Deck 2 Flashcards
Which of the following are considered authentication factors? (Choose all that apply.) A. Wi-Fi Protected Access B. Biometrics C. Picture passwords D. Smart cards
B. Biometrics
C. Picture passwords
D. Smart cards
Which of the following passwords is considered complex? A. M!croS0ft B. candybar01 C. bobj D. fred@local
A. M!croS0ft
You are an IT Support professional setting up a new PC with Windows 10. Which of the following is not a type of account you can use when signing in the first time? A. Domain Account B. Local Account C. Microsoft Account D. Administrator Account
D. Administrator Account
Where are user accounts stored for computers that are in a workgroup?
Security Accounts Manager
Your organization is going to start allowing employees to work remotely. Employees will also be able to work from their own devices. The devices will have access to sensitive business information. As the IT Support professional, which of the following must you be able to do? (select three)
A. Control which data users can access
B. Initiate a remote wipe of a lost or stolen device
C. Setup a VPN
D. Have the ability to wipe business data off users’ personal devices without affecting their personal data
E. Enable Windows Remote Management Server
F. Access Device Manager on the remote PCs
A. Control which data users can access
B. Initiate a remote wipe of a lost or stolen device
D. Have the ability to wipe business data off users’ personal devices without affecting their personal data
As an IT Support professional, you are helping to configure the company’s infrastructure to allow Device Registration. Which of the following must be taken into account when configuring the environment? (select four)
A. A DNS record for the host named Enterpriseregistration.
B. At least one domain controller must be running Windows Server 2012 or later.
C. The machine must be using a 64-bit operating system.
D. A Public key infrastructure trusted by the devices.
E. AD FS must be deployed.
F. A VPN will no longer be able to be used.
G. The type of IP configuration.
A. A DNS record for the host named Enterpriseregistration.
B. At least one domain controller must be running Windows Server 2012 or later.
D. A Public key infrastructure trusted by the devices.
E. AD FS must be deployed.
Which of the following authentication protocols is used in Windows Active Directory domains? A. Kerberos B. TGT C. KDC D. TLS/SSL
A. Kerberos
Which of the following tools is used to remember user names and passwords when accessing a website? A. Local security policy B. HomeGroup control panel C. Access token generator D. Credential Manager
D. Credential Manager
Which server role is needed for Workplace Join? A. AD RMS B. RD GW C. AD FS D. PSO
C. AD FS
Which of the following is used to find computers, users, and other resources throughout an Active Directory forest? A. Key Distribution Center B. Global Catalog C. Kerberos D. Iterative query
B. Global Catalog
Which of the following authentication protocols is best designed to support today's Active Directory–based networks? A. NTLMv2 B. NTLMv1 C. Kerberosv1 D. Kerberosv5
D. Kerberosv5
Which of the following provides biometric authentication that uses a user's face, iris, or fingerprint to unlock devices? A. Microsoft Passport B. Credential Manager C. Windows Hello D. Kerberos
C. Windows Hello
You need to set up an account that will be used to logon to a Windows 10 PC. This account needs to be able to synchronize files with OneDrive. What type of account do you need to create? A. Domain Account B. Local Account C. Microsoft Account D. Online Service Account E. None mentioned
C. Microsoft Account
Which of the following is used to register a nondomain smartphone or tablet in Active Directory, which installs a certificate on a device so that it can secure single sign-on mechanism? A. Device Registration Service B. HomeGroup C. Credential Caching D. Credential Manager
A. Device Registration Service
Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The company is not expected to add more computers or users over the next year. There is also no IT staff to support the network. Which of the following models is the best fit for this network? A. Domain model B. Workgroup model C. Ad hoc model D. Infrastructure model
B. Workgroup model
Which variation of the UAC elevation prompt is displayed to standard users when they attempt to perform an administrative task? A. Consent prompt B. Credential prompt C. Approval prompt D. Admin prompt
B. Credential prompt
When visiting websites, users are automatically logged on. However, if other people use the same profile, a user might not want to automatically log on. Which of the following statements best describes how a user can delete the credentials used in the automatic logon? A. Using Credential Manager B. Using Credential Caching C. Deleting the access token D. Clearing the IE cache
A. Using Credential Manager
Which of the following terms best describes the manner in which security principals prove their identity? A. Authorization B. Confidentiality C. Authentication D. Integrity
C. Authentication
Which of the following are examples of password policies? (Choose all that apply) A. History B. Length C. Complexity D. Age
A. History
B. Length
C. Complexity
D. Age
Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions? A. Integrity B. Confidentiality C. Authorization D. Authentication
D. Authentication
Which term refers to the process of determining what an authenticated security principal can do? A. Authorization B. Integrity C. Nonrepudiation D. Confidentiality
A. Authorization
Your organization requires control over the web apps that users can access from devices. You deploy Device Registration. Which of the following will take place after you register and enroll a device? (select three)
A. The device is associated with a user account in the company directory
B. A device object is created in AD DS
C. An email is sent to the user.
D. A user certificate is installed on the device
E. The user will be able to register any other devices on the network.
A. The device is associated with a user account in the company directory
B. A device object is created in AD DS
D. A user certificate is installed on the device
Why are account lockout policies put into place?
To enforce security standards
A picture password is made up of which of the following components? (Choose all that apply) A. A picture B. A PIN C. A password D. A gesture
A. A picture
D. A gesture
Which of the following items are not supported as a method of authentication in Windows 10? A. Picture passwords B. Biometrics C. Digital certificates D. One-time passwords
D. One-time passwords