and answers Newest RATED A+ 2025/2026
Which value in the PowerShell "execution policy" allows loading of all configuration files and
scripts? - CORRECT ANSWERS Unrestricted
Which Active Directory Certificate Service (AD CS) server role allows routers and other network
devices that do not have a domain account to obtain certificates? - CORRECT ANSWERS B.
Online Responder
D. Network Device Enrollment Service
Which key command in PowerShell shows an objects methods and properties? - CORRECT
ANSWERS All of the above
Which one of the following steps is not part of securing the Microsoft patch process? -
CORRECT ANSWERS Apply patches while on the road
Of the following methods which one is a tool that centrally manages and configures Windows
operating systems and applications and user settings? - CORRECT ANSWERS Group Policy
In which one of the Social Engineering stages would you establish credibility? - CORRECT
ANSWERS Relationship Development
Microsoft Security Configuration Wizard is a management tool that is based upon machine
roles such as a file server a print server a domain controller etc. - CORRECT ANSWERS True
Which option is best for a server to connect to a network? - CORRECT ANSWERS Wired
, Authenticode is a means of code signing that allows users to verify the source and author of
the signed software. - CORRECT ANSWERS False
Which type of permissions are created by default on non child objects or based by user
assignment? - CORRECT ANSWERS Explicit
Which one of the following could be categorized as a misconfiguration? - CORRECT ANSWERS
All of the above
Which one of the following is a Windows Firewall advantage? - CORRECT ANSWERS B.
Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
What are the four service startup types? - CORRECT ANSWERS Manual; Automatic; Automatic
(Delayed); Disabled
Which method can start PowerShell in Windows 8? - CORRECT ANSWERS Charm > Search >
type PowerShell > click Windows PowerShell
The Windows Security Configuration Wizard can be used to configure the Windows Firewall
with advanced security support. - CORRECT ANSWERS True
Many current network security tools such as Firewalls and Intrusion Detection Systems and
Intrusion Prevention Systems are not 100% compatible with IPv6. - CORRECT ANSWERS True
Which one of the following creates and manages and exports (for deployment) security policies
across multiple Windows operating systems roles and Microsoft applications? - CORRECT
ANSWERS Microsoft Security Compliance Manager