Skip to content

Check On learning

--- primaryColor: steelblue shuffleQuestions: false shuffleAnswers: true --- ### What architecture did Windows start enhancing security features? - [ ] Windows 98 - [X] Windows XP - [ ] Windows 7 - [ ] Windows Vista ### _____ ____ are foundational principles that guide the design, implementation, and management of security measures to protect information systems and data. - [X] Security Concepts - [ ] Security Policies - [ ] Network Protocols - [ ] Access Controls ### This security concept deals with the Concept of Disclosure. - [ ] Integrity - [X] Confidentiality - [ ] Availability - [ ] Authentication ### This security concept ensures that a party in a transaction cannot deny the authenticity of their signature or sending a message. - [X] Non-Repudiation - [ ] Authentication - [ ] Authorization - [ ] Confidentiality ### ___ ___ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. - [X] Windows Firewall - [ ] Antivirus Software - [ ] Virtual Private Network - [ ] Intrusion Detection System ### _____ ____ are foundational principles that guide the design, implementation, and management of security measures to protect information systems and data. - [X] Local Group Policy; Domain Group Policy; Template Policies - [ ] Passwords; Authentication Tokens; Access Control - [ ] Intrusion Detection Systems; Firewalls; Anti-virus software - [ ] Security Concepts; Security Policies; Security Measures ### ___ ___ and keys cannot be changed by most applications, including malware, ensuring the integrity of the operating system. - [X] Protected files - [ ] Protected registry keys - [ ] System files - [ ] TrustedInstaller Service ### The PowerShell command to retrieve registry values is: - [X] Get-ItemProperty - [ ] Get-RegistryValue - [ ] Retrieve-RegistryData - [ ] Get-Property ### What are some key components for Windows Resource Protection? - [ ] Protected files and keys - [ ] Access Control List (ACLs) - [ ] System File Checker (SFC) - [ ] TrustedInstaller Service - [X] All of the above ### This __ __ is a collection of settings in Windows that can be used to establish a security auditing system for your local computer or the entire network. - [X] Audit Policy - [ ] Firewall Policy - [ ] Security Configuration Policy - [ ] Security Audit Log ### What are the different phases for Windows Security Posture? - [X] Configure Capabilities; Assess and protect assets; Improve Security Posture; Maintain Secure Posture - [ ] Audit Policies; Install Updates; Review Logs; Maintain Security - [ ] Setup Accounts; Test Security; Install Software; Maintain Posture - [ ] Assess Threats; Implement Controls; Review Permissions; Patch Systems