MOD D02: Security Policy and Registry - PE problems Flashcards

1
Q

What is a set of configurations that can be applied on desktops to enhance security?

  • Registry Keys
  • Active Directory
  • Security Policy
  • Local Policy
A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many key levels are in a Root key?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which key contains the current hardware configuration settings?

  • HKLM
  • HKCR
  • HKCC
  • HKU
A

HKCC

Note: HKCC - HKEY_CURRENT_CONFIG - A tiny key that describes the current hardware configuration and a few basic system settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which key contains many settings for the currently logged-on user?

A

HKCU

Note: HKCU - HKEY_CURRENT_USER - Controls many settings for the currently logged-on user, from the user’s name to his or her desktop background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which subkey has boot configuration data?

A

BCD

Note: BCD – This subkey stores, the boot configuration data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which sub-key contains information about applications?

A

Software

Note: SOFTWARE – This area is used by both Windows and application programs to store critical configuration settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

String value icons have what letters on them?

A

ab

Note: String Value - String values are indicated by a small red icon with the letters “ab” on them. These are the most commonly used values in the registry, and also the most human-readable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many bits are in a Double Word?

A

32

Note: 1 word = 16 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Double word values can be represented in hexadecimal or decimal.

[True / False]

A

TRUE

Both DWORD (32-bit) values and QWORD (64-bit) values have a blue icon in the Windows Registry. Their values can be expressed in either decimal or hexadecimal format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What command line tool allows you to get the Ethernet computer hardware address from a remote computer?

A

getmac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Active Directory tool allows you to set policies to disable services on many computers?

  • Local Policy
  • Group Policy
  • Group Management
  • User Access Control
A

Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A digital certificate allows a web server to establish encrypted communication over HTTPS with clients using TLS/SSL.

[True / False]

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which value in the PowerShell “execution policy” allows loading of all configuration files and scripts?

A

Unrestricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first account created on a Windows system during installation is given what level privileges?

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An example of authentication is signing into a computer by supplying a username and password.

[True / False]

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three primary event logs in Windows?

  • Application, Presentation, Session
  • Server, Client, Network
  • User, System, Account
  • Application, security, and system
A

Application, security, and system

17
Q

16,384 Gigabytes is the default minimum System event log size in Windows.

[True / False]

A

FALSE

18
Q

When does Windows apply Computer Configuration policies by default?

  • on startup
  • on shutdown
  • on update
  • manually
A

On Startup

19
Q

What type of system security malware allows for access to a computer, program, or service without authorization?

A

Backdoor

20
Q

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

A

Adware

21
Q

What is a malicious computer code that reproduces itself on the same computer?

A

Virus