Deck 7: Host Hardening

Full screen (f)
exit full mode
Question
Which of the following is NOT an element of host hardening?

A) Reading operating system log files
B) Encrypting data on the host
C) Restricting physical access to the host
D) Allowing an unlimited amount of applications on the host
Use Space or
up arrow
down arrow
to flip the card.
Question
________ allows multiple operating systems to run independently on a single physical machine.

A) Keylogging
B) Host hardening
C) Auditing
D) Virtualization
Question
Which of the following is FALSE about virtualization?

A) Virtualization provides multiple benefits in host hardening.
B) Virtualization increases fault tolerance.
C) Virtualization provides for a more secure environment.
D) Virtualization typically increases labor costs.
Question
The term host includes servers, clients, as routers.
Question
Restricting physical access to a host and encrypting data, if appropriate, are two protections for hardening a host computer.
Question
A disk image is a full copy of an installation.
Question
When you have two operating systems, they each have their own areas of RAM, CPU processing, and hard disk space.
Question
It is often the job of the systems administrator to conduct the hardening effort of the servers in a company.
Question
Which of the following is FALSE about the Windows Server client version interface?

A) It comes with Internet Explorer.
B) It comes with File Explorer.
C) It has a command-line interface.
D) It has a Start menu.
Question
Most administrative tools in Windows Server come in the same general format, known as ________.

A) Windows Server NT
B) the Microsoft Management Console
C) Microsoft Exchange
D) Microsoft Windows 10
Question
In MMCs, the tree pane lists ________.

A) administrative applications
B) actions that can be taken on selected objects
C) all applications on the server
D) the directory of all users on the server
Question
________ can be added or dropped from a tree list.

A) Snap-ins
B) Administrative tools
C) Distributions
D) Shells
Question
Which of the following is NOT part of the MMC organization?

A) An icon bar
B) A tree pane
C) The sub-objects pane
D) A command line
Question
UNIX tends to be interoperable ________.

A) through a GUI interface
B) at the kernel level
C) through an icon bar
D) tree level
Question
The most popular version of UNIX for PCs is ________.

A) Linux
B) Windows 10
C) CLI
D) GNU
Question
What are KDE, MATE, and GNOME?

A) UNIX desktop environments
B) Windows 10 desktops
C) Linux desktop environments
D) UNIX applications
Question
UNIX calls command-line interfaces as ________.

A) snap-ins
B) shells
C) distributions
D) trees
Question
________ was one of the first original popular UNIX shells.

A) GNOME
B) The Bourne Again shell
C) The Bourne shell
D) Cinnamon
Question
In the Windows Server operating system, most management tools are on the Administrative Tools choice on the Start menu.
Question
The MMC is the place for administrative tools in a UNIX system.
Question
UNIX is for large servers and is not available for individual PCs.
Question
Linux is popular because it is free.
Question
Since there are many different distributions of Linux, hardening a Linux system is difficult.
Question
Since there are many different distributions of Linux, hardening a Linux system is difficult.
Question
In a GUI desktop environment, the user types a command and hits Enter.
Question
A(n) ________ is a program that takes advantage of a(n) ________.

A) vulnerability; exploit
B) exploit; vulnerability
C) patch; vulnerability
D) attack; vulnerability
Question
Which of the following is NOT a type of fix to a vulnerability in a system?

A) A work-around
B) A patch
C) A service pack
D) A snap-in
Question
Which of the following is considered the least satisfactory as a fix to a vulnerability?

A) A work-around
B) A service pack
C) A patch
D) A version upgrade
Question
Often the best fix for a vulnerability is considered to be a ________.

A) work-around
B) patch
C) service pack
D) version upgrade
Question
WSUS refers to ________.

A) Windows Server Update Services
B) Windows Security Update Services
C) Windows Server Upgrade for Security
D) Windows Server Upgrade Services
Question
WSUS is a Windows server that manages patches.
Question
Installing patches does not carry any risk in terms of computer security.
Question
Assigning security measures to a group tends to ________ than assigning security measures to individuals.

A) require more labor
B) create more confusion among members
C) create additional risk
D) require less labor time
Question
The super user account in Windows is called ________.

A) administrator
B) the root account
C) the hacking root account
D) manager
Question
The super user account in UNIX is called ________.

A) administrator
B) the root account
C) the hacking root account
D) manager
Question
In Windows Server, the ________ command allows you to switch between administrator and a normal account.

A) su
B) RunAs
C) rpm
D) Action
Question
In UNIX, the ________ command allows you to switch between administrator and a normal account.

