Exam Compass - Microsoft Windows OS Basic Security Settings Quiz Flashcards

1
Q

In Windows 10, Microsoft Defender Antivirus can be enabled/disabled via:
Windows Start > Settings > Update & Security > Windows Security > Virus & threat protection > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
Windows Control Panel (category view) > System and Security > Security and Maintenance (or choose Review your computer status and resolve issues) > Security > under Virus protection select View in Windows Security > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
Windows Control Panel (icon view) > Security and Maintenance > Security > under Virus protection select View in Windows Security > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
Locate Windows Security icon in Windows Taskbar notification area > right-click on the icon and select View security dashboard from the pop-up menu > click Virus & threat protection > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following actions in Windows 10 provides access to virus & threat protection update setting?
Locate Windows Security icon in Windows Taskbar notification area > right-click on the icon and select Check for protection updates from the pop-up menu
Windows Control Panel (icon view) > Security and Maintenance > Security > under Virus protection select View in Windows Security > under Virus & threat protection updates click Check for updates
Windows Control Panel (category view) > System and Security > Security and Maintenance (or choose Review your computer status and resolve issues) > Security > under Virus protection select View in Windows Security > under Virus & threat protection updates click Check for updates
Windows Start > Settings > Update & Security > Windows Security > Virus & threat protection > under Virus & threat protection updates click Check for updates
All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refers to an SSO account type?
Guest account
Microsoft account
Administrator account
Standard account

A

Microsoft account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following user groups in Windows 10 can use most software and change system settings that don’t affect other users or computer’s security?
Guests
Standard Users
Power Users
Administrators

A

Standard Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?
root
Power User
Administrator
Supervisor

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In MS Windows environments, Guest account is an account for users who do not have a permanent account on a Windows computer or domain. People using this type of account cannot install software or hardware, change settings, create passwords, or access protected files and folders. However, because the Guest account allows the user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn’t being used.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?
Users
Guests
Power Users
Service accounts

A

Power Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which sign-in options in Windows 10 rely on knowledge-based authentication factors? (Select 3 answers)
Username
Security Key
PIN
Facial recognition
Password
Fingerprint

A

Username
PIN
Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following answers refer to Windows 10 sign-in options that rely on inherence-based authentication factors? (Select 2 answers)
Fingerprint
Facial recognition
Password
PIN
Security Key
Username

A

Fingerprint
Facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the statements listed below are true? (Select 2 answers)
NTFS permissions apply only to local users
NTFS permissions can be applied only on a folder level
NTFS permissions apply to both network and local users
NTFS permissions can be applied to a folder or individual file

A

NTFS permissions apply to both network and local users

NTFS permissions can be applied to a folder or individual file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers)
Apply only to network users
Can be set on a file level
Apply to both network and local users
Can be set on a folder level

A

Apply only to network users

Can be set on a folder level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Windows resource with conflicting NTFS and share permissions applied to it will assume:
The least restrictive permission
NTFS permissions
The most restrictive permission
Share permissions

A

The most restrictive permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels? (Select 2 answers)
Read when accessing the share remotely
Modify when accessing the folder locally
Read when accessing the folder locally
Modify when accessing the share remotely

A

Read when accessing the share remotely

Modify when accessing the folder locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels? (Select 2 answers)
Read when accessing the share remotely
Full control when accessing the folder locally
Read when accessing the folder locally
Full Control when accessing the share remotely

A

Read when accessing the share remotely

Read when accessing the folder locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the correct hierarchy of precedence for permissions settings in NTFS?
Explicit Allow > Inherited Allow > Explicit Deny > Inherited Deny
Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow
Explicit Allow > Explicit Deny > Inherited Allow > Inherited Deny
Explicit Deny > Inherited Deny > Explicit Allow > Inherited Allow

A

Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow

17
Q

In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the “+” symbol sets an attribute for a file, the “-“ sign removes the attribute.
True
False

A

True

18
Q

What is the correct syntax for applying the read-only attribute to a file?
attrib +R [drive:] [path] [filename]
attrib [drive:] [path] [filename] /read-only
attrib /R [drive:] [path] [filename]
attrib [drive:] [path] [filename] +R

A

attrib +R [drive:] [path] [filename]

19
Q

In NTFS, permissions inherited from a parent object (e.g., a folder or user group) take precedence over permissions applied directly to an object (explicit permissions).
True
False

A

False

20
Q

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.
True
False

A

False

21
Q

In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.
True
False

A

True

22
Q

In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder.
True
False

A

True

23
Q

In NTFS, permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e., folders and files created inside the parent folder).
True
False

A

True

24
Q

The “Run as administrator” option in MS Windows allows users with lower-level permissions to perform tasks reserved for system administrators. This feature requires providing Administrator account credentials and temporarily elevates the current user’s privileges to perform a given task. It also simplifies common system tasks, such as installation of new software, which would otherwise require logging out and switching to an admin account.
True
False

A

True

25
Q

Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as:
UAC
EFS
TPM
ACL

A

UAC

26
Q

Which of the following actions in Windows allow to invoke the user access control prompt and run an application with administrator account permissions? (Select 3 answers)
Right-click on an application icon > select Run as administrator from the pop-up menu
Launch Windows Run dialog box (Windows logo key + R) > type in the application’s name > press Enter
In Windows Start menu press and hold Control + Shift keys > left-click on an application icon
Launch Windows Run dialog box (Windows logo key + R) > type in the application’s name > press Control + Shift + Enter
In Windows Start menu press and hold Alt + Shift keys > left-click on an application icon

A

Right-click on an application icon > select Run as administrator from the pop-up menu

In Windows Start menu press and hold Control + Shift keys > left-click on an application icon

Launch Windows Run dialog box (Windows logo key + R) > type in the application’s name > press Control + Shift + Enter

27
Q

What is the name of a Microsoft Windows feature that enables encryption of entire drives?
FileVault
DriveCrypt
BitLocker
TrueCrypt

A

BitLocker

28
Q

A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:
BitLocker
TrueCrypt
BitLocker To Go
DriveCrypt

A

BitLocker To Go

29
Q

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is called:
EFS
HSM
AES
TPM

A

EFS = Encrypting File System