Deck 6: Windows 10 Security Features

ملء الشاشة (f)
exit full mode
سؤال
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

A)domain
B)group
C)account lockout
D)password
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which policy controls password characteristics for local user accounts?

A)account lockout
B)password
C)domain
D)user control
سؤال
Newer Windows applications use which of the following to describe the structure of an application?

A)manifest
B)log
C)record
D)hash
سؤال
Account policies settings are located in which of the following?

A)NAP
B)local security policy
C)EFS security policy
D)remote policy
سؤال
The Account Policies in the Local Security Policy can be used to control domain accounts.
سؤال
Which of the following can be used to define which programs are allowed or disallowed in the system?

A)Software restriction policies
B)A network zone
C)Local policies
D)AppLocker
سؤال
NTFS permissions can be easily circumvented when you have physical access to a computer.
سؤال
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

A)NAP
B)Dual Locked Hard Drive
C)BitLocker Drive Encryption
D)TPM
سؤال
Which security process records the occurrence of specific operating system events in the Security log?

A)Encrypting
B)Hashing
C)Filtering
D)Auditing
سؤال
Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?

A)object access
B)account management
C)privilege use
D)process tracking
سؤال
In Windows 10, advanced audit policies can only be edited at a command-line.
سؤال
Every object in Windows 10 has audit events related to it.
سؤال
Which rule condition identifies software by file location?

A)publisher
B)path
C)file hash
D)certificate
سؤال
The most common use for AppLocker is malware prevention.
سؤال
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?

A)Adware
B)Worm
C)Spyware
D)Virus
سؤال
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

A)Administrative Privileges Toolkit
B)Private Toolkit
C)Secure Toolkit
D)Application Compatibility Toolkit
سؤال
What is the default value for the "Maximum password age" setting in the Password Policy?

A)0 days
B)30 days
C)42 days
D)45 days
سؤال
The local security policy is part of a larger Windows management system known as which of the following?

A)Group Policy
B)Local Policy
C)Network Policy
D)Domain Policy
سؤال
Which of the following is a threat to privacy and is sometimes installed when you visit a website?

A)Windows Defender
B)EFS
C)Macro script
D)Spyware
سؤال
Which of the following is considered one of the biggest sources of malware (malicious software)?

A)the Internet
B)a cloud library
C)a hard disk
D)a router
سؤال
What type of encryption algorithm uses the same key to encrypt data and decrypt data?

A)asymmetric
B)symmetric
C)signing
D)hash
سؤال
What are the categories of local security policy settings?
سؤال
____________________ is a method for protecting data on removable storage such as USB drives.
سؤال
What are some of the settings available in the user rights assignment?
سؤال
What are some of the settings available in the security options of the local policy?
سؤال
The Account Policies category contains the ____________________ policy and the account lockout policy.
سؤال
Which part of the motherboard in your computer is used to store encryption keys and certificates?

A)NTFS
B)TPM
C)EFS
D)NAP
سؤال
In Windows Defender, you can view the history of items that were deleted. Describe the three options for viewing the history.
سؤال
Advanced auditing is enabled through the local security policy, by using Group Policy, or by using ____________________ .
سؤال
Briefly describe the rule collections used by AppLocker.
سؤال
What type of encryption algorithm uses two keys to encrypt and decrypt data?

A)signing
B)symmetric
C)asymmetric
D)hash
سؤال
What are the settings available to control account lockouts?
سؤال
Which type of permissions are considered the most basic level of data security in Windows 10?

A)EFS
B)NTFS
C)FAT
D)NAP
سؤال
In Windows 10, ____________________ provides both antivirus and antispyware capabilities.
سؤال
What are the tasks you can perform with the Security Configuration and Analysis tool?
سؤال
The process of taking data and making it unreadable is known as which of the following?

A)Encryption
B)Decryption
C)Signing
D)Verifying
سؤال
What are some ways EFS keys may be lost?
سؤال
____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.
سؤال
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

