CpS 201- Quiz 6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the default value for the Maximum password age setting in the Password Policy?

42 days

Jimmy downloaded a game from the Internet and installed it on his Windows 10 system. A couple of days after the installation, his computer's performance degraded drastically. Assuming that the game had slowed it down, he uninstalled the game and used software to get rid of residual files. Despite this, his computer's performance did not improve. Inspecting the Resource Monitor revealed that the Memory and CPU were running close to 100% capacity. He suspects that the computer is infected with malware.Which of the following scans would you recommend to Jimmy?

A full scan

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect sign-in attempts?

Account Lockout

Which of the following can be used to define which programs are allowed or disallowed in the system?

AppLocker

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. Which of the following can you use to eliminate this error?

Application Compatibility Toolkit

What type of encryption algorithm uses two related, but unique, keys to encrypt and decrypt data?

Asymmetric

Which security process records the occurrence of specific operating system events in the Security log?

Auditing

Tobias, a system administrator at a pharmaceutical company, uses BitLocker Drive Encryption to encrypt all Windows 10 computers in the organization. Because the computers contain sensitive information, users must enter a PIN to start the system. While this is a useful security feature when the computers are disconnected from the organization's network, this becomes a hindrance in performing remote maintenance because Tobias cannot start these computers without entering the PIN.Which of the following tools can Tobias use to overcome this issue?

BitLocker Network Unlock

Which of the following is a method for protecting data on removable storage, such as USB drives?

BitLocker To Go

Diego has the Windows 10 Home edition installed on his personal laptop. As an avid gamer, he prefers having his computer update with the latest feature updates from Microsoft. He usually plays games at specific times, and he wants to prevent his computer from restarting to install an update during these time slots.Which of the following Windows Update settings should Diego modify?

Change active hours

Oshane is configuring security settings on his computer. Recently, his friend's computer was attacked by malware that encrypted data on all the hard disks and demanded a cryptocurrency ransom to decrypt this data.Which of the following options in Windows 10 is the best option to help Oshane avoid a similar situation?

Controlled folder access

Veronica copies an unencrypted file from one partition on her hard drive to an encrypted folder on another partition. From there, she moves the file to a folder on a flash drive.If the file on the flash drive is encrypted, which of the following must be true?

Copying the file to the encrypted folder encrypted the file

Percy is configuring Advanced Audit Policy settings for Windows 10 clients in his organization.Which of the following event categories is Percy least likely to configure for these systems?

DS Access

Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update.Which of the following options should Yixuan use in this scenario?

Delivery optimization

The process of taking data and rendering it unreadable is known as which of the following?

Encryption

Kesha spends time analyzing datasets that are larger than 1 TB in job as a data scientist. This data is stored in databases on her Windows 10 system. While running an analysis on these databases, she does not want her code to be slowed down because of real-time scanning by Windows Defender.Which of the following settings should Kesha modify to solve this problem?

Exclusions

The Local Security Policy is part of a larger Windows management system known as which of the following?

Group Policy

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

Hashing

Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.What should Sharon do next?

Import the recovery certificate into the local security policy as a data recovery agent

Account Policies settings are located in which of the following?

Local Security Policy

Mahima is configuring advanced audit policies for Windows 10 clients. She decides to configure the Privilege Use category.Which of the following justifies Mahima's decision to configure the settings under this category?

Mahima wants to track instances where users change the time zone on their systems

Which of the following do newer Windows applications use to describe the structure of an application?

Manifest

Which type of permissions is considered the most basic level of data security in Windows 10?

NTFS

Shawn signs into a Windows 10 system with administrative user privileges. The system has UAC enabled. Shawn accidently launches a malicious application that is infected with malware.If the malware is able to access and corrupt the system files, which of the following must be true?

On a prompt to continue or cancel running the program, Shawn selected to continue

Orson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week.Which of the following is most likely the reason that Orson is unable to open the file?

Orson reset the password of his Windows user account

Which policy controls password characteristics for local user accounts?

Password

Which rule condition identifies software by file location?

Path

Which advanced audit policy setting tracks when tasks are performed that require a user-rights assignment, such as changing the system time?

Privilege Use

Raphael, a system administrator, is setting up the password policy for local user accounts. He allows users to reuse a password after they have used 4 different passwords. He also modifies the policy to force users to change their old passwords every 60 days. After some time, he notices that users are modifying their passwords 4 times in a short time span and continuing to use their old passwords. This defeats the purpose of setting up the password restrictions.Which of the following settings should Raphael modify to control this behavior?

Raphael should set the Minimum password age setting to at least 1 day

Hang owns a Windows 10 laptop that does not have any issues. She is configuring Windows Update settings on this laptop.Which of the following settings should Hang leave turned on?

Receive updates for other Microsoft products when you update Windows

Joanna, a graphic designer at ChromaStage, has an application installed on her UAC-enabled Windows 10 system that was designed for an older version of Windows. Some of the application's features require administrative privileges. When she tries running the application, the application fails to run and generates an error instead.If Joanna's account already has administrative privileges, what can she do to resolve this issue?

She should use the Application Compatibility Toolkit to resolve the issue

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

Symmetric

Which part of the motherboard in your computer is used to store encryption keys and certificates?

TPM

Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file.Which of the following prevented the AppLocker rules from being evaluated?

The Application Identity service is configured for Manual startup

Which of the following is considered one of the biggest sources of malware (malicious software)?

The Internet

Dorothy, a system administrator, uses BitLocker To Go to protect USB drives that are used in the organization. She chooses the Use a password to unlock the drive option when picking between unlocking options. Warren wants to print some files, so he copies these files from his work laptop onto a USB drive. Next, he plugs in this drive on a computer that is connected to a printer.If Warren is able to print the files on the USB drive successfully without entering any password, which of the following must be true of the computer connected to the printer?

The computer is marked as a trusted environment

Oluseyi receives a link to a free download of a premium application in his email. He clicks the link and the application downloads. Before installing it, he wants to verify the authenticity of the download. He verifies the MD5 value of the downloaded application against the MD5 value listed for the application on the original website. The MD5 values do not match.Which of the following is true in this scenario?

The downloaded application has been modified from its original and authentic version

Macy works as a system administrator at an accounting firm. Sensitive data is stored on all Windows 10 client systems. She wants to audit all access to files on these systems, so she decides to edit the Global Object Access Auditing category.In order to complete this task, which of the following conditions should be met?

The files and folders must be on NTFS-formatted volumes

Vishal is considering switching to BitLocker Drive Encryption because of the inefficiencies of EFS. When he tries to use this encryption feature on Windows 10 Professional, he is unsuccessful.Which of the following is the most likely reason?

The hard drive does not contain a system volume

TropicMaze is a manufacturer of processed foods. The packaging at the plant is automated by machines that are controlled by a Windows 10 computer.Which of the following indicates that this computer receives updates using Long Term Servicing Branch?

The operating system on the computer will receive Windows Updates for 10 years

Hannah, a system administrator, wants to use Windows Update for Business in her organization to control updates for Windows 10 systems. While she is able to use Group Policy to apply these settings to most computers, she is unable to apply these settings to some computers.Which of the following is the most likely reason that Hannah is not able to apply the Windows Update for Business settings to these computers?

These computers are running the Windows 10 Home edition

Esmeralda creates a rule with the Deny permission for photo.exe in the Executable Rules collection for a group with all users.Which of the following is true in this scenario?

Users will not be able to run other applications that do not have an Allow rule

Alex, a system administrator, wants to uninstall a Windows update that was recently installed on around 200 Windows 10 computers in the organization.Which of the following options is best suited to this scenario?

Using a batch script with wusaexe

An application installed on a Windows 10 system requires access to restricted areas on the system to place user data. However, this application is not UAC compliant.To enable this application to run properly, which of the following UAC options should be enabled?

Virtualize file and registry write failures to per-user locations

Which of the following is true of BitLocker Drive Encryption?

When you use BitLocker Drive Encryption, an entire volume is encrypted


Kaugnay na mga set ng pag-aaral

Missouri Statutes, Rules and Regulations Pertinent to Life Only: Practice Questions

View Set

Saunders: Maternal nursing questions

View Set

Targeted Medical Surgical Cardiovascular Online Practice 2019

View Set

Data Structures and algorithms interview questions

View Set

Chapter 10 : nervous system: nervous tissue and brain

View Set

Brain and Cranial Nerves (1) (exam 2)

View Set

State Final Review (excluding high liability)

View Set