Test 1 - Windows Security
Which of the following exists to provide functionality to end users?
Client
Which of the following refers to the assurance that information can be modified only by authorized users?
Integrity
Geraldo is an incident response team member. A suspected attack occurred. Geraldo has been monitoring logs for abnormal activity. What is the next step of the Discovery-Analysis-Remediation?
Analyze
Which of the following is the Windows Server 2019 edition designed for large-scale deployment on servers that support extensive virtualization?
Datacenter
Which of the following is defined as a collection of strategies intended to make a computer environment safe?
Defense in depth
Which of the following is defined as any action that dramatically slows down or blocks access to one or more resources?
Denial of service (DoS) attack
Which control discovers an action that has occurred?
Detective control
Which of the following refers to technical controls?
Devices or processes that limit access to resources
What is an example of a physical control?
Fire extinguisher
Your computer network has been successfully attacked. What should you accomplish during the remediation phase of the discovery-analysis-remediation cycle?
Implement controls to prevent a successful attack.
Which of the following describes a family of attacks that depend on the ability to send instructions to a software application that cause the application to carry out unintended actions?
Injection
Alice works in the corporate legal office. She is reviewing sections of the Microsoft End-User License Agreement (EULA). She is specifically looking to answer what costs can be recovered as a result of a Windows fault or incident. What section answers Alice's concerns?
Limited Warranty
Dafne is an IT manager. She needs to acquire 10 new workstation computers for employee use. She wants the workstations to have the latest client operating system. Which of the following should she select?
Microsoft Windows 10
Which type of attack generally starts with a message that contains a link or image to click, or a file to open?
Phishing
Locky and WannaCry are types of ________.
Ransomware
What term is defined as any exposure to a threat?
Risk
Which of the following best describes confidentiality, availability, and integrity (the C-I-A triad)?
Tenets of information security
Erwin is the security analyst for a small company. His logs reveal evidence that a session hijacking attack likely occurred. What assumptions might Erwin make as a result of this attack?
Users' credentials might be compromised
A successful attack is defined as one that realizes, or carries out, a threat against ________.
Vulnerabilities
Bob is a security analyst scanning for vulnerabilities on a Windows print server. He discovers the print server is vulnerable to the exploit EternalBlue. Which of the following is Bob concerned could exploit this print server?
WannaCry