Check On learning¶
---
primaryColor: steelblue
shuffleQuestions: false
shuffleAnswers: true
---
### What architecture did Windows start enhancing security features?
- [ ] Windows 98
- [X] Windows XP
- [ ] Windows 7
- [ ] Windows Vista
### _____ ____ are foundational principles that guide the design, implementation, and management of security measures to protect information systems and data.
- [X] Security Concepts
- [ ] Security Policies
- [ ] Network Protocols
- [ ] Access Controls
### This security concept deals with the Concept of Disclosure.
- [ ] Integrity
- [X] Confidentiality
- [ ] Availability
- [ ] Authentication
### This security concept ensures that a party in a transaction cannot deny the authenticity of their signature or sending a message.
- [X] Non-Repudiation
- [ ] Authentication
- [ ] Authorization
- [ ] Confidentiality
### ___ ___ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- [X] Windows Firewall
- [ ] Antivirus Software
- [ ] Virtual Private Network
- [ ] Intrusion Detection System
### _____ ____ are foundational principles that guide the design, implementation, and management of security measures to protect information systems and data.
- [X] Local Group Policy; Domain Group Policy; Template Policies
- [ ] Passwords; Authentication Tokens; Access Control
- [ ] Intrusion Detection Systems; Firewalls; Anti-virus software
- [ ] Security Concepts; Security Policies; Security Measures
### ___ ___ and keys cannot be changed by most applications, including malware, ensuring the integrity of the operating system.
- [X] Protected files
- [ ] Protected registry keys
- [ ] System files
- [ ] TrustedInstaller Service
### The PowerShell command to retrieve registry values is:
- [X] Get-ItemProperty
- [ ] Get-RegistryValue
- [ ] Retrieve-RegistryData
- [ ] Get-Property
### What are some key components for Windows Resource Protection?
- [ ] Protected files and keys
- [ ] Access Control List (ACLs)
- [ ] System File Checker (SFC)
- [ ] TrustedInstaller Service
- [X] All of the above
### This __ __ is a collection of settings in Windows that can be used to establish a security auditing system for your local computer or the entire network.
- [X] Audit Policy
- [ ] Firewall Policy
- [ ] Security Configuration Policy
- [ ] Security Audit Log
### What are the different phases for Windows Security Posture?
- [X] Configure Capabilities; Assess and protect assets; Improve Security Posture; Maintain Secure Posture
- [ ] Audit Policies; Install Updates; Review Logs; Maintain Security
- [ ] Setup Accounts; Test Security; Install Software; Maintain Posture
- [ ] Assess Threats; Implement Controls; Review Permissions; Patch Systems