A) su
B) RunAs
C) rpm
D) Action
Question
Which of the following commands in Windows Server allows new user accounts to be created?

A) Properties
B) RunAs
C) rpm
D) Action
Question
Each operating system has a super user account that has total control.
Question
To minimize dangers, systems administrators should use the super user account as much as possible.
Question
________ specify what a user or group can do and not do to files, directories, and subdirectories.

A) Assignments
B) Patches
C) Permissions
D) Actions
Question
Which of the following is FALSE about inheritance in Windows?

A) It is done by default.
B) It cannot be disabled.
C) A child directory has the exact same permissions as the parent directory.
D) An individual's effective permissions are the permissions that are inherited from the parent.
Question
In Windows, ________ means that a directory receives permissions from the parent directory.

A) inheritance
B) assignments
C) assigning
D) standard permissions
Question
Windows has ________ different permissions that can be assigned to users and groups.

A) two
B) three
C) six
D) nine
Question
UNIX has ________ different permissions that can be assigned to users and groups.

A) two
B) three
C) six
D) nine
Question
Windows has ________ different specialized permissions to assign.

A) 10
B) 12
C) 13
D) 21
Question
Compared with access permissions in UNIX, permissions in Windows are limited.
Question
Permissions rwx indicate that a user has read, write, and execute permissions.
Question
The Execute permission allows an account or group to read and write to files.
Question
The Write permission allows an account or group to make changes.
Question
UNIX is generally known to have good security but is inflexible in handling permissions.
Question
Which of the following is NOT one of the basic guidelines to govern password creation?

A) Be at least 18 characters long
B) Have at least one change of case
C) Have at least one digit
D) Have at least one non-alphanumeric character
Question
________ are created when a password is passed from a user to a hashing function.

A) Plaintext characters
B) Dictionary attacks
C) Password hashes
D) Hybrid dictionary attacks
Question
Microsoft Windows 10 uses ________ to create its password hashes.

A) DES
B) NTLM
C) Blowfish
D) SHA
Question
Linux system uses all EXCEPT ________ to create its password hashes.

A) DES
B) NTLM
C) Blowfish
D) SHA
Question
The ________ registry of Windows stores passwords.

A) SAM
B) NTLM
C) SHA
D) DES
Question
Which of the following is NOT a cracking method?

A) Rainbow tables
B) A hybrid dictionary attack
C) A dictionary attack
D) WSUS
Question
A ________ approach to password cracking is to try all possible passwords on all accounts.

A) brute-force
B) rainbow table
C) hybrid dictionary attack
D) dictionary attack
Question
Complex passwords use ________.

A) several types of keyboard characters
B) a long combination of numbers
C) alternating upper- and lower-case letters
D) all letters but in a random combination
Question
A keystroke capture program ________.

A) steals passwords as a user types them
B) steals passwords from a database
C) stores all hacked passwords in a plaintext file
D) steals passwords from a super user account
Question
A ________ is a list of pre-computed password hashes that are indexed.

A) password database
B) rainbow table
C) hybrid dictionary
D) computer dictionary
Question
A basic guideline for creating passwords is to be at least 12 characters long.
Question
The password-cracking process is highly manual and time consuming.
Question
Passwords are typically stored as plaintext.
Question
Operating systems have used progressively fewer and fewer secure hash functions.
Question
An attacker has to have root permissions to access a shadow file.
Question
Physical keyloggers record keystrokes.
Question
In Windows 10, the ________ category in the Control Panel allows you to set individual security components.

A) Users
B) System and Security
C) Windows Defender
D) Windows Firewall
Question
Which of the following is NOT a common problem with antivirus protections?

A) A virus program contract may expire.
B) A user may turn off the antivirus program.
C) A user may turn off automatic downloads.
D) A user may not be able to access the Windows Security Center.
Question
Antivirus protection is considered ________.

A) unimportant these days
B) less important than in the past
C) critical
D) too expensive for most individual users
Question
________ is what makes the most sense for security for PCs in corporations.

A) Completely automatic operation
B) Manual operation
C) Primarily manual operation with some automated operations
D) Automatic operations except for settings that individuals want to change
Question
Audit policies would provide a(n) ________ for system events.

A) rainbow table
B) log
C) audit trail
D) audit database
Question
Microsoft Windows domain controllers can transmit sets of policies, called ________.

A) SAMs
B) GPOs
C) NTLMs
D) SHAs
Question
Which of the following is NOT necessarily an advantage provided by GPOs?

