Exam 6: Windows 10 Security Features

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of permissions are considered the most basic level of data security in Windows 10?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B

Which rule condition identifies software by file location?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

What are some ways EFS keys may be lost?

Free
(Essay)
5.0/5
(26)
Correct Answer:
Verified

If a user loses the EFS key, then an encrypted file is unrecoverable. Some ways EFS keys may be lost:
* The user profile is corrupted.
* The user profile is deleted accidentally.
* The user is deleted from the system.
* The user password is reset.

The Account Policies in the Local Security Policy can be used to control domain accounts.

(True/False)
4.8/5
(31)
Match each item with a statement below.
Premises:
an encryption technology for individual files and folders that can be enabled by users
Responses:
User Account Control (UAC)
Windows Defender
Secedit
Correct Answer:
Verified
Premises:
Responses:
an encryption technology for individual files and folders that can be enabled by users
User Account Control (UAC)
(Matching)
4.9/5
(38)

Describe the four distinct servicing branches in Windows 10.

(Essay)
4.8/5
(40)

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

(Multiple Choice)
4.9/5
(36)

In Windows 10, ____________________ provides both antivirus and antispyware capabilities.

(Short Answer)
4.7/5
(39)

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

(Multiple Choice)
4.9/5
(37)

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

(Multiple Choice)
4.9/5
(34)

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?

(Multiple Choice)
4.9/5
(38)
Match each item with a statement below.
Premises:
anti-malware software included with Windows 10
Responses:
BitLocker Drive Encryption
Encrypting File System (EFS)
Secedit
Correct Answer:
Verified
Premises:
Responses:
anti-malware software included with Windows 10
BitLocker Drive Encryption
(Matching)
4.7/5
(41)

Every object in Windows 10 has audit events related to it.

(True/False)
4.8/5
(32)

Which security process records the occurrence of specific operating system events in the Security log?

(Multiple Choice)
4.8/5
(39)

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

(Multiple Choice)
4.9/5
(30)

What are the tasks you can perform with the Security Configuration and Analysis tool?

(Essay)
4.9/5
(35)

What are some of the settings available in the security options of the local policy?

(Essay)
4.8/5
(36)

The Account Policies category contains the ____________________ policy and the account lockout policy.

(Short Answer)
4.9/5
(37)
Match each item with a statement below.
Premises:
malicious software designed to perform unauthorized acts on your computer
Responses:
Encrypting File System (EFS)
Windows Defender
BitLocker Drive Encryption
Correct Answer:
Verified
Premises:
Responses:
malicious software designed to perform unauthorized acts on your computer
Encrypting File System (EFS)
(Matching)
4.9/5
(40)

Newer Windows applications use which of the following to describe the structure of an application?

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)