Business > EXAM > FedVTE Windows Operating System Security 50 Questions with Verified Answers,100% CORRECT (All)

FedVTE Windows Operating System Security 50 Questions with Verified Answers,100% CORRECT

Document Content and Description Below

FedVTE Windows Operating System Security 50 Questions with Verified Answers Which value in the PowerShell "execution policy" allows loading of all configuration files and scripts? - CORRECT ANSWER ... Unrestricted Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates? - CORRECT ANSWER B. Online Responder D. Network Device Enrollment Service Which key command in PowerShell shows an objects methods and properties? - CORRECT ANSWER All of the above Which one of the following steps is not part of securing the Microsoft patch process? - CORRECT ANSWER Apply patches while on the road Of the following methods which one is a tool that centrally manages and configures Windows operating systems and applications and user settings? - CORRECT ANSWER Group Policy In which one of the Social Engineering stages would you establish credibility? - CORRECT ANSWER Relationship Development Microsoft Security Configuration Wizard is a management tool that is based upon machine roles such as a file server a print server a domain controller etc. - CORRECT ANSWER True Which option is best for a server to connect to a network? - CORRECT ANSWER Wired Authenticode is a means of code signing that allows users to verify the source and author of the signed software. - CORRECT ANSWER False Which type of permissions are created by default on non child objects or based by user assignment? - CORRECT ANSWER Explicit Which one of the following could be categorized as a misconfiguration? - CORRECT ANSWER All of the above Which one of the following is a Windows Firewall advantage? - CORRECT ANSWER B. Provides a very granular customization of applications C. Can be configured with Netsh or PowerShell What are the four service startup types? - CORRECT ANSWER Manual; Automatic; Automatic (Delayed); Disabled Which method can start PowerShell in Windows 8? - CORRECT ANSWER Charm > Search > type PowerShell > click Windows PowerShell The Windows Security Configuration Wizard can be used to configure the Windows Firewall with advanced security support. - CORRECT ANSWER True Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion Prevention Systems are not 100% compatible with IPv6. - CORRECT ANSWER True Which one of the following creates and manages and exports (for deployment) security policies across multiple Windows operating systems roles and Microsoft applications? - CORRECT ANSWER Microsoft Security Compliance Manager In a Hardening Process which method uses plaintext files containing software and driver installation configuration settings? - CORRECT ANSWER A. Security Templates D. Group Policy Security Templates provide a standardized way to organize and express and measure security related information. - CORRECT ANSWER False Network Access Protection (NAP) is a Windows feature that provides which one of the following? - CORRECT ANSWER Automatic Remediation Which two of the following categories of monitoring are in the Action Center formerly known as the Windows Security Center? - CORRECT ANSWER Security and Maintenance In a Kerberos Authentication process which one of the following sends a Ticket Granting Ticket secret key and a session key as a function? - CORRECT ANSWER AS_RESPONSE User Account Control (UAC) was introduced in Windows XP and Server 2003. - CORRECT ANSWER False Which Internet Protocol Security (IPsec) protocol provides confidentiality by encrypting data? - CORRECT ANSWER Encapsulating Security Payload (ESP) CVE is short for Critical Vulnerabilities and Exploits. - CORRECT ANSWER False During which step of Microsofts recommended Update Management Process would an update be tested? - CORRECT ANSWER Evaluate and Plan Which description best defines a Hotfix? - CORRECT ANSWER An update to fix a very specific issue In which multi tasking mode can an operating system take control of the processor without consent from the task? - CORRECT ANSWER Preemptive multi-tasking A Virtual Private Network allows two systems to connect over a public network and have the assurance of which of the following? - CORRECT ANSWER All of the above Which one of the following default rights can be performed by a member of the Windows User Group? - CORRECT ANSWER Increase a process working set Which vulnerability allows remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file? - CORRECT ANSWER Kernel Mode Driver - CVE-2012-4786 An API is a set of functions that an application can call to allow the application to operate within Windows. - CORRECT ANSWER True Which one of the following is a benefit of Dynamic Access Control? - CORRECT ANSWER All of the above Which built-in Windows security feature prevents users from loading unauthorized and unapproved applications? - CORRECT ANSWER Windows AppLocker Which Dynamic Access Control capability allows for "safety net" policies? - CORRECT ANSWER Centralize Access Policies PowerShell is built on top of the .Net CRL and .Net Framework. - CORRECT ANSWER True Which method scans systems to identify common security misconfigurations and missing security updates? - CORRECT ANSWER Microsoft Baseline Security Analyzer In the Windows Registry what is a collection of discrete files called? - CORRECT ANSWER Hives A logical Patch Management process is a one-time process that businesses should establish to ensure success. - CORRECT ANSWER False Which Network Access Protection (NAP) client collects and maintains a system health status? - CORRECT ANSWER NAP Agent Which solution is best to avoid downloading an untrusted patch? - CORRECT ANSWER All of the above Which one of the following can be audited using the Windows Security Auditing feature? - CORRECT ANSWER All of the above Which one of the following can be managed through group policies (GPO)? - CORRECT ANSWER All of the above Which one of the following DLL file handles the memory management? - CORRECT ANSWER Kernel32.dll Which one of the following is required for Windows BitLocker configuration? - CORRECT ANSWER Trusted Platform Module (TPM) Which type of attacker has actions that are considered noble by the attacker but could cause more harm than good? - CORRECT ANSWER Gray Hat In a PowerShell environment the WhatIf parameter allows PowerShell users to test the command before actually executing. - CORRECT ANSWER True Which one of the following is a cmdlet that is used to gather computer information? - CORRECT ANSWER Get-WmiObject Which execution mode has unrestricted access to the underlying hardware? - CORRECT ANSWER Kernel Windows Defender was formerly known as Microsoft Anti-Spyware. - CORRECT ANSWER True [Show More]

Last updated: 7 months ago

Preview 1 out of 5 pages

Also available in bundle (1)

ALL FedVTE Exams (20 Sets) Questions with Verified Answers 100% CORRECT

FedVTE Cyber Risk Management for Technicians Questions with Answers,Cyber security Analyst Quiz FedVTE 40 Questions with Verified Answers,FedVTE Windows Operating System Security 50 Questions with Ver...

By Nolan19 7 months ago

$33

20  

Reviews( 0 )

$8.50

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
66
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 10, 2023

Number of pages

5

Written in

Seller


seller-icon
Nolan19

Member since 2 years

10 Documents Sold


Additional information

This document has been written for:

Uploaded

Oct 10, 2023

Downloads

 0

Views

 66

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·