Deck 11: Securing and Maintaining an Operating System
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
Play
Full screen (f)
Deck 11: Securing and Maintaining an Operating System
1
A user is entering a building that has an electronic locking system. The user starts an app on their phone and touches it to the lock console and then enters a pin to gain entry. Which credential categories did the user use, and in what order were they used to gain entry?
A) knowledge, inherence
B) possession, knowledge
C) possession, inherence
D) inherence, knowledge
A) knowledge, inherence
B) possession, knowledge
C) possession, inherence
D) inherence, knowledge
B
2
Which of the following commands should you use to delete files on a Linux system?
A) mv
B) rm
C) del
D) erase
A) mv
B) rm
C) del
D) erase
B
3
Which of the following is NOT a facet of securing data on a computer?
A) authentication and authorization
B) data compression
C) encryption
D) malware protection
A) authentication and authorization
B) data compression
C) encryption
D) malware protection
B
4
An incremental backup backs up any files that have changed since the last full or incremental backup.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
Which command should you use on a Linux system to find and print a list of files that begin with acctg that have been modified in the last 10 days?
A) find -name acctg* -mtime -10 -print
B) search -name acctg* -mod 10 -print
C) find -name *acctg -mod 10 -print
D) search -name *acctg -mtime 10 -print
A) find -name acctg* -mtime -10 -print
B) search -name acctg* -mod 10 -print
C) find -name *acctg -mod 10 -print
D) search -name *acctg -mtime 10 -print
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT a guideline of a security policy?
A) easy for users to understand
B) should be enforceable
C) uses legal terminology to protect the organization
D) clearly states the policy objectives
A) easy for users to understand
B) should be enforceable
C) uses legal terminology to protect the organization
D) clearly states the policy objectives
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
You are describing how Kerberos works to your colleagues and you explain how authentication occurs between a client and a server or between two servers and both parties are identified. What is this type of authentication called?
A) multifactor authentication
B) RADIUS authentication
C) mutual authentication
D) extensible authentication
A) multifactor authentication
B) RADIUS authentication
C) mutual authentication
D) extensible authentication
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
A host firewall creates a barrier between networks so potentially harmful packets can't enter or leave the networks that are being protected.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
A security policy is a set of system configuration rules that are applied by Group Policy.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
What type of policy describes the methods involved when a user signs into the network?
A) audit
B) privacy
C) authentication
D) acceptable use
A) audit
B) privacy
C) authentication
D) acceptable use
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
When it comes to server security, which of the following is true?
A) As long as the data is encrypted, it is safe.
B) Server rooms should be easy to access by all employees in an emergency.
C) Multifactor authentication for server rooms are recommended.
D) Servers should always be stored off-site where no users are located.
A) As long as the data is encrypted, it is safe.
B) Server rooms should be easy to access by all employees in an emergency.
C) Multifactor authentication for server rooms are recommended.
D) Servers should always be stored off-site where no users are located.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
Where is virtual memory located on a Linux system?
A) pagefile.sys
B) lower portion of RAM
C) swap file system
D) upper portion of RAM
A) pagefile.sys
B) lower portion of RAM
C) swap file system
D) upper portion of RAM
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
Encryption makes data unusable to anyone except authorized users.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
Which protocol works by establishing an association between two communicating devices and can use a preshared key for authentication?
A) EFS
B) Kerberos
C) IPsec
D) SMB
A) EFS
B) Kerberos
C) IPsec
D) SMB
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
A user calls the helpdesk and wants to know where she can find the company's policy about virus protection. To which policy should you refer her?
A) privacy policy
B) authentication policy
C) Internet use policy
D) data protection policy
A) privacy policy
B) authentication policy
C) Internet use policy
D) data protection policy
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
The only way to empty the Windows Recycle Bin is by using the Disk Cleanup Tool.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a credential category for multifactor authentication?