A)signing
B)symmetric
C)asymmetric
D)hash
سؤال
What are the most common reasons that the BitLocker Drive Encryption recovery password is required?
سؤال
Match between columns
a collection of settings to control password characteristics such as length and complexity
Malware
a collection of settings to control password characteristics such as length and complexity
User Account Control (UAC)
a collection of settings to control password characteristics such as length and complexity
Windows Defender
a collection of settings to control password characteristics such as length and complexity
Secedit
a collection of settings to control password characteristics such as length and complexity
Hashing algorithm
a collection of settings to control password characteristics such as length and complexity
BitLocker Drive Encryption
a collection of settings to control password characteristics such as length and complexity
Auditing
a collection of settings to control password characteristics such as length and complexity
Encrypting File System (EFS)
a collection of settings to control password characteristics such as length and complexity
Password policy
سؤال
Match between columns
an encryption technology for individual files and folders that can be enabled by users
Malware
an encryption technology for individual files and folders that can be enabled by users
User Account Control (UAC)
an encryption technology for individual files and folders that can be enabled by users
Windows Defender
an encryption technology for individual files and folders that can be enabled by users
Secedit
an encryption technology for individual files and folders that can be enabled by users
Hashing algorithm
an encryption technology for individual files and folders that can be enabled by users
BitLocker Drive Encryption
an encryption technology for individual files and folders that can be enabled by users
Auditing
an encryption technology for individual files and folders that can be enabled by users
Encrypting File System (EFS)
an encryption technology for individual files and folders that can be enabled by users
Password policy
سؤال
Match between columns
the security process that records the occurrence of specific operating system events in the Security log
Malware
the security process that records the occurrence of specific operating system events in the Security log
User Account Control (UAC)
the security process that records the occurrence of specific operating system events in the Security log
Windows Defender
the security process that records the occurrence of specific operating system events in the Security log
Secedit
the security process that records the occurrence of specific operating system events in the Security log
Hashing algorithm
the security process that records the occurrence of specific operating system events in the Security log
BitLocker Drive Encryption
the security process that records the occurrence of specific operating system events in the Security log
Auditing
the security process that records the occurrence of specific operating system events in the Security log
Encrypting File System (EFS)
the security process that records the occurrence of specific operating system events in the Security log
Password policy
سؤال
Match between columns
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Malware
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
User Account Control (UAC)
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Windows Defender
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Secedit
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Hashing algorithm
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
BitLocker Drive Encryption
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Auditing
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Encrypting File System (EFS)
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Password policy
سؤال
Match between columns
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Malware
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
User Account Control (UAC)
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Windows Defender
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Secedit
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Hashing algorithm
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
BitLocker Drive Encryption
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Auditing
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Encrypting File System (EFS)
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Password policy
سؤال
Match between columns
a command-line tool that is used to apply, export, or analyze security templates
Malware
a command-line tool that is used to apply, export, or analyze security templates
User Account Control (UAC)
a command-line tool that is used to apply, export, or analyze security templates
Windows Defender
a command-line tool that is used to apply, export, or analyze security templates
Secedit
a command-line tool that is used to apply, export, or analyze security templates
Hashing algorithm
a command-line tool that is used to apply, export, or analyze security templates
BitLocker Drive Encryption
a command-line tool that is used to apply, export, or analyze security templates
Auditing
a command-line tool that is used to apply, export, or analyze security templates
Encrypting File System (EFS)
a command-line tool that is used to apply, export, or analyze security templates
Password policy
سؤال
Match between columns
anti-malware software included with Windows 10
Malware
anti-malware software included with Windows 10
User Account Control (UAC)
anti-malware software included with Windows 10
Windows Defender
anti-malware software included with Windows 10
Secedit
anti-malware software included with Windows 10
Hashing algorithm
anti-malware software included with Windows 10
BitLocker Drive Encryption
anti-malware software included with Windows 10
Auditing
anti-malware software included with Windows 10
Encrypting File System (EFS)
anti-malware software included with Windows 10
Password policy
سؤال
Match between columns
a feature in Windows 10 that elevates user privileges only when required
Malware
a feature in Windows 10 that elevates user privileges only when required
User Account Control (UAC)
a feature in Windows 10 that elevates user privileges only when required
Windows Defender
a feature in Windows 10 that elevates user privileges only when required
Secedit
a feature in Windows 10 that elevates user privileges only when required
Hashing algorithm
a feature in Windows 10 that elevates user privileges only when required
BitLocker Drive Encryption
a feature in Windows 10 that elevates user privileges only when required
Auditing
a feature in Windows 10 that elevates user privileges only when required
Encrypting File System (EFS)
a feature in Windows 10 that elevates user privileges only when required
Password policy
سؤال
Describe the four distinct servicing branches in Windows 10.
سؤال
Match between columns
malicious software designed to perform unauthorized acts on your computer
Malware
malicious software designed to perform unauthorized acts on your computer
User Account Control (UAC)
malicious software designed to perform unauthorized acts on your computer
Windows Defender
malicious software designed to perform unauthorized acts on your computer
Secedit
malicious software designed to perform unauthorized acts on your computer
Hashing algorithm
malicious software designed to perform unauthorized acts on your computer
BitLocker Drive Encryption
malicious software designed to perform unauthorized acts on your computer
Auditing
malicious software designed to perform unauthorized acts on your computer
Encrypting File System (EFS)
malicious software designed to perform unauthorized acts on your computer
Password policy
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Windows 10 Security Features
1
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

A)domain
B)group
C)account lockout
D)password
C
2
Which policy controls password characteristics for local user accounts?

