chapter 16

Ace your homework & exams now with Quizwiz!

A hidden share is a folder whose folder share name ends with a _____ symbol.

$

Windows 10 Version _________ and higher does not support homegroups.

1803

Which of the following security settings can best help minimize brute force attacks on local user account passwords?

Account lockout threshold

As an __________________ user, you might be allowed to use File Explorer or Windows Explorer to view shared folders and files on the remote computer, but you cannot access them

Anonymous

To which group does Windows give access to folders that you create which are not part of your user profile?

Authenticated Users

An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power User's group. What is the purpose of the Power Users group in Windows 7 and later?

Backward compatibility for legacy operating systems and applications

You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?

BitLocker

This encrypts data on a USB flash drive and restricts access by requiring a password:

BitLocker To Go

Scenario: A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

Click the advanced button to open advanced security settings for the file

Scenario: Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script

Scenario: Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?

Configure logon time restrictions

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Disable AutoRun

Scenario: You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it

Active Directory _______________________ (AD DS) authenticates accounts and authorizes what these accounts can do. (two word answer)

Domain Services

you have received several trouble tickets from the employees in the warehouse for the stand alone computers used to control various shipping machines because the computer are not booting when powered. each time a technician resolves the booting issue the boot order is changes in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?

Enable the supervisor password in the BIOS/ UEFI setup

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

Guest group

For Windows 8/7, when all users on a network require the same access to all resources, what simple type of network model should you use?

Homegroup

Your computer has a single HDD formatted with NTFS with the following data folders: - C:\Documents - C:\ Pictures You create a new child folder under the C:\ Documents folder What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Inherited permissions

You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. which procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

Lengthened the time period between forced passwords changes

Windows 10 features what new web browser, which is designed to replace Internet Explorer?

Microsoft Edge

What type of permission should you set to control access to files and folders by local and network users?

NTFS on NTFS volumes only

a method to control access to a folder or file and can apply to local users and network users

NTFS permissions

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?

Network printer

a group that exists on Windows 8/7/Vista for backward compatibility purposes with Windows XP

Power Users

gives a user access to a Windows desktop from anywhere on the Internet

Remote Desktop Connection

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?

Share the folder or volume on the file server that will store the shared data files.

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

TPM

You are having difficulty changing permissions for a folder on an NTFS volume that was created bu another user. How can you best solve this issue without losing data in the folder?

Take ownership of the folder and then change permissions

A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

The Lock Screen timeout setting needs to be made in the AD OU GPO

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied?

The file will lose all permissions

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?

The technician should be setting NTFS permissions instead of using Group Policy

Administrative shares are hidden by default

True

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.

True

When working with a workgroup, private data for an individual user is best kept in the C:\__________ folder for that user.

Users

configuring a computer so that it will respond to network activity when the computer is in a sleep state

Wake on LAN

A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?

Windows Home editions do not support EFS

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

\\server\sharedfolder

What statement about user accounts and groups is NOT true?

a user account can belong to only one group at a time

Scenario: A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks You need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)

a. Require user account passwords. d. Require strong passwords. f. Set failed logon restrictions

the folders that are shared by default on a network domain that administrator accounts can access

administrative shares

The best protection for computer resources is layered protection. When securing a workstation, use as many layers of protection as you reasonably can that are justified by the value of the resources you are protecting. These layers are collectively called ______.

defense in depth

Active Directory (AD) is a suite of services and databases provided by Windows Server that is used to manage Windows __________, including resource access and what users and computers can do.

domains

Users and resources of a company or school managed by AD are organized into a _____________ (the entire enterprise)

forest

Use the ______ command to view a list of shared folders and volumes.

fsmgmt.msc

A subset of policies in Group Policies that applies only to the local computer or local user

gpedit.msc

refreshes local group policies as well as group policies set in Active Directory

gpupdate

When utilizing both share and NTFS permissions, what statement is inaccurate?

if Both permissions are used, the least restrictive permission between the two applies

permissions assigned by Windows that are attained from a parent object

inherited permissions

The principle of _________________________ is an approach to permissions in which a user is given only the permissions required to perform her job and no more. (two word answer)

least privilege

Account ______ sets the maximum number of failed logon attempts before the account is locked. (two word answer)

lockout threshold

A ____ script is a list of command stored in a script file that is performed each time a user signs in to Windows.

logon

What command launches the Remote Desktop client for Windows?

mstsc

Drive mapping is managed by a Windows component called the ____________________________ or NFS.

network file system

When using Group Policy to configure QoS, what options are available? (Choose all that apply.)

outbound traffic can be throttled, the priority is a number from 0 and 63

________________________________ are assigned to an account, and ________ are assigned to data files and folders.

privileges; permissions

AD is able to change a home folder location away from a user's local folder to a share on the network. This is called folder ________________.

redirection

What statement about controlling access to folders and files is accurate?

rights are assigned to accounts

a subset of policies in Local Group Policy that applies only to a local computer's Windows security settings

secpol.msc

a method to control access to a shared folder and can be assigned to NTFS or FAT volumes

share permissions

Which of the following best meets the requirements of a strong password?

t*M&2.zY7

What is a valid reason for wanting to configure a proxy server via browser (Such as IE)

to connect to secured websites on a corporate network VPN

Windows Firewall is automatically configured when you set up your security level for a new network connection.

true

Which of the following are true about NTFS permissions?

when a subfolder is created, it is assigned the permissions of its parent folder, if NTFS permissions conflict locally, the more liberal permission applies

What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)

write and read


Related study sets

Porth's PrepU: Chapter 41: Disorders of Renal Function

View Set

NR340 Exam II Practice Questions

View Set

Biological Foundations of Behavior Test questions

View Set

Intermediate Accounting Chapters 1-3 exam

View Set

The Notorious Jumping Frog of Calaveras County

View Set

Chapter 51: Assessment and Management of Patients With Diabetes

View Set