A) Knowledge
B) Possession
C) Disposition
D) Inherence
A) Knowledge
B) Possession
C) Disposition
D) Inherence
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
You are configuring a network in which remote access clients will access the network using different entry points such as through Wifi and VPN. You need a convenient authentication system to handle this. Which of the following is a good choice?
A) MS-CHAP
B) Kerberos
C) PAP
D) RADIUS
A) MS-CHAP
B) Kerberos
C) PAP
D) RADIUS
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file?
A) IPsec
B) BitLocker
C) VPN
D) EFS
A) IPsec
B) BitLocker
C) VPN
D) EFS
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following authentication protocols uses certificates for authentication?
A) Kerberos
B) EAP-TLS
C) PAP
D) MS-CHAP v2
A) Kerberos
B) EAP-TLS
C) PAP
D) MS-CHAP v2
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
What command-line utility can you use in Linux to monitor paging?
A) pagemon
B) nbtstat
C) vmstat
D) ifstat
A) pagemon
B) nbtstat
C) vmstat
D) ifstat
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is true about Windows Defender Firewall?
A) If a computer detects that it is on a domain, the domain profile is automatically applied.
B) The protocols that Microsoft deems necessary for Windows functionality cannot be disallowed.
C) When the computer boots and detects a new network, Windows selects the public or private profile based on the types of packets it detects.
D) Windows Defender must be enabled after installing Windows and each rule configured manually.
A) If a computer detects that it is on a domain, the domain profile is automatically applied.
B) The protocols that Microsoft deems necessary for Windows functionality cannot be disallowed.
C) When the computer boots and detects a new network, Windows selects the public or private profile based on the types of packets it detects.
D) Windows Defender must be enabled after installing Windows and each rule configured manually.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
What firewall rule in Windows Defender with Advanced Security should you configure to block the connection if you don't want the computer to receive ping packets initiated by another computer?
A) Echo Reply - ICMPv4-Out
B) Echo Request - ICMPv4-Out
C) Echo Reply - ICMPv4-In
D) Echo Request - ICMPv4-In
A) Echo Reply - ICMPv4-Out
B) Echo Request - ICMPv4-Out
C) Echo Reply - ICMPv4-In
D) Echo Request - ICMPv4-In
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?
A) you are using a dual core processor
B) the paging file is on the boot disk
C) your RAM is less than 4 GB
D) storing the paging file on an SSD
A) you are using a dual core processor
B) the paging file is on the boot disk
C) your RAM is less than 4 GB
D) storing the paging file on an SSD
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
You are testing a new client server application and the application doesn't appear to be communicating successfully between the client and server. All network configuration settings have been verified but since the application is new, you are unsure of all the protocols that are used. What is a good first step in troubleshooting the problem?
A) configure the firewall to use a different profile
B) disable the firewall
C) uninstall and reinstall the application
D) reset the switch and router
A) configure the firewall to use a different profile
B) disable the firewall
C) uninstall and reinstall the application
D) reset the switch and router
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
If the minimum password length on a Windows system is set to zero, what does that mean?
A) The user never has to change the password.
B) The user can use a blank password.
C) The user has to change the password every day.
D) The user account is disabled.
A) The user never has to change the password.
B) The user can use a blank password.
C) The user has to change the password every day.
D) The user account is disabled.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is true of most host firewalls?
A) They are not useful for stopping inside threats.
B) All incoming traffic is allowed while outgoing traffic is disallowed.
C) All incoming traffic is disallowed by default.
D) They allow all outgoing traffic by default.
A) They are not useful for stopping inside threats.
B) All incoming traffic is allowed while outgoing traffic is disallowed.
C) All incoming traffic is disallowed by default.
D) They allow all outgoing traffic by default.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
What is the name of the built-in firewall on most Linux distributions?
A) Linux Defender
B) netfilter
C) iptables
D) Security and Privacy
A) Linux Defender
B) netfilter
C) iptables
D) Security and Privacy
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
Which backup type backs up the disk sector by sector?
A) file-by-file backup
B) mirror backup
C) image backup
D) differential backup
A) file-by-file backup
B) mirror backup
C) image backup
D) differential backup
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is true about OS security?