A) Consistency
B) Reduced administrative costs
C) Compliance
D) Individuality
Question
Windows 10 includes a built-in firewall named Windows Defender Firewall.
Question
It is often considered that the value of data of a lost or stolen notebook is often greater than the hardware.
Question
A GPO can lock down a client's desktop so that it cannot be changed.
Question
GPOs are considered somewhat weak and fairly archaic.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Host Hardening
1
Which of the following is NOT an element of host hardening?

A) Reading operating system log files
B) Encrypting data on the host
C) Restricting physical access to the host
D) Allowing an unlimited amount of applications on the host
Allowing an unlimited amount of applications on the host
2
________ allows multiple operating systems to run independently on a single physical machine.

A) Keylogging
B) Host hardening
C) Auditing
D) Virtualization
Virtualization
3
Which of the following is FALSE about virtualization?

A) Virtualization provides multiple benefits in host hardening.
B) Virtualization increases fault tolerance.
C) Virtualization provides for a more secure environment.
D) Virtualization typically increases labor costs.
Virtualization typically increases labor costs.
4
The term host includes servers, clients, as routers.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
Restricting physical access to a host and encrypting data, if appropriate, are two protections for hardening a host computer.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
A disk image is a full copy of an installation.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
When you have two operating systems, they each have their own areas of RAM, CPU processing, and hard disk space.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
It is often the job of the systems administrator to conduct the hardening effort of the servers in a company.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is FALSE about the Windows Server client version interface?

A) It comes with Internet Explorer.
B) It comes with File Explorer.
C) It has a command-line interface.
D) It has a Start menu.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
Most administrative tools in Windows Server come in the same general format, known as ________.

A) Windows Server NT
B) the Microsoft Management Console
C) Microsoft Exchange
D) Microsoft Windows 10
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
In MMCs, the tree pane lists ________.

A) administrative applications
B) actions that can be taken on selected objects
C) all applications on the server
D) the directory of all users on the server
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
________ can be added or dropped from a tree list.

A) Snap-ins
B) Administrative tools
C) Distributions
D) Shells
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is NOT part of the MMC organization?

A) An icon bar
B) A tree pane
C) The sub-objects pane
D) A command line
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
UNIX tends to be interoperable ________.

A) through a GUI interface
B) at the kernel level
C) through an icon bar
D) tree level
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
The most popular version of UNIX for PCs is ________.

A) Linux
B) Windows 10
C) CLI
D) GNU
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
What are KDE, MATE, and GNOME?

A) UNIX desktop environments
B) Windows 10 desktops
C) Linux desktop environments
D) UNIX applications
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
UNIX calls command-line interfaces as ________.

A) snap-ins
B) shells
C) distributions
D) trees
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
________ was one of the first original popular UNIX shells.

A) GNOME
B) The Bourne Again shell
C) The Bourne shell
D) Cinnamon
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
In the Windows Server operating system, most management tools are on the Administrative Tools choice on the Start menu.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
The MMC is the place for administrative tools in a UNIX system.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
UNIX is for large servers and is not available for individual PCs.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
Linux is popular because it is free.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
Since there are many different distributions of Linux, hardening a Linux system is difficult.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
Since there are many different distributions of Linux, hardening a Linux system is difficult.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
In a GUI desktop environment, the user types a command and hits Enter.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) ________ is a program that takes advantage of a(n) ________.

A) vulnerability; exploit
B) exploit; vulnerability
C) patch; vulnerability
D) attack; vulnerability
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is NOT a type of fix to a vulnerability in a system?

A) A work-around
B) A patch
C) A service pack
D) A snap-in
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is considered the least satisfactory as a fix to a vulnerability?

A) A work-around
B) A service pack
C) A patch
D) A version upgrade
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
Often the best fix for a vulnerability is considered to be a ________.

A) work-around
B) patch
C) service pack
D) version upgrade
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
WSUS refers to ________.

A) Windows Server Update Services
B) Windows Security Update Services
C) Windows Server Upgrade for Security
D) Windows Server Upgrade Services
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
WSUS is a Windows server that manages patches.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
Installing patches does not carry any risk in terms of computer security.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
Assigning security measures to a group tends to ________ than assigning security measures to individuals.

A) require more labor
B) create more confusion among members
C) create additional risk
D) require less labor time
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
The super user account in Windows is called ________.

A) administrator
B) the root account
C) the hacking root account
D) manager
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
The super user account in UNIX is called ________.

A) administrator
B) the root account
C) the hacking root account
D) manager
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
In Windows Server, the ________ command allows you to switch between administrator and a normal account.

A) su
B) RunAs
C) rpm
D) Action
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
In UNIX, the ________ command allows you to switch between administrator and a normal account.

