Session 2 Flashcards

1
Q

Which are authentication factors? Choose three answers.

Choices: 
A - Who you are
B - What you do
C - What you say
D - What you have
E - What you know
A

A - Who you are
D - What you have
E - What you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do virtual smart cards use for authentication?

Choices: 
A - TPM chip
B - Password
C - Biometrics
D - Card reader
A

A - TPM chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do physical smart cards use for authentication?

Choices: 
A - TPM chip
B - Password
C - Biometrics
D - Card reader
A

D - Card reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of server is used to authenticate outside connections to a network?

Choices: 
A - VPN
B - Web
C - WAP
D - RADIUS
A

D - RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which form of authentication is known as, who you are?

Choices: 
A - Passwords
B - Biometrics
C - Usernames
D - Smart Cards
A

B - Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When running an app that requires elevated privileges, which Windows feature should be used?

Choices: 
A - UAC
B - Run as
C - Safe Mode
D - Administrative Mode
A

B - Run as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When an administrator grants permissions on a folder to a group, which three permission levels are assigned by default?

Choices: 
A - Read
B - Write
C - Modify
D - Read & execute
E - List folder contents
A

A - Read
D - Read & execute
E - List folder contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two permission levels are available to assign to a user or group when creating a basic share on a folder?

Choices: 
A - Own
B - Read
C - Change
D - Read/Write
A

B - Read

D - Read/Write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which command is used to access the registry?

Choices: 
A - Regrun
B - Regedit
C - Registry
D - Regchange
A

B - Regedit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which registry hive stores file associations?

Choices: 
A - HKEY_USERS
B - HKEY_CLASSES_ROOT
C - HKEY_CURRENT_USER
D - HKEY_LOCAL_MACHINE
E - HKEY _CURRENT_CONFIG
A

B - HKEY_CLASSES_ROOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which are network authentication protocols? Choose two answers.

Choices: 
A - SSO
B - LDAP
C - NTLM
D - Kerberos
A

C - NTLM

D - Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Active Directory tool allows an administrator to create and run scripts for automation purposes?

Choices:
A - Active Directory Sites and Services
B - Active Directory Domains and Trusts
C - Active Directory Administrative Center
D - Active Directory Module for Windows PowerShell

A

D - Active Directory Module for Windows PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

From a folder’s properties, where can an administrator see which folder is a parent folder for inherited permissions?

Choices: 
A - Edit button on the Sharing tab
B - Edit button on the Security tab
C - Advanced button on the Sharing tab
D - Advanced button on the Security tab
A

D - Advanced button on the Security tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When copying a folder from one location to another, the folder’s permissions for the new copy are __________.

Choices: 
A - set to full control
B - the same as the original copy
C - inherited from its parent
D - nonexistent and must be reassigned
A

C - inherited from its parent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When moving a folder from one location to another on the same drive, the folder’s permissions __________.

Choices: 
A - remain the same
B - are inherited from its parent
C - are set to read-only for all groups
D - are nonexistent and must be assigned
A

A - remain the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a user is assigned to both the Users and Administrators groups, which permissions will the user have on a folder when both groups have permissions on that folder?

Choices:
A - The group with the most lenient permissions
B - The group with the strictest permissions
C - Inherited permissions from the folder’s parent
D - Cumulative permissions from both groups on the folder

A

D - Cumulative permissions from both groups on the folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

While in Advanced Security Settings, what should an administrator do to view advanced permissions for a specific user or group?

Choices:
A - Click the user or group
B - Double-click the user or group
C - Click the user or group and click Edit
D - Click the user or group and click View

A

B - Double-click the user or group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To delegate control on an organizational unit, an administrator should __________.

Choices: 
A - change folder ownership
B - change folder permissions
C - run the Delegation of Control Wizard
D - change the delegation settings on the Security tab
A

C - run the Delegation of Control Wizard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Strong passwords have at least __________ characters.

Choices: 
A - 7
B - 8
C - 10
D - 12
A

B - 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If a minimum password length is set to 0 in the Local Security Policy, what effect does that have on a password requirement?

Choices: 
A - None
B - A password is not allowed
C - A password is not required
D - A password is required but can be any length
A

C - A password is not required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An administrator wants to force users not to reuse an old password when changing a password. Which password policy should be set?

Choices: 
A - Minimum password age
B - Maximum password age
C - Enforce password history
D - Minimum password length
A

C - Enforce password history

22
Q

To prevent a user from quickly changing passwords in order to get around the Enforce password history policy, which password policy should be set?

Choices: 
A - Minimum password age
B - Maximum password age
C - Minimum password length
D - Password must meet complexity requirements
A

A - Minimum password age

23
Q

To lock a user out after a set number of failed logon attempts due to an incorrect password, which policy should be set?

Choices: 
A - Account lockout policy
B - Account lockout duration
C - Account lockout threshold
D - Reset account lockout counter after
A

C - Account lockout threshold

24
Q

On which Group Policy path will an administrator find the Account Policies area?

Choices:
A - User Configuration/Policies/Software Settings/Security Settings
B - User Configuration/Policies/Windows Settings/Security Settings
C - Computer Configuration/Policies/Software Settings/Security Settings
D - Computer Configuration/Policies/Windows Settings/Security Settings

A

D - Computer Configuration/Policies/Windows Settings/Security Settings

25
Q

Which type of password attack uses all possible combinations for a password?

