Port Security Rule Actions

BriskWhite avatar
BriskWhite
·
·
Download

Start Quiz

32 Questions

Which of the following is NOT a factor contributing to the vulnerability of password-based authentication systems?

Multifactor sign-in

What is the recommended character length for an ordinary user account password?

More than 15 characters

What should users avoid using in their passwords, according to the text?

Personal information

Which of the following is responsible for configuring file permissions in an OS's access control system?

File server administrator

What is the principle that should guide the assignment of rights and privileges to employees?

Least privilege

What should be done with the default administrator account in an OS?

It should be disabled

What is the purpose of disabling the guest account on a computer?

To comply with security policies

Which of the following is an example of personally identifiable information (PII)?

Username

Which of the following is NOT a recommended end user best practice for password security?

Entering passwords into plain text files

What is the purpose of a system/supervisor password?

To protect access to the firmware system-setup program

What are some complexity requirements that password policies might impose?

All of the above

Which of the following scenarios could result in data loss if strong authentication is not in place?

All of the above

What is the role of the user's password in file encryption and decryption?

It protects the encryption key

How can data be decrypted if the user's key is lost or damaged?

By using recovery agents

Which of the following is NOT a type of threat that antivirus software can detect?

Viruses

Which component of Windows manages Windows Defender Antivirus?

Windows Security Center

What are the two types of updates generally necessary for antivirus software?

Definition updates and component updates

How can Windows Defender Antivirus be temporarily disabled?

Toggling the Real-time protection button

Which tool can be used to configure password and account policies on a standalone workstation?

Local Security Policy snap-in

Where can settings be defined as group policy objects (GPO) and applied to groups of user and computer accounts within domains and organizational units (OUs)?

Group Policy Editor snap-in

What does the 'Failed attempts lockout' policy help mitigate?

Password cracking attacks

What does the 'Use timeout/screen lock' policy do?

Automatically logs out users after a certain period of inactivity

Which operating system uses the system of Administrator and Standard user accounts, along with User Account Control (UAC) and system policies, to enforce restrictions?

Windows

What is the purpose of using digital certificates in Windows applications?

To perform code signing

Which type of software distribution model is used by mobile operating systems like Apple's iOS and Windows Mobile?

Walled garden model

What is the primary means of detecting malware in antivirus software?

Using a database of known virus patterns

Which of the following is NOT a type of trigger for configuring rules in the Advanced Firewall?

MAC address

Which of the following best describes the default policy for the Advanced Firewall?

Allow all traffic

Which edition of Windows does NOT support the Encrypting File System (EFS) feature?

Home edition

What does data-at-rest refer to?

Data stored on a disk

What can be used as a secure means of storing the encryption key for BitLocker?

All of the above

What does BitLocker To Go refer to?

A form of BitLocker that can only be used with removable drives

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser