Exam 11: Securing and Maintaining an Operating System
Exam 1: Operating Systems Fundamentals45 Questions
Exam 2: Modern Client and Server Operating Systems45 Questions
Exam 3: The Central Processing Unit CPU45 Questions
Exam 4: File Systems45 Questions
Exam 5: Installing Operating Systems45 Questions
Exam 6: Devices and Device Drivers45 Questions
Exam 7: Using and Configuring Storage Devices46 Questions
Exam 8: Virtualization and Cloud Computing Fundamentals46 Questions
Exam 9: Network Fundamentals and Configuration46 Questions
Exam 10: Account and Resource Management46 Questions
Exam 11: Securing and Maintaining an Operating System46 Questions
Select questions type
What is the name of the built-in firewall on most Linux distributions?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
B
You are setting up a Windows domain network with 40 Windows 10 clients and six servers, including two domain controllers. You are not satisfied with the default Windows Defender Firewall settings on your client computers. Which of the following is an efficient method for making changes to the settings on all your clients?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
C
Which of the following is true of most host firewalls?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
D
Which protocol works by establishing an association between two communicating devices and can use a preshared key for authentication?
(Multiple Choice)
4.7/5
(35)
What type of policy describes the methods involved when a user signs into the network?
(Multiple Choice)
4.9/5
(34)
A user calls the helpdesk and wants to know where she can find the company's policy about virus protection. To which policy should you refer her?
(Multiple Choice)
4.8/5
(38)
Which of the following is NOT a reason to use Windows Server Update Services?
(Multiple Choice)
4.7/5
(40)
A security policy is a set of system configuration rules that are applied by Group Policy.
(True/False)
4.8/5
(29)
Your organization's Windows Server 2019 server has 64 GB of RAM but has been running a little slow, so you decide to check the virtual memory configuration. You find that the paging file is located on the D: drive where you are running an accounting app with a SQL server database. The paging file is being managed by Windows. Windows is installed on the C: drive and the E: drive is where archived documents are stored. All three volumes are on separate SSD drives and have at least 300 GB of free space. Is there anything you can do to configure the paging file for optimal performance?
(Multiple Choice)
4.9/5
(37)
Which of the following authentication protocols uses certificates for authentication?
(Multiple Choice)
4.9/5
(32)
An incremental backup backs up any files that have changed since the last full or incremental backup.
(True/False)
4.9/5
(29)
The only way to empty the Windows Recycle Bin is by using the Disk Cleanup Tool.
(True/False)
4.7/5
(37)
If the minimum password length on a Windows system is set to zero, what does that mean?
(Multiple Choice)
4.8/5
(27)
What should an administrator do before installing OS security updates on production servers, if possible?
(Multiple Choice)
4.8/5
(32)
You are configuring the host firewall on a Linux system and want to make sure that the packets sent by the ping program are not processed by the system. Which command should you use?
(Multiple Choice)
4.9/5
(34)
Why do Windows server administrators often change the default update settings on servers?
(Multiple Choice)
4.7/5
(37)
You are describing how Kerberos works to your colleagues and you explain how authentication occurs between a client and a server or between two servers and both parties are identified. What is this type of authentication called?
(Multiple Choice)
4.8/5
(39)
Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file?
(Multiple Choice)
4.9/5
(24)
Showing 1 - 20 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)