A) Security flaws discovered by white hats are used to get ransom from vendors.
B) Black hats are paid by OS vendors to test for vulnerabilities.
C) Security flaws discovered by white hats are reported to the OS vendor.
D) Security updates should only be installed if an OS is under attack.
A) Security flaws discovered by white hats are used to get ransom from vendors.
B) Black hats are paid by OS vendors to test for vulnerabilities.
C) Security flaws discovered by white hats are reported to the OS vendor.
D) Security updates should only be installed if an OS is under attack.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
You need to configure two servers to use IPsec for secure communication. You will use an authentication method that involves a public entity. What type of authentication will you use?
A) Kerberos
B) digital certificates
C) preshared key
D) multifactor
A) Kerberos
B) digital certificates
C) preshared key
D) multifactor
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is a true statement about rotating backup media?
A) it can protect against media failure
B) you should never have more than one full set of media
C) media rotation is only necessary with tape drives
D) media rotation only happens with hard drives since the platters rotate
A) it can protect against media failure
B) you should never have more than one full set of media
C) media rotation is only necessary with tape drives
D) media rotation only happens with hard drives since the platters rotate
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
Which BitLocker mode requires the computer to have TPM support?
A) transparent mode
B) USB key mode
C) user authentication mode
D) EFS mode
A) transparent mode
B) USB key mode
C) user authentication mode
D) EFS mode
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
You have installed an application on a Linux computer that receives connection-oriented Transport layer segments on port 444 and sends datagrams on port 555. Which two commands should you use to configure the firewall?
A) iptables -A INPUT -p udp -dport 444 -j ACCEPT and iptables -A OUTPUT -p icmp -dport 555 -j ACCEPT
B) iptables -A INPUT -p tcp -dport 444 -j ACCEPT and iptables -A OUTPUT -p udp -dport 555 -j ACCEPT
C) iptables -A OUTPUT -p udp -dport 444 -j ACCEPT and iptables -A INPUT -p tcp -dport 555 -j ACCEPT
D) iptables -A OUTPUT -p tcp -dport 444 -j ACCEPT and iptables -A INPUT -p tcp -dport 555 -j ACCEPT
A) iptables -A INPUT -p udp -dport 444 -j ACCEPT and iptables -A OUTPUT -p icmp -dport 555 -j ACCEPT
B) iptables -A INPUT -p tcp -dport 444 -j ACCEPT and iptables -A OUTPUT -p udp -dport 555 -j ACCEPT
C) iptables -A OUTPUT -p udp -dport 444 -j ACCEPT and iptables -A INPUT -p tcp -dport 555 -j ACCEPT
D) iptables -A OUTPUT -p tcp -dport 444 -j ACCEPT and iptables -A INPUT -p tcp -dport 555 -j ACCEPT
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is a partial backup that backs up files that have changed since the last full or incremental backup?
A) differential
B) sequential
C) incremental
D) binary
A) differential
B) sequential
C) incremental
D) binary
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
You are setting up a Windows domain network with 40 Windows 10 clients and six servers, including two domain controllers. You are not satisfied with the default Windows Defender Firewall settings on your client computers. Which of the following is an efficient method for making changes to the settings on all your clients?
A) Temporarily hire technicians to configure the clients.
B) Send a memo to users about how to configure the firewall.
C) Use Group Policy to configure the firewall settings.
D) Export the correct settings from one computer and import them on all other clients.
A) Temporarily hire technicians to configure the clients.
B) Send a memo to users about how to configure the firewall.
C) Use Group Policy to configure the firewall settings.
D) Export the correct settings from one computer and import them on all other clients.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is true about a host firewall?
A) Its primary use is against threats from outside the network.
B) For incoming packets, the destination is usually a network service like file sharing or DNS.
C) It should never be configured to allow packets transmitted by ping.
D) You need to download and install a host firewall on most modern OSs.
A) Its primary use is against threats from outside the network.
