Final 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

If your Internet home page has changed and a strange-looking search engine appears when you try to search the Internet, what type of attack are you experiencing?

A redirect virus.

Which of the following security settings can best help minimize brute force attacks on local user account passwords?

Account lockout threshold

What are some of the responsibilities of the kernel during the startup process?

Activates the HAL starts critical services Starts the Session Manager

As Windows 10 is loading, assuming it is enabled, what will happen when F8 is pressed?

Advanced Boot Options screen appears

As an __________________ user, you might be allowed to use File Explorer or Windows Explorer to view shared folders and files on the remote computer, but you cannot access them

Anonymous

To which group does Windows give access to folders that you create which are not part of your user profile?

Authenticated Users

Scenario: An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later?

Backward compatibility for legacy operating systems and applications.

You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?

BitLocker

This encrypts data on a USB flash drive and restricts access by requiring a password:

BitLocker To Go

When you Enable Boot Logging, all files used for the load are recorded in this file:

C:\Windows\Ntbtlog.txt

Where is the Windows system registry hive?

C:\Windows\System32\Config

Registry files, if deleted, can be restored from those saved in what folder?

C:\Windows\System32\Config\RegBack

Scenario: A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

Click the Advanced button to open Advanced Security Settings for the file.

Scenario: Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script.

Scenario: Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?

Configure logon time restrictions.

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Disable AutoRun.

Scenario: You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it.

Active Directory ___Blank 1___ ___Blank 2___ (AD DS) authenticates accounts and authorizes what these accounts can do.

Domain Services

What events can occur during BootMgr's role in startup? (Choose all that apply.)

Dual-boot menu is displayed the settings in the BCD are read

Scenario: Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy's supervisor has asked her to make sure this does not happen again. What is the first thing Tracy should do to prevent this problem from happening again?

Email filtering

Scenario: You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?

Enable the supervisor password in the BIOS/UEFI setup.

There is no option for networking access when using Safe Mode.

False

Which of the following user accounts are created automatically and disabled by default when Windows is installed?

Guest

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

Guests group

Which of the following text error messages can indicate that BIOS/UEFI could not find a hard drive?

Hard drive not found No boot device found

For Windows 8/7, when all users on a network require the same access to all resources, what simple type of network model should you use?

Homegroup

Scenario: Your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Inherited permissions

Scenario: Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains. What can you tell Sara about the ESP partition?

It was created by GPT to store Windows boot and startup files.

Scenario: You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

Lengthen the time period between forced password changes.

What Windows process is responsible for authenticating users?

Lsass.exe

Windows 10 features what new web browser (be default), which is designed to replace Internet Explorer?

Microsoft Edge

What error messages are likely to appear if the BIOS/UEFI cannot find a Windows Boot Manager or cannot turn over operations to the boot manager?

Missing operating system Error loading operating system Invalid partition table

What type of permission should you set to control access to files and folders by local and network users?

NTFS on NTFS volumes only

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?

Network printer

What is the file name given to the Windows kernel?

Ntoskrnl.exe

___Blank 1___ are assigned to an account, and ___Blank 2___ are assigned to data files and folders

Privileges, permissions

Scenario: Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network. ​ What type of service is Jennifer's company using?

RADIUS

Scenario: Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach?

Repair upgrade

Scenario: A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks You need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)

Require strong passwords. Set failed logon restrictions. Require user account passwords.

Scenario: The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?

Share the folder or volume on the file server that will store the shared data files.

Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?

Smss.exe

A warm boot is also known as ______ boot. A cold boot is also known as ______ boot.

Soft Boot Hard Boot

What is responsible for getting a system up and going and finding an OS to load?

Startup BIOS/UEFI

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

TPM

Scenario: You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?

Take ownership of the folder and then change permissions.

Scenario: A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

The Lock Screen timeout setting needs to be made in the AD OU GPO.

Scenario: A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied?

The file will lose all permissions.

Why does a normal hard boot take longer than a normal soft boot?

The initial steps must be performed by the BIOS/UEFI

Scenario: A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?

The technician should be setting NTFS permissions instead of using Group Policy.

Scenario: A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?

The user had previously encrypted her data files and folders using EFS.

A Windows 7 system repair disc can be created using the Backup and Restore utility.

True

Administrative shares are hidden by default.

True

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.

True

If your problem is caused by a bad hardware or software installation and you get an error message the first time you restart the system after the installation, using the Last Known Good Configuration can, in effect, undo your installation and solve your problem.

True

Turn off System Protection when attempting to get rid of malware.

True

Windows 10 automatically launches diagnostic and repair procedures after several restarts within a few minutes

True

Windows Firewall is automatically configured when you set up your security level for a new network connection.

True

Windows RE provides a graphical and command-line interface.

True

Scenario: Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?

Use Safe Mode to boot.

A hidden share is a folder whose folder share name ends with a _$_ symbol.

Windows Firewall is automatically configured when you set up your security level for a new network connection.

Scenario: A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?

Windows Home editions do not support EFS.

What tool can you use to create a bootable flash drive in Windows 10?

Windows Media Creation tool

Where can you go to look up a device driver's filename to determine what device uses the device driver?

Windows\System32\drivers folder

What NTFS permissions should you assign if the following user: create folders and files open files to read data not delete files not run programs in a folder (Choose all that apply.)

Write Read

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

\\server\sharedfolder

What statement about user accounts and groups is NOT true?

a user account can belong to only one group at a time

A Windows 10/8 recovery drive is a ______ USB flash drive that can access Windows 10/8 repair tools It is handy when you need to repair a computer that doesn't have an optical drive.

bootable

What command can be used to scan for Windows installations not stored in the BCD?

bootrec /fixboot

What command can be used to check for file system errors?

chkdsk /r

What diskpart command should be used to remove volume information from a selected disk?

clean

The best protection for computer resources is layered protection. When securing a workstation, use as many layers of protection as you reasonably can that are justified by the value of the resources you are protecting. These layers are collectively called __Blank 1__ __Blank 2__ __Blank 3__.

defense in depth.

What command can be used to totally wipe a hard drive clean, including the partitioning system?

diskpart

Which of the following are true about NTFS permissions? (Choose all that apply.)

if NTFS permissions conflict locally, the more liberal permission applies when a subfolder is created, it is assigned the permissions of its parent folder

When utilizing both share and NTFS permissions, what statement is inaccurate?

if both permissions are used, the least restrictive permission between the two applies

The principle of __Blank 1__ __Blank 2__ is an approach to permissions in which a user is given only the permissions required to perform her job and no more. Two-word answer; spelling counts

least privilege

Account __Blank 1__ __Blank 2__ sets the maximum number of failed logon attempts before the account is locked.

lockout threshold

What command launches the Remote Desktop client for Windows?

mstsc

What statement about controlling access to folders and files is accurate?

rights are assigned to accounts

If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?

sfc /scannow

What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows 7 startup process?

spacebar

Which of the following best meets the requirements of a strong password?

t*M&2.zY7

What is a valid reason for wanting to configure a proxy server via browser

to connect to secured websites on a corporate network VPN

What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI?

winresume.exe (BIOS) winresume.efi (UEFI)


Conjuntos de estudio relacionados

Environmental Studies 112 Quiz 4

View Set

QuickBooks Inuit Certification 2nd Try

View Set

RAD REVIEW 4.2: Equipment Operation and Quality

View Set

Chapter 29, EMT Chapter 29: Chest Injuries

View Set

MEEB Chapter 13 - FIRE PROTECTION

View Set

Lesson 3: underwriting and policy issue

View Set

N3 Quiz 6 End of Life Palliative Care

View Set