A)account lockout
B)password
C)domain
D)user control
B
3
Newer Windows applications use which of the following to describe the structure of an application?

A)manifest
B)log
C)record
D)hash
A
4
Account policies settings are located in which of the following?

A)NAP
B)local security policy
C)EFS security policy
D)remote policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
The Account Policies in the Local Security Policy can be used to control domain accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following can be used to define which programs are allowed or disallowed in the system?

A)Software restriction policies
B)A network zone
C)Local policies
D)AppLocker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
NTFS permissions can be easily circumvented when you have physical access to a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

A)NAP
B)Dual Locked Hard Drive
C)BitLocker Drive Encryption
D)TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which security process records the occurrence of specific operating system events in the Security log?

A)Encrypting
B)Hashing
C)Filtering
D)Auditing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?

A)object access
B)account management
C)privilege use
D)process tracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
In Windows 10, advanced audit policies can only be edited at a command-line.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Every object in Windows 10 has audit events related to it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which rule condition identifies software by file location?

A)publisher
B)path
C)file hash
D)certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
The most common use for AppLocker is malware prevention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?

A)Adware
B)Worm
C)Spyware
D)Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

A)Administrative Privileges Toolkit
B)Private Toolkit
C)Secure Toolkit
D)Application Compatibility Toolkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is the default value for the "Maximum password age" setting in the Password Policy?

A)0 days
B)30 days
C)42 days
D)45 days
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The local security policy is part of a larger Windows management system known as which of the following?

A)Group Policy
B)Local Policy
C)Network Policy
D)Domain Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is a threat to privacy and is sometimes installed when you visit a website?

A)Windows Defender
B)EFS
C)Macro script
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is considered one of the biggest sources of malware (malicious software)?

A)the Internet
B)a cloud library
C)a hard disk
D)a router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What type of encryption algorithm uses the same key to encrypt data and decrypt data?

A)asymmetric
B)symmetric
C)signing
D)hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What are the categories of local security policy settings?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
____________________ is a method for protecting data on removable storage such as USB drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What are some of the settings available in the user rights assignment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are some of the settings available in the security options of the local policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
The Account Policies category contains the ____________________ policy and the account lockout policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which part of the motherboard in your computer is used to store encryption keys and certificates?

A)NTFS
B)TPM
C)EFS
D)NAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
In Windows Defender, you can view the history of items that were deleted. Describe the three options for viewing the history.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Advanced auditing is enabled through the local security policy, by using Group Policy, or by using ____________________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Briefly describe the rule collections used by AppLocker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
What type of encryption algorithm uses two keys to encrypt and decrypt data?

A)signing
B)symmetric
C)asymmetric
D)hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What are the settings available to control account lockouts?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which type of permissions are considered the most basic level of data security in Windows 10?

A)EFS
B)NTFS
C)FAT
D)NAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
In Windows 10, ____________________ provides both antivirus and antispyware capabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the tasks you can perform with the Security Configuration and Analysis tool?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The process of taking data and making it unreadable is known as which of the following?

A)Encryption
B)Decryption
C)Signing
D)Verifying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are some ways EFS keys may be lost?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

