Deck 7: Securing and Sharing Windows Resources

Full screen (f)
exit full mode
Question
An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group.  
What is the purpose of the Power Users group in Windows 7 and later?

A) Allows members to take ownership of files and folders.
B) Members have limited privileges and are given a temporary profile.
C) Provides a method for assigning rights to Guests who require Administrator access.
D) Backward compatibility for legacy operating systems and applications.
Use Space or
up arrow
down arrow
to flip the card.
Question
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.  
Which of the following is the most likely reason the technician is having difficulties?

A) The users in the sales department are in a different domain than the accounting department users.
B) The technician should be using Local Security Policy instead of Group Policy.
C) The technician is not signed in as a Domain Admin.
D) The technician should be setting NTFS permissions instead of using Group Policy.
Question
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

A) Disable AutoPlay.
B) Disable AutoRun.
C) Disable the Guest account
D) Enable screen lock.
Question
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled.  
What is the most likely reason the encryption option is disabled?

A) The user account is not a member of the Administrators group.
B) The NTFS file system is corrupt.
C) Windows Home editions do not support EFS.
D) A volume formatted with NTFS does not support EFS.
Question
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change.  
Which of the following steps should the technician take to make this change?

A) Click the Sharing tab and click Advanced Sharing.
B) Click the Administrator user name and click the Edit button.
C) Click the Advanced button to open Advanced Security Settings for the file.
D) Click the Previous Versions tab, highlight the file, and click Restore.
Question
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.  
Which of the following tabs will you suggest to the coworker?

A) Security tab
B) Privacy tab
C) General tab
D) Programs tab
Question
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.  
What is best practice for the remaining unused account?

A) Leave the account active since it will be unused for only two weeks.
B) Delete the account and re-create it when the employee is ready to use it.
C) Remove the account membership to all groups.
D) Disable the account until the employee is ready to use it.
Question
While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.  
Which of the following best describes this situation?

A) The user bypassed the security of the file server.
B) The principle of least privilege was not followed.
C) The firewall on the server is disabled.
D) The firewall on the user's computer is disabled.
Question
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.  
How can the settings be configured with the least effort by the admin?

A) Configure Local Group Policy on each workstation to run a logon script.
B) Configure Group Policy to run a logon script.
C) Configure user account properties for each domain user in Active Directory to run a logon script.
D) Configure folder redirection in Group Policy.
Question
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

A) TPM
B) NIC
C) EFS
D) MFA
Question
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable.  
What term best describes this method of printer connectivity?

A) Network printer
B) Shared printer
C) Network drive mapping
D) Administrative share
Question
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes.  
What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

A) The Lock Screen timeout of 60 minutes is not within the allowable range.
B) The technician should run the gpupdate /f command on the local computer.
C) The Lock Screen timeout setting needs to be made in the AD OU GPO.
D) The Lock Screen timeout policy does not apply to Windows 10.
Question
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.  
Which of the following describes the most likely reason for the lost data files?

A) The technician erased all the data files while resetting the password.
B) The user attempted to enter an incorrect password too many times.
C) The user had previously encrypted her data files and folders using EFS.
D) The user lost access to the network shared drive when her password was reset.
Question
Which of the following best meets the requirements of a strong password?

A) t*M&2.zY7
B) qwerty1234567890
C) p@ssw0rd
D) johndoe123
Question
A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32.  
What happens to the permissions of the file on the D:\ drive when copied?

A) The file cannot be copied from NTFS to FAT32.
B) The file will retain its permissions.
C) The file will inherit the permissions of the destination.
D) The file will lose all permissions.
Question
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.  
Which of the following steps can be taken to limit access to the computers?

A) Configure logon time restrictions.
B) Set the BIOS to automatically power off the computers at closing time.
C) Disable Microsoft account resources.
D) Change the user account passwords.
Question
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.  
Which of the following is the first step in implementing this data share?