A) su
B) RunAs
C) rpm
D) Action
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following commands in Windows Server allows new user accounts to be created?

A) Properties
B) RunAs
C) rpm
D) Action
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
Each operating system has a super user account that has total control.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
To minimize dangers, systems administrators should use the super user account as much as possible.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
________ specify what a user or group can do and not do to files, directories, and subdirectories.

A) Assignments
B) Patches
C) Permissions
D) Actions
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is FALSE about inheritance in Windows?

A) It is done by default.
B) It cannot be disabled.
C) A child directory has the exact same permissions as the parent directory.
D) An individual's effective permissions are the permissions that are inherited from the parent.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
In Windows, ________ means that a directory receives permissions from the parent directory.

A) inheritance
B) assignments
C) assigning
D) standard permissions
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
Windows has ________ different permissions that can be assigned to users and groups.

A) two
B) three
C) six
D) nine
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
UNIX has ________ different permissions that can be assigned to users and groups.

A) two
B) three
C) six
D) nine
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
Windows has ________ different specialized permissions to assign.

A) 10
B) 12
C) 13
D) 21
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
Compared with access permissions in UNIX, permissions in Windows are limited.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
Permissions rwx indicate that a user has read, write, and execute permissions.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
The Execute permission allows an account or group to read and write to files.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
The Write permission allows an account or group to make changes.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
UNIX is generally known to have good security but is inflexible in handling permissions.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is NOT one of the basic guidelines to govern password creation?

A) Be at least 18 characters long
B) Have at least one change of case
C) Have at least one digit
D) Have at least one non-alphanumeric character
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
________ are created when a password is passed from a user to a hashing function.

A) Plaintext characters
B) Dictionary attacks
C) Password hashes
D) Hybrid dictionary attacks
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
Microsoft Windows 10 uses ________ to create its password hashes.

A) DES
B) NTLM
C) Blowfish
D) SHA
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
Linux system uses all EXCEPT ________ to create its password hashes.

A) DES
B) NTLM
C) Blowfish
D) SHA
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
The ________ registry of Windows stores passwords.

A) SAM
B) NTLM
C) SHA
D) DES
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is NOT a cracking method?

A) Rainbow tables
B) A hybrid dictionary attack
C) A dictionary attack
D) WSUS
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
A ________ approach to password cracking is to try all possible passwords on all accounts.

A) brute-force
B) rainbow table
C) hybrid dictionary attack
D) dictionary attack
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
Complex passwords use ________.

A) several types of keyboard characters
B) a long combination of numbers
C) alternating upper- and lower-case letters
D) all letters but in a random combination
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
A keystroke capture program ________.

A) steals passwords as a user types them
B) steals passwords from a database
C) stores all hacked passwords in a plaintext file
D) steals passwords from a super user account
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
A ________ is a list of pre-computed password hashes that are indexed.

A) password database
B) rainbow table
C) hybrid dictionary
D) computer dictionary
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
A basic guideline for creating passwords is to be at least 12 characters long.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
The password-cracking process is highly manual and time consuming.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
Passwords are typically stored as plaintext.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
Operating systems have used progressively fewer and fewer secure hash functions.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
An attacker has to have root permissions to access a shadow file.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
Physical keyloggers record keystrokes.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
In Windows 10, the ________ category in the Control Panel allows you to set individual security components.

A) Users
B) System and Security
C) Windows Defender
D) Windows Firewall
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is NOT a common problem with antivirus protections?

A) A virus program contract may expire.
B) A user may turn off the antivirus program.
C) A user may turn off automatic downloads.
D) A user may not be able to access the Windows Security Center.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
Antivirus protection is considered ________.

A) unimportant these days
B) less important than in the past
C) critical
D) too expensive for most individual users
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
________ is what makes the most sense for security for PCs in corporations.

A) Completely automatic operation
B) Manual operation
C) Primarily manual operation with some automated operations
D) Automatic operations except for settings that individuals want to change
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
Audit policies would provide a(n) ________ for system events.

A) rainbow table
B) log
C) audit trail
D) audit database
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
Microsoft Windows domain controllers can transmit sets of policies, called ________.

A) SAMs
B) GPOs
C) NTLMs
D) SHAs
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is NOT necessarily an advantage provided by GPOs?

A) Consistency
B) Reduced administrative costs
C) Compliance
D) Individuality
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
Windows 10 includes a built-in firewall named Windows Defender Firewall.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
It is often considered that the value of data of a lost or stolen notebook is often greater than the hardware.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
A GPO can lock down a client's desktop so that it cannot be changed.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
GPOs are considered somewhat weak and fairly archaic.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 78 flashcards in this deck.