Exam Compass - Microsoft Windows OS Basic Security Settings Quiz Flashcards
In Windows 10, Microsoft Defender Antivirus can be enabled/disabled via:
Windows Start > Settings > Update & Security > Windows Security > Virus & threat protection > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
Windows Control Panel (category view) > System and Security > Security and Maintenance (or choose Review your computer status and resolve issues) > Security > under Virus protection select View in Windows Security > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
Windows Control Panel (icon view) > Security and Maintenance > Security > under Virus protection select View in Windows Security > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
Locate Windows Security icon in Windows Taskbar notification area > right-click on the icon and select View security dashboard from the pop-up menu > click Virus & threat protection > under Virus & threat protection settings click Manage settings > under Real-time protection switch the setting to On or Off
All of the above
All of the above
Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.
True
False
True
Which of the following actions in Windows 10 provides access to virus & threat protection update setting?
Locate Windows Security icon in Windows Taskbar notification area > right-click on the icon and select Check for protection updates from the pop-up menu
Windows Control Panel (icon view) > Security and Maintenance > Security > under Virus protection select View in Windows Security > under Virus & threat protection updates click Check for updates
Windows Control Panel (category view) > System and Security > Security and Maintenance (or choose Review your computer status and resolve issues) > Security > under Virus protection select View in Windows Security > under Virus & threat protection updates click Check for updates
Windows Start > Settings > Update & Security > Windows Security > Virus & threat protection > under Virus & threat protection updates click Check for updates
All of the above
All of the above
Which of the answers listed below refers to an SSO account type?
Guest account
Microsoft account
Administrator account
Standard account
Microsoft account
Which of the following user groups in Windows 10 can use most software and change system settings that don’t affect other users or computer’s security?
Guests
Standard Users
Power Users
Administrators
Standard Users
Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?
root
Power User
Administrator
Supervisor
Administrator
In MS Windows environments, Guest account is an account for users who do not have a permanent account on a Windows computer or domain. People using this type of account cannot install software or hardware, change settings, create passwords, or access protected files and folders. However, because the Guest account allows the user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn’t being used.
True
False
True
Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?
Users
Guests
Power Users
Service accounts
Power Users
Which sign-in options in Windows 10 rely on knowledge-based authentication factors? (Select 3 answers)
Username
Security Key
PIN
Facial recognition
Password
Fingerprint
Username
PIN
Password
Which of the following answers refer to Windows 10 sign-in options that rely on inherence-based authentication factors? (Select 2 answers)
Fingerprint
Facial recognition
Password
PIN
Security Key
Username
Fingerprint
Facial recognition
Which of the statements listed below are true? (Select 2 answers)
NTFS permissions apply only to local users
NTFS permissions can be applied only on a folder level
NTFS permissions apply to both network and local users
NTFS permissions can be applied to a folder or individual file
NTFS permissions apply to both network and local users
NTFS permissions can be applied to a folder or individual file
Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers)
Apply only to network users
Can be set on a file level
Apply to both network and local users
Can be set on a folder level
Apply only to network users
Can be set on a folder level
A Windows resource with conflicting NTFS and share permissions applied to it will assume:
The least restrictive permission
NTFS permissions
The most restrictive permission
Share permissions
The most restrictive permission
The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels? (Select 2 answers)
Read when accessing the share remotely
Modify when accessing the folder locally
Read when accessing the folder locally
Modify when accessing the share remotely
Read when accessing the share remotely
Modify when accessing the folder locally
The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels? (Select 2 answers)
Read when accessing the share remotely
Full control when accessing the folder locally
Read when accessing the folder locally
Full Control when accessing the share remotely
Read when accessing the share remotely
Read when accessing the folder locally
What is the correct hierarchy of precedence for permissions settings in NTFS?
Explicit Allow > Inherited Allow > Explicit Deny > Inherited Deny
Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow
Explicit Allow > Explicit Deny > Inherited Allow > Inherited Deny
Explicit Deny > Inherited Deny > Explicit Allow > Inherited Allow
Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow
In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the “+” symbol sets an attribute for a file, the “-“ sign removes the attribute.
True
False
True
What is the correct syntax for applying the read-only attribute to a file?
attrib +R [drive:] [path] [filename]
attrib [drive:] [path] [filename] /read-only
attrib /R [drive:] [path] [filename]
attrib [drive:] [path] [filename] +R
attrib +R [drive:] [path] [filename]
In NTFS, permissions inherited from a parent object (e.g., a folder or user group) take precedence over permissions applied directly to an object (explicit permissions).
True
False
False
In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.
True
False
False
In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.
True
False
True
In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder.
True
False
True
In NTFS, permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e., folders and files created inside the parent folder).
True
False
True
The “Run as administrator” option in MS Windows allows users with lower-level permissions to perform tasks reserved for system administrators. This feature requires providing Administrator account credentials and temporarily elevates the current user’s privileges to perform a given task. It also simplifies common system tasks, such as installation of new software, which would otherwise require logging out and switching to an admin account.
True
False
True
Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as:
UAC
EFS
TPM
ACL
UAC
Which of the following actions in Windows allow to invoke the user access control prompt and run an application with administrator account permissions? (Select 3 answers)
Right-click on an application icon > select Run as administrator from the pop-up menu
Launch Windows Run dialog box (Windows logo key + R) > type in the application’s name > press Enter
In Windows Start menu press and hold Control + Shift keys > left-click on an application icon
Launch Windows Run dialog box (Windows logo key + R) > type in the application’s name > press Control + Shift + Enter
In Windows Start menu press and hold Alt + Shift keys > left-click on an application icon
Right-click on an application icon > select Run as administrator from the pop-up menu
In Windows Start menu press and hold Control + Shift keys > left-click on an application icon
Launch Windows Run dialog box (Windows logo key + R) > type in the application’s name > press Control + Shift + Enter
What is the name of a Microsoft Windows feature that enables encryption of entire drives?
FileVault
DriveCrypt
BitLocker
TrueCrypt
BitLocker
A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:
BitLocker
TrueCrypt
BitLocker To Go
DriveCrypt
BitLocker To Go
Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is called:
EFS
HSM
AES
TPM
EFS = Encrypting File System