CIS 281 Test 2 Fall 2019

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Changes in the ownership of a file do not change the amount of data that is considered to belong to a user. True False

False

Files and folders on an NTFS file system in Windows 7 cannot use Unicode characters in the filename. True False

False

In Windows 10, advanced audit policies can only be edited at a command-line. True False

False

Local user accounts can be used to access resources on other computers in a workgroup or a domain. True False

False

The Account Policies in the Local Security Policy can be used to control domain accounts. True False

False

The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer. True False

False

When a new hard disk is added to a computer it is initially configured as a dynamic disk. True False

False

Every object in Windows 10 has audit events related to it. True False

True

In Windows 10, most actions that are triggered by an Administrator do not result in a prompt from User Account Control. True False

True

NTFS permissions can be easily circumvented when you have physical access to a computer. True False

True

NTFS stores files and folders in a way that looks very similar to the FAT file system. True False

True

Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in. True False

True

The choice of file system can limit the total amount of data stored in a partition or volume. True False

True

The most common use for AppLocker is malware prevention. True False

True

With fast user switching, only one user can be actively using the computer at a time. True False

True

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached? a. 10 b. 5 c. 25 d. 50

a. 10

Members of which of the following groups can back up and restore all files and folders on the computer? a. Backup Operators b. Cryptographic Operators c. Event Log Readers d. Distributed COM Users

a. Backup Operators

Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work? a. Fast user switching b. Automatic sign-in c. Secure sign-in d. Windows Welcome

a. Fast user switching

What will the Disk Management console report as the status of a disk when it recognizes that the disk does not belong to that computer? a. Foreign Disk b. Mounted Disk c. Bad Disk d. Unknown Disk

a. Foreign Disk

The local security policy is part of a larger Windows management system known as which of the following? a. Group Policy b. Network Policy c. Local Policy d. Domain Policy

a. Group Policy

What is the default value for the "Maximum password age" setting in the Password Policy? a. 45 days b. 30 days c. 42 days d. 0 days

c. 42 days

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs. a. Performance Monitor Users b. Event Log Readers c. Guests d. Performance Log Users

a. Performance Monitor Users

Which of the following is used to protect your computer from malware that may attempt to steal your password? a. Secure sign-in b. Windows Welcome c. Manual sign-in d. Fast user switching

a. Secure sign-in

Which NTFS feature allows an empty folder in an NTFS-formatted file system to point to another partition or volume in the local computer? a. Volume mount points b. Extendable partitions c. Shrinkable partitions d. Disk quotas

a. Volume mount points

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts? a. account lockout b. password c. domain d. group

a. account lockout

What type of encryption algorithm uses two keys to encrypt and decrypt data? a. asymmetric b. hash c. signing d. symmetric

a. asymmetric

What feature of NTFS allows a file or folder to point to another file or folder located somewhere else in the file system? a. symbolic links b. alternate data streams c. transactional NTFS d. volume mount points

a. symbolic links

Which of the following identifies who can perform a given action to a file or folder and is found in ACLs? a. Kerberos keys b. Access Control Entries (ACE) c. Access Entries Keys (AEK) d. digital certificates

b. Access Control Entries (ACE)

An administrator account derives its privileges from being a member of which local group? a. Guest b. Administrators c. Performance Monitor Users d. Users

b. Administrators

Which NTFS feature allows an administrator to restrict the amount of disk space used by a user? a. EFS b. Disk Quotas c. Symbolic links d. Permissions

b. Disk Quotas

The process of taking data and making it unreadable is known as which of the following? a. Verifying b. Encryption c. Signing d. Decryption

b. Encryption

Which file system was introduced with Windows 95 OSR2 to support hard disks that were becoming much larger than 2 GB in size. a. exFAT b. FAT32 c. FAT12 d. FAT16

b. FAT32

Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users? a. User b. Guest c. Administrator d. Root

b. Guest

Each time a user logs on locally, which database is used to verify sign-in credentials? a. SSID b. SAM c. SID d. NID

b. SAM

In Windows 10, the only supported method to configure the default profile is to use which utility? a. the User Manager b. Sysprep c. the Account Manager d. the User Profiles applet

b. Sysprep

Which of the following are required for individuals to log on to Windows 10 and use resources on the computer? a. Public keys b. User accounts c. Digital certificates d. IP addresses

b. User accounts

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted? a. symmetric b. hash c. asymmetric d. signing

b. hash

Newer Windows applications use which of the following to describe the structure of an application? a. hash b. manifest c. record d. log

b. manifest

Which rule condition identifies software by file location? a. publisher b. path c. file hash d. certificate

b. path

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? a. Administrative Privileges Toolkit b. Secure Toolkit c. Application Compatibility Toolkit d. Private Toolkit

c. Application Compatibility Toolkit

Which security process records the occurrence of specific operating system events in the Security log? a. Encrypting b. Filtering c. Auditing d. Hashing

c. Auditing

Which NTFS system file keeps a record of all the clusters that are considered unusable by the file system within that volume? a. Sector File b. Transactional NTFS c. Bad Cluster File d. Master File Table

c. Bad Cluster File

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10? a. NAP b. TPM c. BitLocker Drive Encryption d. Dual Locked Hard Drive

