Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam (elaborations) TestOut LabSim Chapter 14 - Security

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
28-08-2024
Written in
2024/2025

Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security

Show more Read less
Institution
TestOut LabSim Chapter 14 - Security
Course
TestOut LabSim Chapter 14 - Security

Content preview

TESTOUT LABSIM CHAPTER 14 –
SECURITY
EXAM
Which Windows feature can you use to encrypt a hard drive volume? - CORRECT
ANSWER-BitLocker

BitLocker was introduced in Windows Vista and is used to encrypt an entire volume (not
just individual files and folders). BitLocker is designed to protect all data on a volume,
even if the hard drive is moved to another computer.

Encrypting File System (EFS) - CORRECT ANSWER-a component of the NTFS file
system that allows file encryption. EFS is not a Windows feature that is used to encrypt
a hard drive volume.

NTFS - CORRECT ANSWER-file system that is used in modern Windows operating
systems. It is not a Windows feature that is used to encrypt a hard drive volume.

BitLocker to Go - CORRECT ANSWER-used to encrypt USB drives (not a hard drive
volume).

You are establishing a new security policy for user authentication and want to
implement multi-factor authentication.
Which of the following would BEST accomplish this? - CORRECT ANSWER-Fingerprint
and one-time code text message

During an airline flight, a laptop user makes last-minute changes to a presentation that
contains sensitive company information.
Which of the following would make it difficult for other passengers to view this
information on the laptop display? - CORRECT ANSWER-Privacy Filter

Which of the following are examples of a strong password? (Select two.) - CORRECT
ANSWER-I love the Linux P3ngu!n Tux

il0ve2EatIceCr3am!

Which database encryption method can you use to encrypt data at rest? - CORRECT
ANSWER-Transparent data encryption

One of the Windows workstations you manage has four user accounts defined on it.
Two of the users are Limited users, while the third (your account) is an Administrative

, user. The fourth account is the Guest user account, which has been enabled to allow
management employees convenient workstation access.
Each Limited and Administrative user has been assigned a strong password. File and
folder permissions have been assigned to prevent users from accessing each other's
files. Autorun has also been disabled on the system.
Which of the following actions is MOST likely to increase this system's security? -
CORRECT ANSWER-Disable the Guest account.

One of the Windows workstations you manage has three user accounts defined on it.
Two of the users are Limited users, while the third (your account) is an Administrative
user.
Each Limited and Administrative user has been assigned a strong password. File and
folder permissions have been assigned to prevent users from accessing each other's
files.
Which of the following would MOST likely increase this system's security? (Select two.)
- CORRECT ANSWER-Disable Autorun on the system.

Set a screen saver password.

You are working at the local hospital in the IT department. You have just received a
promotion to junior network technician. Part of your new role involves troubleshooting
network communication issues.
Which of the following user groups should your account be added to? - CORRECT
ANSWER-Network Configuration Operator

A technician assists Joe, an employee in the sales department who needs access to the
client database, by granting him Administrator privileges. Later, Joe discovers that he
has access to the salaries in the payroll database.
Which of the following security practices was violated? - CORRECT ANSWER-Principle
of least privilege

You are assisting the security administrator and discover that a user was logged in to
their workstation after hours. After further investigation, you discover that the user's
account was compromised, and someone used the account to steal sensitive data.
Which of the following could have BEST prevented this from happening? - CORRECT
ANSWER-Restrict the user's login times to work hours only.

As part of the response to a security incident on your company network, you have been
asked to draft a document related to evidence gathering that contains details about
personnel in possession and control of evidence from the time of discovery up to the
time of presentation in court.
Which document have been asked to draft? - CORRECT ANSWER-Chain of custody

You work for a company that offers their services through the internet. It is critical that
your website performs well.

Written for

Institution
TestOut LabSim Chapter 14 - Security
Course
TestOut LabSim Chapter 14 - Security

Document information

Uploaded on
August 28, 2024
Number of pages
13
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.09
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
MARIESTOPES1

Get to know the seller

Seller avatar
MARIESTOPES1 Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
209
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions