Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Windows Operating System Security: 2025 Questions and Verified Solutions, Exams of Database Programming

A collection of multiple-choice questions and answers related to windows operating system security. It covers various aspects of security, including attacker types, update management, execution modes, group policies, firewall configuration, network security tools, user rights, security templates, powershell commands, authentication processes, api functions, active directory certificate services, dynamic access control, auditing, security policy management, patch management, social engineering, hardening processes, vulnerability analysis, and more. A valuable resource for individuals seeking to enhance their understanding of windows security concepts and practices.

Typology: Exams

2024/2025

Available from 03/03/2025

N-U-R-S-E
N-U-R-S-E 🇺🇸

2

(2)

3.3K documents

1 / 24

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Page | 1
FEDVTE WINDOWS OPERATING SYSTEM
SECURITY 2025 QUESTIONS AND VERIFIED
SOLUTIONS| ABSOLUTE SUCCESS
GUARANTEED.
Which type of attacker has actions that are considered noble by the
attacker but could cause more harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat - Correct Answer-D. Gray Hat
During which step of Microsofts recommended Update Management
Process would an update be tested?
A. Assess
B. Identify
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18

Partial preview of the text

Download Windows Operating System Security: 2025 Questions and Verified Solutions and more Exams Database Programming in PDF only on Docsity!

FEDVTE WINDOWS OPERATING SYSTEM

SECURITY 2025 QUESTIONS AND VERIFIED

SOLUTIONS| ABSOLUTE SUCCESS

GUARANTEED.

Which type of attacker has actions that are considered noble by the attacker but could cause more harm than good? A. White Hat B. Black Hat C. Red Hat D. Gray Hat - Correct Answer-D. Gray Hat During which step of Microsofts recommended Update Management Process would an update be tested? A. Assess B. Identify

C. Evaluate and Plan D. Deploy - Correct Answer-C. Evaluate and Plan Which execution mode has unrestricted access to the underlying hardware? A. Kernel B. Operating System C. User D. Guest - Correct Answer-A. Kernel Which one of the following can be managed through group policies (GPO)? A. Authentication settings B. Software installation and update

Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion Prevention Systems are not 100% compatible with IPv6. A. True B. False - Correct Answer-A. True Which one of the following default rights can be performed by a member of the Windows User Group? A. Increase a process working set B. Allow logons through the Remote Desktop Services C. Create global objects D. Load and unload device drivers - Correct Answer-A. Increase a process working set Security Templates provide a standardized way to organize and express and measure security related information.

A. True B. False - Correct Answer-B. False Which one of the following is a cmdlet that is used to gather computer information? A. Get-WmiObject B. Get-ChildItems C. Get-Service D. None of the above - Correct Answer-A. Get-WmiObject Network Access Protection (NAP) is a Windows feature that provides which one of the following? A. Automatic Remediation B. Non-current Compliance

Which solution is best to avoid downloading an untrusted patch? A. Disable automatic updates B. Check for updates on a trusted network C. Verify the source of the update D. All of the above - Correct Answer-D. All of the above In a Kerberos Authentication process which one of the following sends a Ticket Granting Ticket secret key and a session key as a function? A. TGS_RESPONSE B. AS_RESPONSE C. TGS_REQ D. AP_RESPONSE - Correct Answer-B. AS_RESPONSE

An API is a set of functions that an application can call to allow the application to operate within Windows. A. True B. False - Correct Answer-A. True Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates? A. Certificate Enrolment Web Service B. Online Responder C. Certificate Enrolment Policy Web Service D. Network Device Enrollment Service - Correct Answer-D. Network Device Enrollment Service Which value in the PowerShell "execution policy" allows loading of all configuration files and scripts?

B. Data Classification C. Centralized Auditing D. Rights Management Service - Correct Answer-A. Centralize Access Policies Which one of the following is a benefit of Dynamic Access Control? A. Improves productivity B. Data is protected at the appropriate level C. Content owners have control over their data D. All of the above - Correct Answer-D. All of the above Which one of the following can be audited using the Windows Security Auditing feature? A. Audit IPSec Extended Mode

B. Audit Logoff C. Audit Network Policy Server D. All of the above - Correct Answer-D. All of the above Which one of the following creates and manages and exports (for deployment) security policies across multiple Windows operating systems roles and Microsoft applications? A. Microsoft Security Configuration Wizard B. Microsoft Security Compliance Manager C. Security Templates D. Group Policy - Correct Answer-B. Microsoft Security Compliance Manager In a PowerShell environment the WhatIf parameter allows PowerShell users to test the command before actually executing.

CVE is short for Critical Vulnerabilities and Exploits. A. True B. False - Correct Answer-B. False Of the following methods which one is a tool that centrally manages and configures Windows operating systems and applications and user settings? A. Microsoft Security Configuration Wizard B. Security Content Automation Protocol (SCAP) C. Group Policy D. None of the above - Correct Answer-C. Group Policy In which one of the Social Engineering stages would you establish credibility?

A. Information Gathering B. Select Target C. Relationship Development D. Relationship Exploitation - Correct Answer-C. Relationship Development In a Hardening Process which method uses plaintext files containing software and driver installation configuration settings? A. Security Templates B. Microsoft Baseline Security Analyzer C. Security Compliance Manager Toolkit (SCM) D. Group Policy - Correct Answer-A. Security Templates Which method scans systems to identify common security misconfigurations and missing security updates?

A. Internet Key Exchange (IKE) B. Authentication Header (AH) C. Encapsulating Security Payload (ESP) D. All of the above - Correct Answer-C. Encapsulating Security Payload (ESP) Which one of the following could be categorized as a misconfiguration? A. Failure to set quotas for the group members and then the members overload the file server in an accidental DoS attack B. Mistakenly adding an account to a wrong group C. Accidentally setting the Everyone group to full control on a share drive D. All of the above - Correct Answer-D. All of the above Which vulnerability allows remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file?

A. Print Spooler - CVE- 2013 - 0011 B. Kernel Mode Driver - CVE- 2012 - 4786 C. Microsoft XML - CVE- 2013 - 0007 D. Use After Free - CVE- 2012 - 4969 - Correct Answer-B. Kernel Mode Driver - CVE- 2012 - 4786 Which description best defines a Hotfix? A. Incremental update between service packs or versions to fix outstanding issues B. Publicly released update to fix a known flaw for a software application or operating system C. An update to fix a very specific issue D. A collection of patches Hotfixes and maintenance releases - Correct Answer-C. An update to fix a very specific issue

Which one of the following steps is not part of securing the Microsoft patch process? A. Always validate patches B. Apply patches while on the road C. Harden the WSUS server D. Ensure ALL software is patched not just Microsoft - Correct Answer-B. Apply patches while on the road User Account Control (UAC) was introduced in Windows XP and Server

A. True B. False - Correct Answer-B. False A logical Patch Management process is a one-time process that businesses should establish to ensure success.

A. True B. False - Correct Answer-B. False In the Windows Registry what is a collection of discrete files called? A. Programs B. Hives C. Keys D. Trees - Correct Answer-B. Hives Windows Defender was formerly known as Microsoft Anti-Spyware. A. True B. False - Correct Answer-A. True