SECURITY 2025 QUESTIONS AND ANSWERS.
Which type of attacker has actions that are considered noble by the
attacker but could cause more harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat - Correct answer-D. Gray Hat
During which step of Microsofts recommended Update Management
Process would an update be tested?
A. Assess
B. Identify
C. Evaluate and Plan
,D. Deploy - Correct answer-C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying
hardware?
A. Kernel
B. Operating System
C. User
D. Guest - Correct answer-A. Kernel
Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above - Correct answer-D. All of the above
, The Windows Security Configuration Wizard can be used to configure
the Windows Firewall with advanced security support.
A. True
B. False - Correct answer-A. True
Which one of the following is a Windows Firewall advantage?
A. Can be configured with the Group Policy
B. Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
D. All of the above - Correct answer-B. Provides a very
granular customization of applications
Many current network security tools such as Firewalls and
Intrusion Detection Systems and Intrusion Prevention Systems
are not 100% compatible with IPv6.