System Security – 2025-2026 EXAM
WITH Complete Questions and
Correct VERIFIED Answers
GRADED A+
Of the following methods which one is a tool that centrally manages and configures
Windows operating systems and applications and user settings? - ANSWERS-Group
Policy
In which one of the Social Engineering stages would you establish credibility? -
ANSWERS-Relationship Development
Microsoft Security Configuration Wizard is a management tool that is based upon
machine roles such as a file server a print server a domain controller etc. - ANSWERS-
True
Which option is best for a server to connect to a network? - ANSWERS-Wired
Authenticode is a means of code signing that allows users to verify the source and
author of the signed software. - ANSWERS-False
, Which type of permissions are created by default on non child objects or based by user
assignment? - ANSWERS-Explicit
Which one of the following could be categorized as a misconfiguration? - ANSWERS-All
of the above
Which one of the following is a Windows Firewall advantage? - ANSWERS-B. Provides
a very granular customization of applications
C. Can be configured with Netsh or PowerShell
What are the four service startup types? - ANSWERS-Manual; Automatic; Automatic
(Delayed); Disabled
Which method can start PowerShell in Windows 8? - ANSWERS-Charm > Search >
type PowerShell > click Windows PowerShell
The Windows Security Configuration Wizard can be used to configure the Windows
Firewall with advanced security support. - ANSWERS-True
Many current network security tools such as Firewalls and Intrusion Detection Systems
and Intrusion Prevention Systems are not 100% compatible with IPv6. - ANSWERS-
True
Which one of the following creates and manages and exports (for deployment) security
policies across multiple Windows operating systems roles and Microsoft applications? -
ANSWERS-Microsoft Security Compliance Manager
In a Hardening Process which method uses plaintext files containing software and driver
installation configuration settings? - ANSWERS-A. Security Templates
D. Group Policy
Security Templates provide a standardized way to organize and express and measure
security related information. - ANSWERS-False
Network Access Protection (NAP) is a Windows feature that provides which one of the
following? - ANSWERS-Automatic Remediation
Which two of the following categories of monitoring are in the Action Center formerly
known as the Windows Security Center? - ANSWERS-Security and Maintenance
In a Kerberos Authentication process which one of the following sends a Ticket Granting
Ticket secret key and a session key as a function? - ANSWERS-AS_RESPONSE
User Account Control (UAC) was introduced in Windows XP and Server 2003. -
ANSWERS-False