Security 2025/2026 Exam All Answers
and Illustrations Given
Which type of attacker has actions that are considered noble by the
attacker but could cause more harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat - 🧠 ANSWER ✔✔D. Gray Hat
COPYRIGHT©NINJANERD 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
1
,During which step of Microsofts recommended Update Management
Process would an update be tested?
A. Assess
B. Identify
C. Evaluate and Plan
D. Deploy - 🧠 ANSWER ✔✔C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying
hardware?
A. Kernel
COPYRIGHT©NINJANERD 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
2
,B. Operating System
C. User
D. Guest - 🧠 ANSWER ✔✔A. Kernel
Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above - 🧠 ANSWER ✔✔D. All of the above
COPYRIGHT©NINJANERD 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
3
, The Windows Security Configuration Wizard can be used to configure the
Windows Firewall with advanced security support.
A. True
B. False - 🧠 ANSWER ✔✔A. True
Which one of the following is a Windows Firewall advantage?
A. Can be configured with the Group Policy
B. Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
COPYRIGHT©NINJANERD 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
4