System Security- Questions and
Answers (Grade A+)
Which type of attacker has actions that are considered noble by the attacker but could
cause more harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat—ANSWER--D. Gray Hat
During which step of Microsofts recommended Update Management Process would an
update be tested?
,A. Assess
B. Identify
C. Evaluate and Plan
D. Deploy—ANSWER--C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying hardware?
A. Kernel
B. Operating System
C. User
D. Guest—ANSWER--A. Kernel
© 2026 Copyright. All Rights Reserved. This document is
protected by copyright law, Copyrighted By Brittie Donald
, Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above—ANSWER--D. All of the above
The Windows Security Configuration Wizard can be used to configure the Windows Firewall
with advanced security support.
A. True
B. False—ANSWER--A. True
Which one of the following is a Windows Firewall advantage?