Deck 2 Flashcards

1
Q
Which of the following are considered authentication factors? (Choose all that apply.)
A. Wi-Fi Protected Access
B. Biometrics
C. Picture passwords
D. Smart cards
A

B. Biometrics
C. Picture passwords
D. Smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following passwords is considered complex?
A. M!croS0ft
B. candybar01
C. bobj
D. fred@local
A

A. M!croS0ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
You are an IT Support professional setting up a new PC with Windows 10. Which of the following is not a type of account you can use when signing in the first time?
A. Domain Account
B. Local Account
C. Microsoft Account
D. Administrator Account
A

D. Administrator Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are user accounts stored for computers that are in a workgroup?

A

Security Accounts Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your organization is going to start allowing employees to work remotely. Employees will also be able to work from their own devices. The devices will have access to sensitive business information. As the IT Support professional, which of the following must you be able to do? (select three)
A. Control which data users can access
B. Initiate a remote wipe of a lost or stolen device
C. Setup a VPN
D. Have the ability to wipe business data off users’ personal devices without affecting their personal data
E. Enable Windows Remote Management Server
F. Access Device Manager on the remote PCs

A

A. Control which data users can access
B. Initiate a remote wipe of a lost or stolen device
D. Have the ability to wipe business data off users’ personal devices without affecting their personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

As an IT Support professional, you are helping to configure the company’s infrastructure to allow Device Registration. Which of the following must be taken into account when configuring the environment? (select four)
A. A DNS record for the host named Enterpriseregistration.
B. At least one domain controller must be running Windows Server 2012 or later.
C. The machine must be using a 64-bit operating system.
D. A Public key infrastructure trusted by the devices.
E. AD FS must be deployed.
F. A VPN will no longer be able to be used.
G. The type of IP configuration.

A

A. A DNS record for the host named Enterpriseregistration.
B. At least one domain controller must be running Windows Server 2012 or later.
D. A Public key infrastructure trusted by the devices.
E. AD FS must be deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following authentication protocols is used in Windows Active Directory domains?
A. Kerberos
B. TGT
C. KDC
D. TLS/SSL
A

A. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following tools is used to remember user names and passwords when accessing a website?
A. Local security policy
B. HomeGroup control panel
C. Access token generator
D. Credential Manager
A

D. Credential Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which server role is needed for Workplace Join?
A. AD RMS
B. RD GW
C. AD FS
D. PSO
A

C. AD FS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is used to find computers, users, and other resources throughout an Active Directory forest?
A. Key Distribution Center
B. Global Catalog
C. Kerberos
D. Iterative query
A

B. Global Catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following authentication protocols is best designed to support today's Active Directory–based networks?
A. NTLMv2
B. NTLMv1
C. Kerberosv1
D. Kerberosv5
A

D. Kerberosv5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following provides biometric authentication that uses a user's face, iris, or fingerprint to unlock devices?
A. Microsoft Passport
B. Credential Manager
C. Windows Hello
D. Kerberos
A

C. Windows Hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
You need to set up an account that will be used to logon to a Windows 10 PC. This account needs to be able to synchronize files with OneDrive. What type of account do you need to create?
A. Domain Account
B. Local Account
C. Microsoft Account
D. Online Service Account
E. None mentioned
A

C. Microsoft Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is used to register a nondomain smartphone or tablet in Active Directory, which installs a certificate on a device so that it can secure single sign-on mechanism?
A. Device Registration Service
B. HomeGroup
C. Credential Caching
D. Credential Manager
A

A. Device Registration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The company is not expected to add more computers or users over the next year. There is also no IT staff to support the network. Which of the following models is the best fit for this network?
A. Domain model
B. Workgroup model
C. Ad hoc model
D. Infrastructure model
A

B. Workgroup model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which variation of the UAC elevation prompt is displayed to standard users when they attempt to perform an administrative task?
A. Consent prompt
B. Credential prompt
C. Approval prompt
D. Admin prompt
A

B. Credential prompt

17
Q
When visiting websites, users are automatically logged on. However, if other people use the same profile, a user might not want to automatically log on. Which of the following statements best describes how a user can delete the credentials used in the automatic logon?
A. Using Credential Manager
B. Using Credential Caching
C. Deleting the access token
D. Clearing the IE cache
A

A. Using Credential Manager

18
Q
Which of the following terms best describes the manner in which security principals prove their identity?
A. Authorization
B. Confidentiality
C. Authentication
D. Integrity
A

C. Authentication

19
Q
Which of the following are examples of password policies? (Choose all that apply)
A. History
B. Length
C. Complexity
D. Age
A

A. History
B. Length
C. Complexity
D. Age

20
Q
Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions?
A. Integrity
B. Confidentiality
C. Authorization
D. Authentication
A

D. Authentication

21
Q
Which term refers to the process of determining what an authenticated security principal can do?
A. Authorization
B. Integrity
C. Nonrepudiation
D. Confidentiality
A

A. Authorization

22
Q

Your organization requires control over the web apps that users can access from devices. You deploy Device Registration. Which of the following will take place after you register and enroll a device? (select three)
A. The device is associated with a user account in the company directory
B. A device object is created in AD DS
C. An email is sent to the user.
D. A user certificate is installed on the device
E. The user will be able to register any other devices on the network.

A

A. The device is associated with a user account in the company directory
B. A device object is created in AD DS
D. A user certificate is installed on the device

23
Q

Why are account lockout policies put into place?

A

To enforce security standards

24
Q
A picture password is made up of which of the following components? (Choose all that apply)
A. A picture
B. A PIN
C. A password
D. A gesture
A

A. A picture

D. A gesture

25
Q
Which of the following items are not supported as a method of authentication in Windows 10?
A. Picture passwords
B. Biometrics
C. Digital certificates
D. One-time passwords
A

D. One-time passwords