A) Create a system restore point on the server and all sales computers.
B) Map a network drive to the shared folder or volume on the file server on the sales computers.
C) Run a system image backup of the file server, including all data folders.
D) Share the folder or volume on the file server that will store the shared data files.
Question
You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system.  
Which solution will you implement?

A) BitLocker To Go
B) BitLocker
C) Encrypting File System
D) VPN using IPSec
Question
Your computer has a single HDD formatted with NTFS with the following data folders:  
C:\Documents
C:\Pictures
 
You create a new child folder under the C:\Documents folder.
 
What term describes the permissions the new folder automatically attains from the C:\Documents folder?

A) Inherited permissions
B) Explicit permissions
C) Allow permissions
D) Deny permissions
Question
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user.  
How can you best solve this issue without losing data in the folder?

A) Take ownership of the folder and then change permissions.
B) Disable permission inheritance and explicitly assign the new permissions.
C) Enable permission inheritance so the new permissions are inherited from the parent folder.
D) Delete the folder and re-create it. Then assign the new permissions.
Question
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices.  
Which of the following steps should be taken to eliminate these trouble tickets?

A) Disconnect the USB ports from the motherboard.
B) Enable the supervisor password in the BIOS/UEFI setup.
C) Require all employees to use a unique Windows user account and password.
D) Install a lock on the computer case to prevent removal of the covers.
Question
Which of the following user accounts are created automatically and disabled by default when Windows is installed? (Select TWO.)

A) Standard
B) Guest
C) Limited
D) Admin
E) Administrator
Question
You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords.  
Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

A) Disable password complexity requirement.
B) Disable required passwords.
C) Lengthen the time period between forced password changes.
D) Increase password length requirement.
Question
Which of the following security settings can best help minimize brute force attacks on local user account passwords?

A) Logon time restrictions
B) Screen lock timeout
C) Audit logon failures
D) Account lockout threshold
Question
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability.  
Which of the following should be included in securing the user accounts? (Select THREE.)

A) Require user account passwords.
B) Require strong passwords.
C) Change each account type to Administrator.
D) Add each user to the Guests group.
E) Set failed logon restrictions.
F) Disable password complexity requirements.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Securing and Sharing Windows Resources
1
An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group.  
What is the purpose of the Power Users group in Windows 7 and later?

A) Allows members to take ownership of files and folders.
B) Members have limited privileges and are given a temporary profile.
C) Provides a method for assigning rights to Guests who require Administrator access.
D) Backward compatibility for legacy operating systems and applications.
D
2
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.  
Which of the following is the most likely reason the technician is having difficulties?

A) The users in the sales department are in a different domain than the accounting department users.
B) The technician should be using Local Security Policy instead of Group Policy.
C) The technician is not signed in as a Domain Admin.
D) The technician should be setting NTFS permissions instead of using Group Policy.
D
3
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

A) Disable AutoPlay.
B) Disable AutoRun.
C) Disable the Guest account
D) Enable screen lock.
B
4
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled.  
What is the most likely reason the encryption option is disabled?

A) The user account is not a member of the Administrators group.
B) The NTFS file system is corrupt.
C) Windows Home editions do not support EFS.
D) A volume formatted with NTFS does not support EFS.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change.  
Which of the following steps should the technician take to make this change?

A) Click the Sharing tab and click Advanced Sharing.
B) Click the Administrator user name and click the Edit button.
C) Click the Advanced button to open Advanced Security Settings for the file.
D) Click the Previous Versions tab, highlight the file, and click Restore.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.  
Which of the following tabs will you suggest to the coworker?

A) Security tab
B) Privacy tab
C) General tab
D) Programs tab
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.  
What is best practice for the remaining unused account?

A) Leave the account active since it will be unused for only two weeks.
B) Delete the account and re-create it when the employee is ready to use it.
C) Remove the account membership to all groups.
D) Disable the account until the employee is ready to use it.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.  
Which of the following best describes this situation?

