32 Questions
Which of the following is NOT a factor contributing to the vulnerability of password-based authentication systems?
Multifactor sign-in
What is the recommended character length for an ordinary user account password?
More than 15 characters
What should users avoid using in their passwords, according to the text?
Personal information
Which of the following is responsible for configuring file permissions in an OS's access control system?
File server administrator
What is the principle that should guide the assignment of rights and privileges to employees?
Least privilege
What should be done with the default administrator account in an OS?
It should be disabled
What is the purpose of disabling the guest account on a computer?
To comply with security policies
Which of the following is an example of personally identifiable information (PII)?
Username
Which of the following is NOT a recommended end user best practice for password security?
Entering passwords into plain text files
What is the purpose of a system/supervisor password?
To protect access to the firmware system-setup program
What are some complexity requirements that password policies might impose?
All of the above
Which of the following scenarios could result in data loss if strong authentication is not in place?
All of the above
What is the role of the user's password in file encryption and decryption?
It protects the encryption key
How can data be decrypted if the user's key is lost or damaged?
By using recovery agents
Which of the following is NOT a type of threat that antivirus software can detect?
Viruses
Which component of Windows manages Windows Defender Antivirus?
Windows Security Center
What are the two types of updates generally necessary for antivirus software?
Definition updates and component updates
How can Windows Defender Antivirus be temporarily disabled?
Toggling the Real-time protection button
Which tool can be used to configure password and account policies on a standalone workstation?
Local Security Policy snap-in
Where can settings be defined as group policy objects (GPO) and applied to groups of user and computer accounts within domains and organizational units (OUs)?
Group Policy Editor snap-in
What does the 'Failed attempts lockout' policy help mitigate?
Password cracking attacks
What does the 'Use timeout/screen lock' policy do?
Automatically logs out users after a certain period of inactivity
Which operating system uses the system of Administrator and Standard user accounts, along with User Account Control (UAC) and system policies, to enforce restrictions?
Windows
What is the purpose of using digital certificates in Windows applications?
To perform code signing
Which type of software distribution model is used by mobile operating systems like Apple's iOS and Windows Mobile?
Walled garden model
What is the primary means of detecting malware in antivirus software?
Using a database of known virus patterns
Which of the following is NOT a type of trigger for configuring rules in the Advanced Firewall?
MAC address
Which of the following best describes the default policy for the Advanced Firewall?
Allow all traffic
Which edition of Windows does NOT support the Encrypting File System (EFS) feature?
Home edition
What does data-at-rest refer to?
Data stored on a disk
What can be used as a secure means of storing the encryption key for BitLocker?
All of the above
What does BitLocker To Go refer to?
A form of BitLocker that can only be used with removable drives
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free