SYSTEM SECURITY. EXAM QUESTIONS
AND ANSWERS. VERIFIED 2025/2026.
Which type of attacker has actions that are considered noble by the attacker but could cause
more harm than good?
A. White Hat
B. Black Hat
C. Red Hat
D. Gray Hat - ANS D. Gray Hat
During which step of Microsofts recommended Update Management Process would an update
be tested?
A. Assess
B. Identify
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
,C. Evaluate and Plan
D. Deploy - ANS C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying hardware?
A. Kernel
B. Operating System
C. User
D. Guest - ANS A. Kernel
Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above - ANS D. All of the above
The Windows Security Configuration Wizard can be used to configure the Windows Firewall
with advanced security support.
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, A. True
B. False - ANS A. True
Which one of the following is a Windows Firewall advantage?
A. Can be configured with the Group Policy
B. Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
D. All of the above - ANS B. Provides a very granular customization of applications
Many current network security tools such as Firewalls and Intrusion Detection Systems and
Intrusion Prevention Systems are not 100% compatible with IPv6.
A. True
B. False - ANS A. True
Which one of the following default rights can be performed by a member of the Windows User
Group?
A. Increase a process working set
3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.