MS-09-P1 Microsoft Endpoint Security Flashcards

1
Q

Scrambles computer information

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used to encrypt (scramble) and decrypt (unscramble) data

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Utilizes many available algorithms and methods

A

Symmetric (shared key) and asymmetric (public/private key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pre installed in windows 10 and provides disk encryption method for OS, uses key lengths of 128 and 256, provides pre-boot protection, network unlock, GUI and Powershell managment

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

used for bitlocker key protection

A

TPM - Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A microcontroller embedded in the system and generates cryptographic keys

A

TPM - Trust Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An application that allows restricting multiple apps with a single rule. helps administrators control which apps and files users can run, including executable files, scripts, dynamic-link libraries (DLLs),and others.

A

AppLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a policy used to identify applications

A

Application Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T or F: Policy should be set to automatic for any AppLocker usage

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

.exe

A

Executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

.msi, .msp, .mst

A

Windows Installer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

.ps1, .bat, .cmd, .vbs, .js

A

Script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Make sure files function properly

A

AppLocker Default Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Uses the app’s digital signature for identification

A

Publisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uses the app’s location in the file system for identification

A

Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identifies a file by a generated hash

A

File Hash

17
Q

Ptovides network traffic protection and enables program integration

A

Windows Firewall

18
Q

Enabls exception configuration

A

Windows Firewall

19
Q

Rules that manage incoming traffic`

A

Inbound rules

20
Q

manage traffic generated in the system and sent out of the system

A

Outbound Rules

21
Q

This section focuses on file sharing in the Windows environment

A

Server Message Block (SMB)

22
Q

a shared resource over the network requires authentication and permission-based authorization.

A

Access Process

23
Q

permissions(or authorization)determine the type of access users have to the shared folder across the network.

A

Sharing-level

24
Q

Security permissions are used to manage access to files and folders stored in the local NTFS file system.

A

security permissions(or simply permissions) and share permissions

25
Q

s another advanced feature of NTFS. NTFS maintains a detailed log of disk changes, failures, and errors.

A

Fault tolerance

26
Q

File or folder access can be denied by explicitly adjusting settings to deny certain users. Deny permission overrides granted permissions.

A

Deny Permission

27
Q

is the process of scrambling data in order to convert it into a non-human-readable format.

A

Host Encryption

28
Q

employ the use of one key for both the encryption and decryption of data.

A

Symmetric ciphers