Windows Operating System Security Exam with complete solutions
Which one of the following could be categorized as a misconfiguration? A. Failure to set quotas for the group members and then the members overload the file server in an accidental DoS attack B. Mistakenly adding an account to a wrong group C. Accidentally setting the Everyone group to full control on a share drive D. All of the above - Answer- D. All of the above A logical Patch Management process is a one-time process that businesses should establish to ensure success. A. True B. False - Answer- B. False Network Access Protection (NAP) is a Windows feature that provides which one of the following? A. Automatic Remediation B. Non-current Compliance C. Health State Invalidation D. None of the above - Answer- A. Automatic Remediation A Virtual Private Network allows two systems to connect over a public network and have the assurance of which of the following? A. Confidentiality B. Authentication C. Integrity D. All of the above - Answer- D. All of the above Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates? A. Certificate Enrolment Web Service B. Online Responder C. Certificate Enrolment Policy Web Service D. Network Device Enrollment Service - Answer- D. Network Device Enrollment Service Which description best defines a Hotfix? A. Incremental update between service packs or versions to fix outstanding issues B. Publicly released update to fix a known flaw for a software application or operating system C. An update to fix a very specific issue D. A collection of patches Hotfixes and maintenance releases - Answer- C. An update to fix a very specific issue What are the four service startup types? A. Manual; Automatic; Disabled; Prompt B. Manual; Automatic; Enabled; Disabled C. Manual; Automatic; Scheduled; Disabled D. Manual; Automatic; Automatic (Delayed); Disabled - Answer- D. Manual; Automatic; Automatic (Delayed); Disabled Which one of the following can be audited using the Windows Security Auditing feature? A. Audit IPSec Extended Mode B. Audit Logoff C. Audit Network Policy Server D. All of the above - Answer- D. All of the above Which Internet Protocol Security (IPsec) protocol provides confidentiality by encrypting data? A. Internet Key Exchange (IKE) B. Authentication Header (AH) C. Encapsulating Security Payload (ESP) D. All of the above - Answer- C. Encapsulating Security Payload (ESP) Which one of the following default rights can be performed by a member of the Windows User Group? A. Increase a process working set B. Allow logons through the Remote Desktop Services C. Create global objects D. Load and unload device drivers - Answer- A. Increase a process working set Which one of the following is required for Windows BitLocker configuration? A. Trusted Platform Module (TPM) B. Hardware Security Module C. UEFI (Unified Extensible Firmware Interface) D. None of the above - Answer- A. Trusted Platform Module (TPM) Which option is best for a server to connect to a network? A. Wired B. Wireless C. Virtual Private Network D. None of the above - Answer- A. Wired In a Kerberos Authentication process which one of the following sends a Ticket Granting Ticket secret key and a session key as a function? A. TGS_RESPONSE B. AS_RESPONSE C. TGS_REQ D. AP_RESPONSE - Answer- B. AS_RESPONSE In which one of the Social Engineering stages would you establish credibility? A. Information Gathering B. Select Target C. Relationship Development D. Relationship Exploitation - Answer- C. Relationship Development PowerShell is built on top of the .Net CRL and .Net Framework. A. True B. False - Answer- A. True Windows Defender was formerly known as Microsoft Anti-Spyware. A. True B. False - Answer- A. True Which one of the following creates and manages and exports (for deployment) security policies across multiple Windows operating systems roles and Microsoft applications? A. Microsoft Security Configuration Wizard B. Microsoft Security Compliance Manager C. Security Templates D. Group Policy - Answer- B. Microsoft Security Compliance Manager In the Windows Registry what is a collection of discrete files called? A. Programs B. Hives C. Keys D. Trees - Answer- B. Hives Which method can start PowerShell in Windows 8? A. > All Programs > Accessories > Windows PowerShell Folder > Windows PowerShell B. Charm > Search > type PowerShell > click Windows PowerShell C. In Server Manager: Tools menu > Windows PowerShell D. All of the above - Answer- B. Charm > Search > type PowerShell > click Windows PowerShell
Written for
- Institution
- Windows Operating System Security
- Course
- Windows Operating System Security
Document information
- Uploaded on
- June 5, 2023
- Number of pages
- 10
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
windows operating system security exam with comple