Exam 6: Windows 10 Security Features
Exam 1: Introduction to Windows 1050 Questions
Exam 2: Installing Windows 1050 Questions
Exam 3: Using System Utilities50 Questions
Exam 4: Managing Disks and File Systems50 Questions
Exam 5: User Management50 Questions
Exam 6: Windows 10 Security Features50 Questions
Exam 7: Networking50 Questions
Exam 8: User Productivity Tools50 Questions
Exam 9: Application Support50 Questions
Exam 10: Disaster Recovery and Troubleshooting50 Questions
Exam 11: Windows Intune50 Questions
Exam 12: Hyper-V50 Questions
Exam 13: Enterprise Computing50 Questions
Exam 14: Remote Access50 Questions
Select questions type
Which type of permissions are considered the most basic level of data security in Windows 10?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
B
Which rule condition identifies software by file location?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
What are some ways EFS keys may be lost?
Free
(Essay)
5.0/5
(26)
Correct Answer:
If a user loses the EFS key, then an encrypted file is unrecoverable. Some ways EFS keys may be lost:
* The user profile is corrupted.
* The user profile is deleted accidentally.
* The user is deleted from the system.
* The user password is reset.
The Account Policies in the Local Security Policy can be used to control domain accounts.
(True/False)
4.8/5
(31)
Match each item with a statement below.
Premises:
an encryption technology for individual files and folders that can be enabled by users
Responses:
User Account Control (UAC)
Windows Defender
Secedit
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(38)
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?
(Multiple Choice)
4.9/5
(36)
In Windows 10, ____________________ provides both antivirus and antispyware capabilities.
(Short Answer)
4.7/5
(39)
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?
(Multiple Choice)
4.9/5
(37)
What type of encryption algorithm uses the same key to encrypt data and decrypt data?
(Multiple Choice)
4.9/5
(34)
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?
(Multiple Choice)
4.9/5
(38)
Match each item with a statement below.
Premises:
anti-malware software included with Windows 10
Responses:
BitLocker Drive Encryption
Encrypting File System (EFS)
Secedit
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(41)
Which security process records the occurrence of specific operating system events in the Security log?
(Multiple Choice)
4.8/5
(39)
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
(Multiple Choice)
4.9/5
(30)
What are the tasks you can perform with the Security Configuration and Analysis tool?
(Essay)
4.9/5
(35)
What are some of the settings available in the security options of the local policy?
(Essay)
4.8/5
(36)
The Account Policies category contains the ____________________ policy and the account lockout policy.
(Short Answer)
4.9/5
(37)
Match each item with a statement below.
Premises:
malicious software designed to perform unauthorized acts on your computer
Responses:
Encrypting File System (EFS)
Windows Defender
BitLocker Drive Encryption
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(40)
Newer Windows applications use which of the following to describe the structure of an application?
(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)