Choices: 
A - Guessing Attack
B - Dictionary Attack
C - Social Engineering
D - Brute Force Attack
A

D - Brute Force Attack

26
Q

Users should be trained to give out passwords under what circumstance?

Choices: 
A - Never
B - When a website asks for it
C - When a supervisor asks for it
D - When a help desk agent asks for it
A

A - Never

27
Q

Which options are available for auditing? Choose two answers.

Choices: 
A - Read
B - Write
C - Failure
D - Success
A

C - Failure

D - Success

28
Q

What is used to audit non-Active Directory objects?

Choices: 
A - System
B - Object access
C - Process tracking
D - Directory service access
A

B - Object access

29
Q

Which tab under Properties holds the settings for turning on auditing for a folder?

Choices: 
A - Sharing
B - General
C - Security
D - Customize
A

C - Security

30
Q

Which administrative tool is used to read auditing logs?

Choices: 
A - Syslog
B - Group Policy
C - Event Viewer
D - Local Security Policy
A

C - Event Viewer

31
Q

Where are permissions set for viewing audit logs?

Choices: 
A - In the Event Viewer
B - In the Audit log settings
C - In the Security log settings
D - On the folder storing the logs
A

D - On the folder storing the logs

32
Q

The __________ encryption method allows a user to copy and paste folders while still maintaining the encryption.

Choices: 
A - BitLocker
B - EFS
C - TPM
D - TLS
A

B - EFS

33
Q

Which encryption method is used to encrypt an external hard drive?

Choices: 
A - EFS
B - BitLocker TPM
C - BitLocker Drives
D - BitLocker To Go
A

D - BitLocker To Go

34
Q

SSL is an example of which kind of encryption?

Choices: 
A - Hardware-based encryption
B - Mail encryption
C - Virtual private network
D - Software-based encryption
A

D - Software-based encryption

35
Q

What are the two main methods used to encrypt email?

Choices: 
A - PGP
B - SSID
C - S/MIME
D - SSTP
E - PAP
A

A - PGP

C - S/MIME

36
Q

Which are VPN authentication forms? Choose four answers.

Choices: 
A - CHAP
B - EAP-MS-CHAPv2
C - IKEv2
D - MS-CHAPv2
E - L2TP
F - PAP
A

A - CHAP
B - EAP-MS-CHAPv2
D - MS-CHAPv2
F - PAP

37
Q

__________ keys are usually used to encrypt data. __________ keys are usually used to decrypt data.

Choices: 
A - Public, Private
B - Public, Symmetric
C - Symmetric, Private
D - Symmetric, Asymmetric
A

A - Public, Private

38
Q

Which of these encryption methods uses block ciphers? Choose three answers.

Choices: 
A - TLS
B - AES
C - DES
D - SSL
E - 3DES
A

B - AES
C - DES
E - 3DES

39
Q

Which three types of encryption are asymmetric?

Choices: 
A - SSL
B - DES
C - PGP
D - TLS
E - TKIP
A

A - SSL
C - PGP
D - TLS

40
Q

Which of the following formats allows exporting for both private keys and certificates?

Choices: 
A - Base64-encoded x.509
B - DER-encoded binary x.509
C - PKCS #7
D - PKCS #12
A

D - PKCS #12

41
Q

When viewing a certificate, under which two tabs can you find the expiration dates for that certificate?

Choices: 
A - Certification Path
B - Logins
C - General
D - Default Encoding
E - Details
A

C - General

E - Details

42
Q

Certificates that are revoked or expired are stored in which part of a PKI?

Choices: 
A - CPF
B - RA
C - CA
D - CRL
A

D - CRL

43
Q

____________ uses code integrity policies to lock devices to run only trusted apps.

Choices: 
A - EM Shielding
B - Device Guard
C - Device Identifier
D - Block Device
A

B - Device Guard

44
Q

Buffer overflow malware can attack by attempting to fill a(n) __________ field with a number outside the __________ range.

Choices: 
A - integer, integer
B - integer, number
C - buffer, number
D - buffer, integer
A

A - integer, integer

45
Q

What type of virus changes constantly to deceive antivirus software?

Choices: 
A - Hoax virus
B - Polymorphic virus
C - Trojan horse
D - Dynamic virus
A

B - Polymorphic virus

46
Q

A user calls a help desk and states that an antivirus program downloaded is not actually an antivirus program. What does the user have?

Choices: 
A - Worm
B - Virus
C - Trojan horse
D - Zero day attack
A

C - Trojan horse

47
Q

__________ is a type of malware used to collect personal information and send the info to a third party.

Choices: 
A - Adware
B - Spyware
C - Rootkit
D - Ransomware
A

B - Spyware

48
Q

Which of these describe common types of ransomware? Choose two answers.

Choices: 
A - Scareware
B - Crackware
C - Registry lock
D - Encryption
E - Lockscreen
A

D - Encryption

E - Lockscreen

49
Q

A user complains that newly installed software is displaying advertisements at the top of the screen. Which of the following has most likely been installed?

Choices: 
A - Virus
B - Spyware
C - Adware
D - Worm
A

C - Adware

50
Q

Which of the following describes a class of malware that creates hidden openings in the OS?

Choices: 
A - Backdoor
B - Directory traversal
C - OpenPGP
D - Trojan horse
A

A - Backdoor

51
Q

Which of the following malware types causes security breaches that have not yet been identified by credible sources?

Choices: 
A - Logic bomb
B - Polymorphic
C - Zero day attack
D - Hoax
A

C - Zero day attack