FedVTE Windows Operating System Security Questions and Answers
Already Passed
Which type of attacker has actions that are considered noble by the attacker but could cause more
harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat -Ans>>D. Gray Hat
During which step of Microsofts recommended Update Management Process would an update be
tested?
A. Assess
B. Identify
C. Evaluate and Plan
D. Deploy -Ans>>C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying hardware?
A. Kernel
B. Operating System
C. User
D. Guest -Ans>>A. Kernel
Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above -Ans>>D. All of the above
The Windows Security Configuration Wizard can be used to configure the Windows Firewall with
advanced security support.
A. True
B. False -Ans>>A. True
, Which one of the following is a Windows Firewall advantage?
A. Can be configured with the Group Policy
B. Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
D. All of the above -Ans>>B. Provides a very granular customization of applications
Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion
Prevention Systems are not 100% compatible with IPv6.
A. True
B. False -Ans>>A. True
Which one of the following default rights can be performed by a member of the Windows User Group?
A. Increase a process working set
B. Allow logons through the Remote Desktop Services
C. Create global objects
D. Load and unload device drivers -Ans>>A. Increase a process working set
Security Templates provide a standardized way to organize and express and measure security related
information.
A. True
B. False -Ans>>B. False
Which one of the following is a cmdlet that is used to gather computer information?
A. Get-WmiObject
B. Get-ChildItems
C. Get-Service
D. None of the above -Ans>>A. Get-WmiObject
Network Access Protection (NAP) is a Windows feature that provides which one of the following?
A. Automatic Remediation
B. Non-current Compliance
C. Health State Invalidation
Already Passed
Which type of attacker has actions that are considered noble by the attacker but could cause more
harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat -Ans>>D. Gray Hat
During which step of Microsofts recommended Update Management Process would an update be
tested?
A. Assess
B. Identify
C. Evaluate and Plan
D. Deploy -Ans>>C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying hardware?
A. Kernel
B. Operating System
C. User
D. Guest -Ans>>A. Kernel
Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above -Ans>>D. All of the above
The Windows Security Configuration Wizard can be used to configure the Windows Firewall with
advanced security support.
A. True
B. False -Ans>>A. True
, Which one of the following is a Windows Firewall advantage?
A. Can be configured with the Group Policy
B. Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
D. All of the above -Ans>>B. Provides a very granular customization of applications
Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion
Prevention Systems are not 100% compatible with IPv6.
A. True
B. False -Ans>>A. True
Which one of the following default rights can be performed by a member of the Windows User Group?
A. Increase a process working set
B. Allow logons through the Remote Desktop Services
C. Create global objects
D. Load and unload device drivers -Ans>>A. Increase a process working set
Security Templates provide a standardized way to organize and express and measure security related
information.
A. True
B. False -Ans>>B. False
Which one of the following is a cmdlet that is used to gather computer information?
A. Get-WmiObject
B. Get-ChildItems
C. Get-Service
D. None of the above -Ans>>A. Get-WmiObject
Network Access Protection (NAP) is a Windows feature that provides which one of the following?
A. Automatic Remediation
B. Non-current Compliance
C. Health State Invalidation