A) The user bypassed the security of the file server.
B) The principle of least privilege was not followed.
C) The firewall on the server is disabled.
D) The firewall on the user's computer is disabled.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.  
How can the settings be configured with the least effort by the admin?

A) Configure Local Group Policy on each workstation to run a logon script.
B) Configure Group Policy to run a logon script.
C) Configure user account properties for each domain user in Active Directory to run a logon script.
D) Configure folder redirection in Group Policy.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

A) TPM
B) NIC
C) EFS
D) MFA
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable.  
What term best describes this method of printer connectivity?

A) Network printer
B) Shared printer
C) Network drive mapping
D) Administrative share
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes.  
What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

A) The Lock Screen timeout of 60 minutes is not within the allowable range.
B) The technician should run the gpupdate /f command on the local computer.
C) The Lock Screen timeout setting needs to be made in the AD OU GPO.
D) The Lock Screen timeout policy does not apply to Windows 10.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.  
Which of the following describes the most likely reason for the lost data files?

A) The technician erased all the data files while resetting the password.
B) The user attempted to enter an incorrect password too many times.
C) The user had previously encrypted her data files and folders using EFS.
D) The user lost access to the network shared drive when her password was reset.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following best meets the requirements of a strong password?

A) t*M&2.zY7
B) qwerty1234567890
C) p@ssw0rd
D) johndoe123
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32.  
What happens to the permissions of the file on the D:\ drive when copied?

A) The file cannot be copied from NTFS to FAT32.
B) The file will retain its permissions.
C) The file will inherit the permissions of the destination.
D) The file will lose all permissions.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.  
Which of the following steps can be taken to limit access to the computers?

A) Configure logon time restrictions.
B) Set the BIOS to automatically power off the computers at closing time.
C) Disable Microsoft account resources.
D) Change the user account passwords.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.  
Which of the following is the first step in implementing this data share?

A) Create a system restore point on the server and all sales computers.
B) Map a network drive to the shared folder or volume on the file server on the sales computers.
C) Run a system image backup of the file server, including all data folders.
D) Share the folder or volume on the file server that will store the shared data files.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system.  
Which solution will you implement?

A) BitLocker To Go
B) BitLocker
C) Encrypting File System
D) VPN using IPSec
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Your computer has a single HDD formatted with NTFS with the following data folders:  
C:\Documents
C:\Pictures
 
You create a new child folder under the C:\Documents folder.
 
What term describes the permissions the new folder automatically attains from the C:\Documents folder?

A) Inherited permissions
B) Explicit permissions
C) Allow permissions
D) Deny permissions
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user.  
How can you best solve this issue without losing data in the folder?

A) Take ownership of the folder and then change permissions.
B) Disable permission inheritance and explicitly assign the new permissions.
C) Enable permission inheritance so the new permissions are inherited from the parent folder.
D) Delete the folder and re-create it. Then assign the new permissions.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices.  
Which of the following steps should be taken to eliminate these trouble tickets?

A) Disconnect the USB ports from the motherboard.
B) Enable the supervisor password in the BIOS/UEFI setup.
C) Require all employees to use a unique Windows user account and password.
D) Install a lock on the computer case to prevent removal of the covers.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following user accounts are created automatically and disabled by default when Windows is installed? (Select TWO.)

A) Standard
B) Guest
C) Limited
D) Admin
E) Administrator
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords.  
Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

A) Disable password complexity requirement.
B) Disable required passwords.
C) Lengthen the time period between forced password changes.
D) Increase password length requirement.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following security settings can best help minimize brute force attacks on local user account passwords?

A) Logon time restrictions
B) Screen lock timeout
C) Audit logon failures
D) Account lockout threshold
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability.  
Which of the following should be included in securing the user accounts? (Select THREE.)

A) Require user account passwords.
B) Require strong passwords.
C) Change each account type to Administrator.
D) Add each user to the Guests group.
E) Set failed logon restrictions.
F) Disable password complexity requirements.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.