B) For incoming packets, the destination is usually a network service like file sharing or DNS.
C) It should never be configured to allow packets transmitted by ping.
D) You need to download and install a host firewall on most modern OSs.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is NOT a network category for determining the Windows Defender Firewall profile applied?
A) domain
B) private
C) public
D) host only
A) domain
B) private
C) public
D) host only
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
You have shared a folder on a Windows server and set permissions. What do you need to do next to ensure users can access the share.
A) Nothing, the share can be accessed.
B) Configure the host firewall rules to allow SMB.
C) Configure the host firewall rules to allow ping packets.
D) Configure the host firewall rules to allow file and printer sharing.
A) Nothing, the share can be accessed.
B) Configure the host firewall rules to allow SMB.
C) Configure the host firewall rules to allow ping packets.
D) Configure the host firewall rules to allow file and printer sharing.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
You are configuring the host firewall on a Linux system and want to make sure that the packets sent by the ping program are not processed by the system. Which command should you use?
A) netfilter -A INPUT -p icmp -j DROP
B) iptables -A INPUT --dport icmp -j DROP
C) netfilter -A INPUT --dport icmp -j DROP
D) iptables -A INPUT -p icmp -j DROP
A) netfilter -A INPUT -p icmp -j DROP
B) iptables -A INPUT --dport icmp -j DROP
C) netfilter -A INPUT --dport icmp -j DROP
D) iptables -A INPUT -p icmp -j DROP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
Why do Windows server administrators often change the default update settings on servers?
A) To ensure updates are delayed for at least a month after being issued.
B) To prevent unexpected server restarts for updates that require it.
C) So they can inform client users of the details of each update.
D) To make sure the least critical updates are installed first.
A) To ensure updates are delayed for at least a month after being issued.
B) To prevent unexpected server restarts for updates that require it.
C) So they can inform client users of the details of each update.
D) To make sure the least critical updates are installed first.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
You have been experiencing disk space shortages on your Windows 10 computer periodically and you have had to manually find and delete old temporary and downloaded files. You want this task to occur automatically. What is the fastest approach to meet this requirement?
A) Write a batch file.
B) Enable Storage Sense.
C) Configure Storage Spaces.
D) Buy a program.
A) Write a batch file.
B) Enable Storage Sense.
C) Configure Storage Spaces.
D) Buy a program.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is NOT a reason to use Windows Server Update Services?
A) You have centralized control over product updates.
B) Only approved updates are installed.
C) Internet bandwidth usage is reduced.
D) Updates are automatically tested.
A) You have centralized control over product updates.
B) Only approved updates are installed.
C) Internet bandwidth usage is reduced.
D) Updates are automatically tested.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
What should an administrator do before installing OS security updates on production servers, if possible?
A) Test them in a test environment.
B) Debug them using Task Manager.
C) Call the update vendor to verify compatibility.
D) Have a white hat test the updates for vulnerabilities.
A) Test them in a test environment.
B) Debug them using Task Manager.
C) Call the update vendor to verify compatibility.
D) Have a white hat test the updates for vulnerabilities.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
Your organization's Windows Server 2019 server has 64 GB of RAM but has been running a little slow, so you decide to check the virtual memory configuration. You find that the paging file is located on the D: drive where you are running an accounting app with a SQL server database. The paging file is being managed by Windows. Windows is installed on the C: drive and the E: drive is where archived documents are stored. All three volumes are on separate SSD drives and have at least 300 GB of free space. Is there anything you can do to configure the paging file for optimal performance?
A) Manually increase the paging file size.
B) Delete the paging file.
C) Move the paging file to the E: drive.
D) Manually decrease the paging file size.
A) Manually increase the paging file size.
B) Delete the paging file.
C) Move the paging file to the E: drive.
D) Manually decrease the paging file size.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
What is the name of the Windows Server service that helps manage updates for all Windows computers in the network?
A) RPM
B) RIS
C) WSUS
D) RDP
A) RPM
B) RIS
C) WSUS
D) RDP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck