Windows Configuration: Windows 10 - Chapter 5-6

25 July 2022
4.7 (114 reviews)
45 test answers

Unlock all answers in this set

Unlock answers (41)
question
T/F With fast user switching, only one user can be actively using the computer at a time
answer
TRUE
question
T/F The administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.
answer
FALSE
question
T/F Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.
answer
TRUE
question
T/F Local user account can be used to access resources on other computers in a workgroup or a domain.
answer
FALSE
question
T/F NTFS permissions can be easily circumvented when you have a physical access to a computer.
answer
TRUE
question
The Guest account derives all of its privileges from being a member of the Guests groups and which other group? a. User b. Domain c. Everyone d. Initial
answer
c. Everyone
question
Which advanced audit policy setting tracts when tasks are performed that require a user rights assignment, such as changing the system time? a. object access b. account management c. privilege use d. process tracking
answer
c. privilege use
question
Which rule condition identifies software by file location? a. publisher b. path c. file hash d. certificate
answer
b. path
question
The local security policy is part of a larger Windows management system known as which of the following? a. Group Policy b. Local Policy c. Network Policy d. Domain Policy
answer
a. Group Policy
question
Which type of permissions are considered the most basic level of data security in Windows 10? a. EFS b. NTFS c. FAT d. NAP
answer
B. NTFS
question
Which profile is stored in a network location rather than on the local hard drive? a. roaming b. public c. mandatory d. default
answer
a. roaming
question
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on you behavior? a. Adware b. Worm c. Spyware d. Virus
answer
c. Spyware
question
Which of the following are required for individuals to log on to Windows 10 and uses resources on the computer? a. Public Keys b. IP address c. User accounts d. Digital certificates
answer
c. User accounts
question
What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted? a. signing b. symmetric c. asymmetric d. hash
answer
d. hash
question
Which of the following is a threat to privacy and is sometimes installed when you visit a website? a. Windows Defender b. EFS c. Macro Script d. Spyware
answer
d. Spyware
question
Applications that are not designed for Windows 10 and that require administrative privileges do no work properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? a. Administrative Privileges Toolkit b. Private Toolkit c. Secure Toolkit d. Application Compatibility Toolkit
answer
d. Application Compatibility Toolkit
question
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? a. Shift b. Ctrl c. Alt d. Esc
answer
a. Shift
question
Which Control Panel applet is considered a simplified interface for user management? a. Privileges b. Permissions c. User Accounts d. Accounts
answer
c. User accounts
question
Which part of the motherboard in your computer is used to store encryption keys and certificates? a. NTFS b. TPM c. EFS d. NAP
answer
b. TPM - Trusted Platform Module
question
To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10? a. NAP b. Dual Locked Hard Drive c. BitLocker Drive Encryption d. TPM
answer
c. BitLocker Drive Encryption
question
Each time a user logs on locally, which database is used to verify sign-in credentials? a. SAM b. SSID c. SID d. NID
answer
a. SAM - Security Account Manager
question
Which of the following can be used to define which programs are allowed or disallowed in the system? a. Software restriction policies b. A network zone c. Local Policies d. AppLocker
answer
d. AppLocker
question
Account policies setting are located in which of the following? a. NAP b. local security policy c. EFS security policy d. remote policy
answer
b. Local security policy
question
Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts? a. domain b. group c. account lockout d. password
answer
c. account lockout
question
Members of which group are able to monitor performance counters on the computer, but cannot access performance logs? a. Event log readers b. Performance Monitor Users c. Performance Log Users d. Guests
answer
b. Performance Monitor Users
question
What Windows 10 feature simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer? a. Personal User Password b. Pass-through authentication c. HomeGroup d. Game control
answer
c. HomeGroup
question
Which account is the most powerful local user account possible? a. Guest b. Initial c. Installation d. Administrator
answer
d. Administrator
question
Which security process records the occurrence of specific operating system events in the Security log? a. Encrypting b. Hashing c. Filtering d. Auditing
answer
d. Auditing
question
Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off? a. Secure sign-in b. Window Welcome c. Automatic sign-in d. Fast user switching
answer
d. Fast User switching
question
Members of which of the following groups are able to monitor performance counters and access performance logs on the computer? a. Event Log Readers b. IIS_IUSRS c. Performance Log Users d. Guests
answer
c. Performance log users
question
Which of the following is used to protect your computer from malware that may attempt to steal your password? a. Fast user switching b. Secure sign-in c. Windows Welcome d. Manual sign-in
answer
b. secure sign-in
question
______________________________is a method for protecting data on removable storage such as USB drives?
answer
BitLocker To-Go
question
Automatic sign-in is configured on the __________________ tab of the User Accounts applet.
answer
Users
question
Local user accounts are stored in the ___________________database of Windows 10.
answer
SAM- Security Accounts Manager
question
When a Windows 10 computer is not part of an Active Directory domain, you can sign in by using a local user account or a _______________________account.
answer
Microsoft
question
A standard user account derives its privileges from being a member of the local________________group.
answer
Users
question
A command-line tool that is used to apply, export, or analyze security templates.
answer
Secedit
question
A collection of settings to control password characteristics such as length and complexity.
answer
Password Policy
question
A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.
answer
Hashing Algorithm
question
A feature in Windows 10 that elevates user privileges only when required.
answer
UAC - User Account Control
question
Malicious software designed to perform unauthorized acts on your computer.
answer
Malware
question
Anti-malware software included with Windows 10.
answer
Windows Defender
question
An encryption technology for individual files and folders that can be enabled by users
answer
EFS- Encrypting File System
question
The security process that records the occurrence of specific operating system events in the Security log.
answer
Auditing
question
A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification.
answer
BitLocker Drive Encryption