Session 2 Flashcards
Which are authentication factors? Choose three answers.
Choices: A - Who you are B - What you do C - What you say D - What you have E - What you know
A - Who you are
D - What you have
E - What you know
What do virtual smart cards use for authentication?
Choices: A - TPM chip B - Password C - Biometrics D - Card reader
A - TPM chip
What do physical smart cards use for authentication?
Choices: A - TPM chip B - Password C - Biometrics D - Card reader
D - Card reader
Which type of server is used to authenticate outside connections to a network?
Choices: A - VPN B - Web C - WAP D - RADIUS
D - RADIUS
Which form of authentication is known as, who you are?
Choices: A - Passwords B - Biometrics C - Usernames D - Smart Cards
B- Biometrics
When running an app that requires elevated privileges, which Windows feature should be used?
Choices: A - UAC B - Run as C - Safe Mode D - Administrative Mode
B - Run as
When an administrator grants permissions on a folder to a group, which three permission levels are assigned by default?
Choices: A - Read B - Write C - Modify D - Read & execute E - List folder contents
A - Read
D - Read & execute
E - List folder contents
Which two permission levels are available to assign to a user or group when creating a basic share on a folder?
Choices: A - Own B - Read C - Change D - Read/Write
B - Read
D - Read/Write
Which command is used to access the registry?
Choices: A - Regrun B - Regedit C - Registry D - Regchange
B - Regedit
Which registry hive stores file associations?
Choices: A - HKEY_USERS B - HKEY_CLASSES_ROOT C - HKEY_CURRENT_USER D - HKEY_LOCAL_MACHINE E - HKEY _CURRENT_CONFIG
B - HKEY_CLASSES_ROOT
Which are network authentication protocols? Choose two answers.
Choices: A - SSO B - LDAP C - NTLM D - Kerberos
C - NTLM
D - Kerberos
Which Active Directory tool allows an administrator to create and run scripts for automation purposes?
Choices:
A - Active Directory Sites and Services
B - Active Directory Domains and Trusts
C - Active Directory Administrative Center
D - Active Directory Module for Windows PowerShell
D - Active Directory Module for Windows PowerShell
From a folder’s properties, where can an administrator see which folder is a parent folder for inherited permissions?
Choices: A - Edit button on the Sharing tab B - Edit button on the Security tab C - Advanced button on the Sharing tab D - Advanced button on the Security tab
D - Advanced button on the Security tab
When copying a folder from one location to another, the folder’s permissions for the new copy are __________.
Choices: A - set to full control B - the same as the original copy C - inherited from its parent D - nonexistent and must be reassigned
C - inherited from its parent
When moving a folder from one location to another on the same drive, the folder’s permissions __________.
Choices: A - remain the same B - are inherited from its parent C - are set to read-only for all groups D - are nonexistent and must be assigned
A - remain the same
If a user is assigned to both the Users and Administrators groups, which permissions will the user have on a folder when both groups have permissions on that folder?
Choices:
A - The group with the most lenient permissions
B - The group with the strictest permissions
C - Inherited permissions from the folder’s parent
D - Cumulative permissions from both groups on the folder
D - Cumulative permissions from both groups on the folder
While in Advanced Security Settings, what should an administrator do to view advanced permissions for a specific user or group?
Choices:
A - Click the user or group
B - Double-click the user or group
C - Click the user or group and click Edit
D - Click the user or group and click View
B - Double-click the user or group
To delegate control on an organizational unit, an administrator should __________.
Choices: A - change folder ownership B - change folder permissions C - run the Delegation of Control Wizard D - change the delegation settings on the Security tab
C - run the Delegation of Control Wizard
Strong passwords have at least __________ characters.
Choices: A - 7 B - 8 C - 10 D - 12
B - 8
If a minimum password length is set to 0 in the Local Security Policy, what effect does that have on a password requirement?
Choices: A - None B - A password is not allowed C - A password is not required D - A password is required but can be any length
C - A password is not required
An administrator wants to force users not to reuse an old password when changing a password. Which password policy should be set?
Choices: A - Minimum password age B - Maximum password age C - Enforce password history D - Minimum password length
B. Maximum password age
To prevent a user from quickly changing passwords in order to get around the Enforce password history policy, which password policy should be set?
Choices: A - Minimum password age B - Maximum password age C - Minimum password length D - Password must meet complexity requirements
B- Maximum password age
To lock a user out after a set number of failed logon attempts due to an incorrect password, which policy should be set?
Choices: A - Account lockout policy B - Account lockout duration C - Account lockout threshold D - Reset account lockout counter after
C- Account lockout threshold
On which Group Policy path will an administrator find the Account Policies area?