A)signing
B)symmetric
C)asymmetric
D)hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the most common reasons that the BitLocker Drive Encryption recovery password is required?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a collection of settings to control password characteristics such as length and complexity
Malware
a collection of settings to control password characteristics such as length and complexity
User Account Control (UAC)
a collection of settings to control password characteristics such as length and complexity
Windows Defender
a collection of settings to control password characteristics such as length and complexity
Secedit
a collection of settings to control password characteristics such as length and complexity
Hashing algorithm
a collection of settings to control password characteristics such as length and complexity
BitLocker Drive Encryption
a collection of settings to control password characteristics such as length and complexity
Auditing
a collection of settings to control password characteristics such as length and complexity
Encrypting File System (EFS)
a collection of settings to control password characteristics such as length and complexity
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
an encryption technology for individual files and folders that can be enabled by users
Malware
an encryption technology for individual files and folders that can be enabled by users
User Account Control (UAC)
an encryption technology for individual files and folders that can be enabled by users
Windows Defender
an encryption technology for individual files and folders that can be enabled by users
Secedit
an encryption technology for individual files and folders that can be enabled by users
Hashing algorithm
an encryption technology for individual files and folders that can be enabled by users
BitLocker Drive Encryption
an encryption technology for individual files and folders that can be enabled by users
Auditing
an encryption technology for individual files and folders that can be enabled by users
Encrypting File System (EFS)
an encryption technology for individual files and folders that can be enabled by users
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match between columns
the security process that records the occurrence of specific operating system events in the Security log
Malware
the security process that records the occurrence of specific operating system events in the Security log
User Account Control (UAC)
the security process that records the occurrence of specific operating system events in the Security log
Windows Defender
the security process that records the occurrence of specific operating system events in the Security log
Secedit
the security process that records the occurrence of specific operating system events in the Security log
Hashing algorithm
the security process that records the occurrence of specific operating system events in the Security log
BitLocker Drive Encryption
the security process that records the occurrence of specific operating system events in the Security log
Auditing
the security process that records the occurrence of specific operating system events in the Security log
Encrypting File System (EFS)
the security process that records the occurrence of specific operating system events in the Security log
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Match between columns
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Malware
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
User Account Control (UAC)
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Windows Defender
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Secedit
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Hashing algorithm
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
BitLocker Drive Encryption
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Auditing
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Encrypting File System (EFS)
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Match between columns
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Malware
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
User Account Control (UAC)
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Windows Defender
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Secedit
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Hashing algorithm
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
BitLocker Drive Encryption
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Auditing
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Encrypting File System (EFS)
a one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Match between columns
a command-line tool that is used to apply, export, or analyze security templates
Malware
a command-line tool that is used to apply, export, or analyze security templates
User Account Control (UAC)
a command-line tool that is used to apply, export, or analyze security templates
Windows Defender
a command-line tool that is used to apply, export, or analyze security templates
Secedit
a command-line tool that is used to apply, export, or analyze security templates
Hashing algorithm
a command-line tool that is used to apply, export, or analyze security templates
BitLocker Drive Encryption
a command-line tool that is used to apply, export, or analyze security templates
Auditing
a command-line tool that is used to apply, export, or analyze security templates
Encrypting File System (EFS)
a command-line tool that is used to apply, export, or analyze security templates
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Match between columns
anti-malware software included with Windows 10
Malware
anti-malware software included with Windows 10
User Account Control (UAC)
anti-malware software included with Windows 10
Windows Defender
anti-malware software included with Windows 10
Secedit
anti-malware software included with Windows 10
Hashing algorithm
anti-malware software included with Windows 10
BitLocker Drive Encryption
anti-malware software included with Windows 10
Auditing
anti-malware software included with Windows 10
Encrypting File System (EFS)
anti-malware software included with Windows 10
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Match between columns
a feature in Windows 10 that elevates user privileges only when required
Malware
a feature in Windows 10 that elevates user privileges only when required
User Account Control (UAC)
a feature in Windows 10 that elevates user privileges only when required
Windows Defender
a feature in Windows 10 that elevates user privileges only when required
Secedit
a feature in Windows 10 that elevates user privileges only when required
Hashing algorithm
a feature in Windows 10 that elevates user privileges only when required
BitLocker Drive Encryption
a feature in Windows 10 that elevates user privileges only when required
Auditing
a feature in Windows 10 that elevates user privileges only when required
Encrypting File System (EFS)
a feature in Windows 10 that elevates user privileges only when required
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe the four distinct servicing branches in Windows 10.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Match between columns
malicious software designed to perform unauthorized acts on your computer
Malware
malicious software designed to perform unauthorized acts on your computer
User Account Control (UAC)
malicious software designed to perform unauthorized acts on your computer
Windows Defender
malicious software designed to perform unauthorized acts on your computer
Secedit
malicious software designed to perform unauthorized acts on your computer
Hashing algorithm
malicious software designed to perform unauthorized acts on your computer
BitLocker Drive Encryption
malicious software designed to perform unauthorized acts on your computer
Auditing
malicious software designed to perform unauthorized acts on your computer
Encrypting File System (EFS)
malicious software designed to perform unauthorized acts on your computer
Password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.