c. BitLocker Drive Encryption

What feature of NTFS encrypts the contents of files? a. Compression b. Alternate data streams c. EFS d. Unicode

c. EFS

The Guest account derives all of its privileges from being a member of the Guests group and which other group? a. User b. Domain c. Everyone d. Initial

c. Everyone

Which type of permissions are considered the most basic level of data security in Windows 10? a. FAT b. NAP c. NTFS d. EFS

c. NTFS

Which file system is designed to verify and autocorrect data faults on the volume without having to bring the volume down for maintenance? a. FAT32 b. NTFS c. ReFS d. exFAT

c. ReFS

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior? a. Adware b. Worm c. Spyware d. Virus

c. Spyware

Which of the following is a threat to privacy and is sometimes installed when you visit a website? a. Macro script b. EFS c. Spyware d. Windows Defender

c. Spyware

Until a new disk is initialized, what is its status reported as? a. Active b. Ready c. Unknown d. Connected

c. Unknown

Which Control Panel applet is considered a simplified interface for user management? a. Privileges b. Permissions c. User Accounts d. Accounts

c. User Accounts

Which NTFS permission allows a user to open and make changes to files but not delete them? a. Modify b. Read & execute c. Write d. Full Control

c. Write

Which profile is used when new user profiles are created? a. mandatory b. roaming c. default d. public

c. default

Account policies settings are located in which of the following? a. NAP b. remote policy c. local security policy d. EFS security policy

c. local security policy

Which policy controls password characteristics for local user accounts? a. domain b. account lockout c. password d. user control

c. password

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time? a. object access b. process tracking c. privilege use d. account management

c. privilege use

Which profile is different from other profiles because it is not a complete profile? a. default b. roaming c. public d. mandatory

c. public

Which of the following is considered one of the biggest sources of malware (malicious software)? a. a cloud library b. a router c. the Internet d. a hard disk

c. the Internet

Which account is the most powerful local user account possible? a. Guest b. Installation c. Initial d. Administrator

d. Administrator

Which of the following can be used to define which programs are allowed or disallowed in the system? a. A network zone b. Software restriction policies c. Local policies d. AppLocker

d. AppLocker

Which of the following types of storage can be partitioned using MBR or GPT and are supported by all versions of Windows? a. Dynamic disk b. Virtual disk c. Smart disk d. Basic disk

d. Basic disk

To see the permissions a user has to a file that takes into account their group memberships, what tab should you open in the Advanced Security Settings window for the file? a. Standard Permissions b. Auditing c. Special Permissions d. Effective Access

d. Effective Access

What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer? a. Personal User Password b. Game control c. Pass-through authentication d. HomeGroup

d. HomeGroup

You must right-click the disk in the graphical portion of Disk Management and select which of the following from the pop-up menu to initiate the import process? a. Unknown Disk b. Bad Disk c. Foreign Disk d. Import Foreign Disk

d. Import Foreign Disk

Which of the following storage space types can only be created with three or more physical disks? a. Simple b. Two-way mirror c. Three-way mirror d. Parity

d. Parity

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? a. Event Log Readers b. Guests c. IIS_IUSRS d. Performance Log Users

d. Performance Log Users

What is a mirrored volume also known as? a. RAID -1 b. RAID 0 c. RAID 5 d. RAID 1

d. RAID 1

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? a. Ctrl b. Esc c. Alt d. Shift

d. Shift

Which part of the motherboard in your computer is used to store encryption keys and certificates? a. NTFS b. NAP c. EFS d. TPM

d. TPM

With which Windows version was NTFS first introduced? a. Windows 95 b. Windows XP c. Windows 2000 d. Windows NT

d. Windows NT

When you format a drive, you must choose the size of which of the following file system attributes? a. sector b. table c. track d. cluster

d. cluster

What utility should you use to perform a series of disk maintenance activities as part of a scheduled task? a. Disk Management b. schedule.exe c. Computer Management d. diskpart.exe

d. diskpart.exe

Which of the following is a profile that cannot be modified? Answers: a. default b. public c. roaming d. mandatory

d. mandatory

Most of the partition attributes are stored in a data table that is part of the MBR or GPT specification. What is this table is commonly called? a. boot table b. division table c. sector table d. partition table

d. partition table

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information? a. domain-based b. server-based c. centralized d. peer-to-peer

d. peer-to-peer

Which profile is stored in a network location rather than on the local hard drive? a. public b. default c. mandatory d. roaming

d. roaming

What type of encryption algorithm uses the same key to encrypt data and decrypt data? a. hash b. asymmetric c. signing d. symmetric

d. symmetric

On dynamic disks, the term partition is not used to define the space where a file system is installed. What term is used? a. sectors b. tracks c. mirrors d. volumes

d. volumes


संबंधित स्टडी सेट्स

4102 Chapter 3 & 4, 4102 Chapter 5, 4102 Chapter 7, 4102 Chapter 6, 4102 Chapter 2, 4102 chapter 1

View Set

commercial package policy (property)

View Set

Financial Ratios Rough Guidelines

View Set

Agile Scrum Foundation Certification Prep

View Set