Choices:
A - User Configuration/Policies/Software Settings/Security Settings
B - User Configuration/Policies/Windows Settings/Security Settings
C - Computer Configuration/Policies/Software Settings/Security Settings
D - Computer Configuration/Policies/Windows Settings/Security Settings
B- User Configuration/Policies/Windows Settings/Security Settings
Which type of password attack uses all possible combinations for a password?
Choices: A - Guessing Attack B - Dictionary Attack C - Social Engineering D - Brute Force Attack
D - Brute Force Attack
Users should be trained to give out passwords under what circumstance?
Choices: A - Never B - When a website asks for it C - When a supervisor asks for it D - When a help desk agent asks for it
A- Never
Which options are available for auditing? Choose two answers.
Choices: A - Read B - Write C - Failure D - Success
C- Failure
D- Success
What is used to audit non-Active Directory objects?
Choices: A - System B - Object access C - Process tracking D - Directory service access
B - Object access
Which tab under Properties holds the settings for turning on auditing for a folder?
Choices: A - Sharing B - General C - Security D - Customize
C - Security
Which administrative tool is used to read auditing logs?
Choices: A - Syslog B - Group Policy C - Event Viewer D - Local Security Policy
C - Event Viewer
Where are permissions set for viewing audit logs?
Choices: A - In the Event Viewer B - In the Audit log settings C - In the Security log settings D - On the folder storing the logs
B - In the Audit log settings
The __________ encryption method allows a user to copy and paste folders while still maintaining the encryption.
Choices: A - BitLocker B - EFS C - TPM D - TLS
B- EFS
Which encryption method is used to encrypt an external hard drive?
Choices: A - EFS B - BitLocker TPM C - BitLocker Drives D - BitLocker To Go
D - BitLocker To Go
SSL is an example of which kind of encryption?
Choices: A - Hardware-based encryption B - Mail encryption C - Virtual private network D - Software-based encryption
D - Software-based encryption
What are the two main methods used to encrypt email?
Choices: A - PGP B - SSID C - S/MIME D - SSTP E - PAP
A - PGP
C - S/MIME
Which are VPN authentication forms? Choose four answers.
Choices: A - CHAP B - EAP-MS-CHAPv2 C - IKEv2 D - MS-CHAPv2 E - L2TP F - PAP
A - CHAP
B - EAP-MS-CHAPv2
D - MS-CHAPv2
F - PAP
__________ keys are usually used to encrypt data. __________ keys are usually used to decrypt data.
Choices: A - Public, Private B - Public, Symmetric C - Symmetric, Private D - Symmetric, Asymmetric
A - Public, Private
Which of these encryption methods uses block ciphers? Choose three answers.
Choices: A - TLS B - AES C - DES D - SSL E - 3DES
B - AES
C - DES
E - 3DES
Which three types of encryption are asymmetric?
Choices: A - SSL B - DES C - PGP D - TLS E - TKIP
A - SSL
C - PGP
D - TLS
Which of the following formats allows exporting for both private keys and certificates?
Choices: A - Base64-encoded x.509 B - DER-encoded binary x.509 C - PKCS #7 D - PKCS #12
D - PKCS #12
When viewing a certificate, under which two tabs can you find the expiration dates for that certificate?
Choices: A - Certification Path B - Logins C - General D - Default Encoding E - Details
C - General
E - Details
Certificates that are revoked or expired are stored in which part of a PKI?
Choices: A - CPF B - RA C - CA D - CRL
D - CRL
____________ uses code integrity policies to lock devices to run only trusted apps.
Choices: A - EM Shielding B - Device Guard C - Device Identifier D - Block Device
B - Device Guard
Buffer overflow malware can attack by attempting to fill a(n) __________ field with a number outside the __________ range.
Choices: A - integer, integer B - integer, number C - buffer, number D - buffer, integer
A - integer, integer
What type of virus changes constantly to deceive antivirus software?
Choices: A - Hoax virus B - Polymorphic virus C - Trojan horse D - Dynamic virus
B - Polymorphic virus
A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?
Choices: A - Worm B - Virus C - Trojan horse D - Zero day attack
C - Trojan horse
__________ is a type of malware used to collect personal information and send the info to a third party.
Choices: A - Adware B - Spyware C - Rootkit D - Ransomware
B - Spyware
Which of these describe common types of ransomware? Choose two answers.
Choices: A - Scareware B - Crackware C - Registry lock D - Encryption E - Lockscreen
D - Encryption
E - Lockscreen
A user complains that newly installed software is displaying advertisements at the top of the screen. Which of the following has most likely been installed?
Choices: A - Virus B - Spyware C - Adware D - Worm
C - Adware
Which of the following describes a class of malware that creates hidden openings in the OS?
Choices: A - Backdoor B - Directory traversal C - OpenPGP D - Trojan horse
A - Backdoor
Which of the following malware types causes security breaches that have not yet been identified by credible sources?
Choices: A - Logic bomb B - Polymorphic C - Zero day attack D - Hoax
C - Zero day attack