CpS 201- Quiz 6
What is the default value for the Maximum password age setting in the Password Policy?
42 days
Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware.Which of the following scans would you recommend to Jimmy?
A full scan
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?
Account Lockout
Which of the following can be used to define which programs are allowed or disallowed in the system?
AppLocker
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. Which of the following can you use to eliminate this error?
Application Compatibility Toolkit
What type of encryption algorithm uses two related, but unique, keys to encrypt and decrypt data?
Asymmetric
Which security process records the occurrence of specific operating system events in the Security log?
Auditing
Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization's network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN.Which of the following tools can Tobias use to overcome this issue?
BitLocker Network Unlock
Which of the following is a method for protecting data on removable storage, such as USB drives?
BitLocker To Go
Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots.Which of the following Windows Update settings should Diego modify?
Change active hours
Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data.Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?
Controlled folder access
Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive.If the file on the flash drive is encrypted, which of the following must be true?
Copying the file to the encrypted folder encrypted the file
Percy is configuring Advanced Audit Policy settings for Windows 10 clients in his organization.Which of the following event categories is Percy least likely to configure for these systems?
DS Access
Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update.Which of the following options should Yixuan use in this scenario?
Delivery optimization
The process of taking data and rendering it unreadable is known as which of the following?
Encryption
Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender.Which of the following settings should Kesha modify to solve this problem?
Exclusions
The Local Security Policy is part of a larger Windows management system known as which of the following?
Group Policy
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?
Hashing
Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.What should Sharon do next?
Import the recovery certificate into the local security policy as a data recovery agent
Account Policies settings are located in which of the following?
Local Security Policy
Mahima is configuring advanced audit policies for Windows 10 clients. She decides to configure the Privilege Use category.Which of the following justifies Mahima's decision to configure the settings under this category?
Mahima wants to track instances where users change the time zone on their systems
Which of the following do newer Windows applications use to describe the structure of an application?
Manifest
Which type of permissions is considered the most basic level of data security in Windows 10?
NTFS
Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware.If the malware is able to access and corrupt the system files, which of the following must be true?
On a prompt to continue or cancel running the program, Shawn selected to continue
Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week.Which of the following is most likely the reason that Orson is unable to open the file?
Orson reset the password of his Windows user account
Which policy controls password characteristics for local user accounts?
Password
Which rule condition identifies software by file location?
Path
Which advanced audit policy setting tracks when tasks are performed that require a user-rights assignment, such as changing the system time?
Privilege Use
Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions.Which of the following settings should Raphael modify to control this behavior?
Raphael should set the Minimum password age setting to at least 1 day
Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop.Which of the following settings should Hang leave turned on?
Receive updates for other Microsoft products when you update Windows
Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead.If Joanna's account already has administrative privileges, what can she do to resolve this issue?
She should use the Application Compatibility Toolkit to resolve the issue
What type of encryption algorithm uses the same key to encrypt data and decrypt data?
Symmetric
Which part of the motherboard in your computer is used to store encryption keys and certificates?
TPM
Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file.Which of the following prevented the AppLocker rules from being evaluated?
The Application Identity service is configured for Manual startup
Which of the following is considered one of the biggest sources of malware (malicious software)?
The Internet
Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer.If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?
The computer is marked as a trusted environment
Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match.Which of the following is true in this scenario?
The downloaded application has been modified from its original and authentic version
Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category.In order to complete this task, which of the following conditions should be met?
The files and folders must be on NTFS-formatted volumes
Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful.Which of the following is the most likely reason?
The hard drive does not contain a system volume
TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer.Which of the following indicates that this computer receives updates using Long Term Servicing Branch?
The operating system on the computer will receive Windows Updates for 10 years
Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers.Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?
These computers are running the Windows 10 Home edition
Esmeralda creates a rule with the Deny permission for photo.exe in the Executable Rules collection for a group with all users.Which of the following is true in this scenario?
Users will not be able to run other applications that do not have an Allow rule
Alex, a system administrator, wants to uninstall a Windows update that was recently installed on around 200 Windows 10 computers in the organization.Which of the following options is best suited to this scenario?
Using a batch script with wusaexe
An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant.To enable this application to run properly, which of the following UAC options should be enabled?
Virtualize file and registry write failures to per-user locations
Which of the following is true of BitLocker Drive Encryption?
When you use BitLocker Drive Encryption, an entire volume is encrypted