Deck 6: Windows 10 Security Features
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 6: Windows 10 Security Features
1
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?
A)domain
B)group
C)account lockout
D)password
A)domain
B)group
C)account lockout
D)password
C
2
Which policy controls password characteristics for local user accounts?
A)account lockout
B)password
C)domain
D)user control
A)account lockout
B)password
C)domain
D)user control
B
3
Newer Windows applications use which of the following to describe the structure of an application?
A)manifest
B)log
C)record
D)hash
A)manifest
B)log
C)record
D)hash
A
4
Account policies settings are located in which of the following?
A)NAP
B)local security policy
C)EFS security policy
D)remote policy
A)NAP
B)local security policy
C)EFS security policy
D)remote policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The Account Policies in the Local Security Policy can be used to control domain accounts.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following can be used to define which programs are allowed or disallowed in the system?
A)Software restriction policies
B)A network zone
C)Local policies
D)AppLocker
A)Software restriction policies
B)A network zone
C)Local policies
D)AppLocker
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
NTFS permissions can be easily circumvented when you have physical access to a computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?
A)NAP
B)Dual Locked Hard Drive
C)BitLocker Drive Encryption
D)TPM
A)NAP
B)Dual Locked Hard Drive
C)BitLocker Drive Encryption
D)TPM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which security process records the occurrence of specific operating system events in the Security log?
A)Encrypting
B)Hashing
C)Filtering
D)Auditing
A)Encrypting
B)Hashing
C)Filtering
D)Auditing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?
A)object access
B)account management
C)privilege use
D)process tracking
A)object access
B)account management
C)privilege use
D)process tracking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
In Windows 10, advanced audit policies can only be edited at a command-line.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Every object in Windows 10 has audit events related to it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which rule condition identifies software by file location?
A)publisher
B)path
C)file hash
D)certificate
A)publisher
B)path
C)file hash
D)certificate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The most common use for AppLocker is malware prevention.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?
A)Adware
B)Worm
C)Spyware
D)Virus
A)Adware
B)Worm
C)Spyware
D)Virus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?
A)Administrative Privileges Toolkit
B)Private Toolkit
C)Secure Toolkit
D)Application Compatibility Toolkit
A)Administrative Privileges Toolkit
B)Private Toolkit
C)Secure Toolkit
D)Application Compatibility Toolkit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What is the default value for the "Maximum password age" setting in the Password Policy?
A)0 days
B)30 days
C)42 days
D)45 days
A)0 days
B)30 days
C)42 days
D)45 days
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The local security policy is part of a larger Windows management system known as which of the following?
A)Group Policy
B)Local Policy
C)Network Policy
D)Domain Policy
A)Group Policy
B)Local Policy
C)Network Policy
D)Domain Policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is a threat to privacy and is sometimes installed when you visit a website?
A)Windows Defender
B)EFS
C)Macro script
D)Spyware
A)Windows Defender
B)EFS
C)Macro script
D)Spyware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is considered one of the biggest sources of malware (malicious software)?
A)the Internet
B)a cloud library
C)a hard disk
D)a router
A)the Internet
B)a cloud library
C)a hard disk
D)a router
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What type of encryption algorithm uses the same key to encrypt data and decrypt data?
A)asymmetric
B)symmetric
C)signing
D)hash
A)asymmetric
B)symmetric
C)signing
D)hash
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What are the categories of local security policy settings?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
____________________ is a method for protecting data on removable storage such as USB drives.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What are some of the settings available in the user rights assignment?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
What are some of the settings available in the security options of the local policy?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The Account Policies category contains the ____________________ policy and the account lockout policy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Which part of the motherboard in your computer is used to store encryption keys and certificates?
A)NTFS
B)TPM
C)EFS
D)NAP
A)NTFS
B)TPM
C)EFS
D)NAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
In Windows Defender, you can view the history of items that were deleted. Describe the three options for viewing the history.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Advanced auditing is enabled through the local security policy, by using Group Policy, or by using ____________________ .
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Briefly describe the rule collections used by AppLocker.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What type of encryption algorithm uses two keys to encrypt and decrypt data?
A)signing
B)symmetric
C)asymmetric
D)hash
A)signing
B)symmetric
C)asymmetric
D)hash
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What are the settings available to control account lockouts?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Which type of permissions are considered the most basic level of data security in Windows 10?
A)EFS
B)NTFS
C)FAT
D)NAP
A)EFS
B)NTFS
C)FAT
D)NAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
In Windows 10, ____________________ provides both antivirus and antispyware capabilities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
What are the tasks you can perform with the Security Configuration and Analysis tool?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The process of taking data and making it unreadable is known as which of the following?
A)Encryption
B)Decryption
C)Signing
D)Verifying
A)Encryption
B)Decryption
C)Signing
D)Verifying
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
What are some ways EFS keys may be lost?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
A)signing
B)symmetric
C)asymmetric
D)hash
A)signing
B)symmetric
C)asymmetric
D)hash
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What are the most common reasons that the BitLocker Drive Encryption recovery password is required?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe the four distinct servicing branches in Windows 10.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck