Chapter 5,6 Review Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer. T or F

False

allows multiple users to have applications running in the background on a Windows 10 computer at the same time

Fast user Switching

Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work?

Fast user switching

Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?

Guest

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

Hash

Which of the following is used to protect your computer from the malware that may attempt to steal your password?

Secure Sign-in

increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on

Secure sign-in

value assigned to each user account within the SAM database

Security identifier (SID)

are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.

Security templates

Which part of the motherboard in your computer is used to store encryption keys and certificates?

TPM

NTFS permissions can be easily circumvented when you have physical access to a computer. T or F

True

Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in. T or F

True

The most common use for AppLocker is malware prevention. T or F

True

With fast user switching, only one user can be actively using the computer at a time. T or F

True

A feature in Windows 10 that elevates user privileges only when required

User Account Control (UAC)

Which Control Panel applet is considered a simplified interface for user management?

User Accounts

Which of the following are required for individuals to log on to Windows 10 and use resources on the computer?

User accounts

is a method for protecting data on removable storage such as USB drives.

Bit locker to go

A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification

BitLocker Drive Encrpytion

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

BitLocker Drive Encryption

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

Account lockout

Which account is the most powerful local user account possible?

Administrator

An administrator account derives its privileges from being a member of which local group?

Administrators

In Windows 10, advanced audit polices can only be edited at a command-line. T or F

False

Local user accounts can be used to access resources on other computers in a workgroup or a domain. T or F

False

The Account Policies in the Local Security Policy can be used to control domain accounts. T or F

False

The Account policies in the local security policy can be used to control domain accounts. T or F

False

Which rule condition identifies software by file location?

path

A collection of desktop and environment configurations for a specific user or group of users.

user profile

a collection of desktop and environment configurations for a specific user or group of users

User profile

Which of the following profile that cannot be modified?

mandatory

The local security policy is part of a larger Windows management system known as which of the following?

Group Policy

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

10

What is the default value for the "Maximum password age" setting in the Password Policy?

42 days

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

Application Compatibility Toolkit

Which of the following can be used to define which programs allowed or disallowed in the system?

Applocker

What type of encryption algorithm uses two keys to encrypt and decrypt data?

Asymmetric

Which security process records the occurrence of specific operating system events in the Security log?

Auditing

Members of which of the following groups can back up and restore all files and folders on the computer?

Backup Operators

An encryption technology for individual files and folders that can be enabled by users

Encrypting File System (EFS)

The process of taking data and making it unreadable is known as which of the following?

Encryption

The Guest account derives all of its privileges' from being a member of the Guests group and which other group?

Everyone

What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and password on each computer?

Homegroup

When a Windows 10 computer is not part of an Active Directory domain, you can sign in by using a local user account or a ________________ account.

Microsoft

Newer Windows applications use an application ____ to describe the structure of an application.

Manifest

Which type of permissions are considered the most basic level of data security in Windows 10?

NTFS

a file that stores user-specific registry information

NTUSER.DAT

a standard process for creating names on a network or standalone computer

Naming Convention

The Account Policies category contains the __________________ policy and the account lockout policy.

Password

Which policy control password characteristics for local user accounts?

Password

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

Peer-to-peer

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer?

Performance Log Users

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs.

Performance Monitor Users

Which profile is different from other profiles because it is not a complete profile?

Public

a profile that is merged with all other user profiles

Public Profile

a user profile that is stored in a network location and is accessible from multiple computers

Roaming profile

Each time a user logs on locally, the ____ database is used to verify logon credentials.

SAM

Local user accounts are stored in the _____________ database.

SAM

A command-line tool that is used to apply, export, or analyze security templates

Secedit

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?

Shift

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?

Spyware

Which of the following is a threat to privacy and is sometimes installed when you visit a website?

Spyware

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

Symmetric

In Windows 10, the only supported method to configure the default profile is to use which utility?

Sysprep

Which of the following is considered one of the biggest sources of malware (malicious software)?

The Internet

Every object in Windows 10 has audit events related to it. T or F

True

In Windows 10, most actions that are triggered by an Administrative do not result in a prompt from User Account Control. T or F

True

A standard user account derives its privileges from being a member of the local _______________________ group.

Users

Automatic sign-in is configured on the _____________________________________ tab of the User Accounts applet.

Users

Anti-malware software included with Windows 10

Windows Defender

In Windows 10,___________________________________ provides both antivirus and antispyware capabilities.

Windows Defender

is an advanced sign-in option for configuring Windows 10 as a kiosk.

assigned access

Advanced auditing is enabled through the local security policy, by using Group policy, or by using __________________________.

auditpol.exe

Which profile is used when new user profiles are created ?

default

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?

privilege use

a profile that is merged with all other user profiles

public profile

Which profile is stored in a network location rather than on the local hard drive?

roaming


Set pelajaran terkait

Chapter 5 - Effects of Long-Term Exposure to Radiation

View Set

NU271 Week 3 PrepU: Oxygenation and Perfusion

View Set

Module 40: Basic Concepts of Psychological Disorders

View Set

Chapter 24: Fitness and Therapeutic Exercise

View Set