Podcast
Questions and Answers
Which of the following is NOT a factor contributing to the vulnerability of password-based authentication systems?
Which of the following is NOT a factor contributing to the vulnerability of password-based authentication systems?
What is the recommended character length for an ordinary user account password?
What is the recommended character length for an ordinary user account password?
What should users avoid using in their passwords, according to the text?
What should users avoid using in their passwords, according to the text?
Which of the following is responsible for configuring file permissions in an OS's access control system?
Which of the following is responsible for configuring file permissions in an OS's access control system?
Signup and view all the answers
What is the principle that should guide the assignment of rights and privileges to employees?
What is the principle that should guide the assignment of rights and privileges to employees?
Signup and view all the answers
What should be done with the default administrator account in an OS?
What should be done with the default administrator account in an OS?
Signup and view all the answers
What is the purpose of disabling the guest account on a computer?
What is the purpose of disabling the guest account on a computer?
Signup and view all the answers
Which of the following is an example of personally identifiable information (PII)?
Which of the following is an example of personally identifiable information (PII)?
Signup and view all the answers
Which of the following is NOT a recommended end user best practice for password security?
Which of the following is NOT a recommended end user best practice for password security?
Signup and view all the answers
What is the purpose of a system/supervisor password?
What is the purpose of a system/supervisor password?
Signup and view all the answers
What are some complexity requirements that password policies might impose?
What are some complexity requirements that password policies might impose?
Signup and view all the answers
Which of the following scenarios could result in data loss if strong authentication is not in place?
Which of the following scenarios could result in data loss if strong authentication is not in place?
Signup and view all the answers
What is the role of the user's password in file encryption and decryption?
What is the role of the user's password in file encryption and decryption?
Signup and view all the answers
How can data be decrypted if the user's key is lost or damaged?
How can data be decrypted if the user's key is lost or damaged?
Signup and view all the answers
Which of the following is NOT a type of threat that antivirus software can detect?
Which of the following is NOT a type of threat that antivirus software can detect?
Signup and view all the answers
Which component of Windows manages Windows Defender Antivirus?
Which component of Windows manages Windows Defender Antivirus?
Signup and view all the answers
What are the two types of updates generally necessary for antivirus software?
What are the two types of updates generally necessary for antivirus software?
Signup and view all the answers
How can Windows Defender Antivirus be temporarily disabled?
How can Windows Defender Antivirus be temporarily disabled?
Signup and view all the answers
Which tool can be used to configure password and account policies on a standalone workstation?
Which tool can be used to configure password and account policies on a standalone workstation?
Signup and view all the answers
Where can settings be defined as group policy objects (GPO) and applied to groups of user and computer accounts within domains and organizational units (OUs)?
Where can settings be defined as group policy objects (GPO) and applied to groups of user and computer accounts within domains and organizational units (OUs)?
Signup and view all the answers
What does the 'Failed attempts lockout' policy help mitigate?
What does the 'Failed attempts lockout' policy help mitigate?
Signup and view all the answers
What does the 'Use timeout/screen lock' policy do?
What does the 'Use timeout/screen lock' policy do?
Signup and view all the answers
Which operating system uses the system of Administrator and Standard user accounts, along with User Account Control (UAC) and system policies, to enforce restrictions?
Which operating system uses the system of Administrator and Standard user accounts, along with User Account Control (UAC) and system policies, to enforce restrictions?
Signup and view all the answers
What is the purpose of using digital certificates in Windows applications?
What is the purpose of using digital certificates in Windows applications?
Signup and view all the answers
Which type of software distribution model is used by mobile operating systems like Apple's iOS and Windows Mobile?
Which type of software distribution model is used by mobile operating systems like Apple's iOS and Windows Mobile?
Signup and view all the answers
What is the primary means of detecting malware in antivirus software?
What is the primary means of detecting malware in antivirus software?
Signup and view all the answers
Which of the following is NOT a type of trigger for configuring rules in the Advanced Firewall?
Which of the following is NOT a type of trigger for configuring rules in the Advanced Firewall?
Signup and view all the answers
Which of the following best describes the default policy for the Advanced Firewall?
Which of the following best describes the default policy for the Advanced Firewall?
Signup and view all the answers
Which edition of Windows does NOT support the Encrypting File System (EFS) feature?
Which edition of Windows does NOT support the Encrypting File System (EFS) feature?
Signup and view all the answers
What does data-at-rest refer to?
What does data-at-rest refer to?
Signup and view all the answers
What can be used as a secure means of storing the encryption key for BitLocker?
What can be used as a secure means of storing the encryption key for BitLocker?
Signup and view all the answers
What does BitLocker To Go refer to?
What does BitLocker To Go refer to?
Signup and view all the answers