue
Security 2024-2025. Questions and 100%
Correct Answers. Graded A+
A logical Patch Management process is a one-time process that businesses should
establish to ensure success. - ANSFalse
A Virtual Private Network allows two systems to connect over a public network and have
the assurance of which of the following? - ANSAll of the above
An API is a set of functions that an application can call to allow the application to
operate within Windows. - ANSTrue
Authenticode is a means of code signing that allows users to verify the source and
author of the signed software. - ANSFalse
CVE is short for Critical Vulnerabilities and Exploits. - ANSFalse
During which step of Microsofts recommended Update Management Process would an
update be tested? - ANSEvaluate and Plan
In a Hardening Process which method uses plaintext files containing software and driver
installation configuration settings? - ANSA. Security Templates
D. Group Policy
In a Kerberos Authentication process which one of the following sends a Ticket Granting
Ticket secret key and a session key as a function? - ANSAS_RESPONSE
In a PowerShell environment the WhatIf parameter allows PowerShell users to test the
command before actually executing. - ANSTrue
In the Windows Registry what is a collection of discrete files called? - ANSHives
In which multi tasking mode can an operating system take control of the processor
without consent from the task? - ANSPreemptive multi-tasking
In which one of the Social Engineering stages would you establish credibility? -
ANSRelationship Development
Many current network security tools such as Firewalls and Intrusion Detection Systems
and Intrusion Prevention Systems are not 100% compatible with IPv6. - ANSTrue