Exam 7: Windows 7 Security Features
Exam 1: Introduction to Windows 742 Questions
Exam 2: Installing Windows 742 Questions
Exam 3: Using the System Utilities42 Questions
Exam 4: Managing Disks42 Questions
Exam 5: Managing File Systems42 Questions
Exam 6: User Management42 Questions
Exam 7: Windows 7 Security Features42 Questions
Exam 8: Networking42 Questions
Exam 9: User Productivity Tools42 Questions
Exam 10: Performance Tuning42 Questions
Exam 11: Application Support42 Questions
Exam 12: Disaster Recovery and Troubleshooting42 Questions
Exam 13: Enterprise Computing42 Questions
Exam 14: Remote Access42 Questions
Select questions type
A(n) ____ policy controls password characteristics for local user accounts.
Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
B
____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Security templates
What are the major security improvements in Windows 7?
Free
(Essay)
5.0/5
(31)
Correct Answer:
Security threats are constantly evolving, and Windows 7 has new features to address the new threats found on the Internet and elsewhere. Many of these features were also included in Windows Vista but have been improved or refined in Windows
7. The major security improvements in Windows 7 are:
• Malware protection
• Easier deployment of alternative authentication methods
• Enhanced network protection
• Data protection for stolen hard drives
• AppLocker for software restriction
NTFS permissions can be easily circumvented when you have physical access to a computer.
(True/False)
4.8/5
(43)
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data.
(Multiple Choice)
4.7/5
(27)
The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.
(Multiple Choice)
4.8/5
(44)
Briefly describe the changes in Windows services that have been made to harden them.
(Essay)
4.9/5
(38)
What are some of the settings available in the user rights assignment?
(Essay)
4.8/5
(33)
Internet Explorer has been modified to run in a limited state, called ____________________ mode, in which user files cannot be modified.
(Short Answer)
4.9/5
(32)
In Windows 7, advanced audit policies can only be edited at a command-line.
(True/False)
4.8/5
(35)
What are the most common reasons that the BitLocker Drive Encryption recovery password is required?
(Essay)
4.9/5
(33)
The Account Policies category contains the ____________________ policy and the account lockout policy.
(Short Answer)
4.8/5
(32)
A(n) ____ is part of the motherboard in your computer and is used to store encryption keys and certificates.
(Multiple Choice)
4.7/5
(28)
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.
(Multiple Choice)
4.9/5
(30)
Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.
(Multiple Choice)
4.8/5
(29)
____ is a threat to privacy and often makes systems unstable.
(Multiple Choice)
4.7/5
(37)
A ____ rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run.
(Multiple Choice)
4.9/5
(39)
What are some of the settings available in the security options of the local policy?
(Essay)
4.8/5
(39)
Windows 7 is protected on networks by an enhanced firewall and ___________________________________.
(Short Answer)
4.8/5
(28)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)