Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Windows PowerShell and Security Configuration, Exams of Computer Security

Various methods and tools related to windows powershell and security configuration. It discusses how to start powershell in windows 8, the use of security templates and other tools in a hardening process, the functionality of the whatif parameter in powershell, and the capabilities of the network access protection (nap) feature in windows. Additionally, it covers topics such as active directory certificate services, hotfixes, ipsec protocols, user rights assignments, security modules, and the microsoft baseline security analyzer. Insights into windows security configurations, powershell usage, and related tools and technologies.

Typology: Exams

2023/2024

Available from 07/25/2024

rex-smith-1
rex-smith-1 🇺🇸

749 documents

1 / 22

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
FEDVTE WINDOWS OPERATING SYSTEM SECURITY
EXAM LATEST EXAM | ALL QUESTIONS AND
CORRECT ANSWERS | ALREADY GRADED A+ |
VERIFIED ANSWERS | LATEST VERSION
In which one of the Social Engineering stages would you establish
credibility?
A. Information Gathering
B. Select Target
C. Relationship Development
D. Relationship Exploitation ------CORRECT ANSWER---------------C.
Relationship Development
PowerShell is built on top of the .Net CRL and .Net Framework.
A. True
B. False ------CORRECT ANSWER---------------A. True
Windows Defender was formerly known as Microsoft Anti-Spyware.
A. True
B. False ------CORRECT ANSWER---------------A. True
Which one of the following creates and manages and exports (for
deployment) security policies across multiple Windows operating systems
roles and Microsoft applications?
A. Microsoft Security Configuration Wizard
B. Microsoft Security Compliance Manager
C. Security Templates
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16

Partial preview of the text

Download Windows PowerShell and Security Configuration and more Exams Computer Security in PDF only on Docsity!

FEDVTE WINDOWS OPERATING SYSTEM SECURITY

EXAM LATEST EXAM | ALL QUESTIONS AND

CORRECT ANSWERS | ALREADY GRADED A+ |

VERIFIED ANSWERS | LATEST VERSION

In which one of the Social Engineering stages would you establish credibility? A. Information Gathering B. Select Target C. Relationship Development D. Relationship Exploitation ------CORRECT ANSWER---------------C. Relationship Development PowerShell is built on top of the .Net CRL and .Net Framework. A. True B. False ------CORRECT ANSWER---------------A. True Windows Defender was formerly known as Microsoft Anti-Spyware. A. True B. False ------CORRECT ANSWER---------------A. True Which one of the following creates and manages and exports (for deployment) security policies across multiple Windows operating systems roles and Microsoft applications? A. Microsoft Security Configuration Wizard B. Microsoft Security Compliance Manager C. Security Templates

D. Group Policy ------CORRECT ANSWER---------------B. Microsoft Security Compliance Manager In the Windows Registry what is a collection of discrete files called? A. Programs B. Hives C. Keys D. Trees ------CORRECT ANSWER---------------B. Hives Which method can start PowerShell in Windows 8? A. > All Programs > Accessories > Windows PowerShell Folder > Windows PowerShell B. Charm > Search > type PowerShell > click Windows PowerShell C. In Server Manager: Tools menu > Windows PowerShell D. All of the above ------CORRECT ANSWER---------------B. Charm > Search > type PowerShell > click Windows PowerShell In a Hardening Process which method uses plaintext files containing software and driver installation configuration settings? A. Security Templates B. Microsoft Baseline Security Analyzer C. Security Compliance Manager Toolkit (SCM) D. Group Policy ------CORRECT ANSWER---------------A. Security Templates

Which one of the following is a cmdlet that is used to gather computer information? A. Get-WmiObject B. Get-ChildItems C. Get-Service D. None of the above ------CORRECT ANSWER---------------A. Get- WmiObject Which type of permissions are created by default on non child objects or based by user assignment? A. Inherited B. Standard C. Effective D. Explicit ------CORRECT ANSWER---------------D. Explicit Which one of the following is a benefit of Dynamic Access Control? A. Improves productivity B. Data is protected at the appropriate level C. Content owners have control over their data D. All of the above ------CORRECT ANSWER---------------D. All of the above Which one of the following could be categorized as a misconfiguration? A. Failure to set quotas for the group members and then the members overload the file server in an accidental DoS attack

B. Mistakenly adding an account to a wrong group C. Accidentally setting the Everyone group to full control on a share drive D. All of the above ------CORRECT ANSWER---------------D. All of the above A logical Patch Management process is a one-time process that businesses should establish to ensure success. A. True B. False ------CORRECT ANSWER---------------B. False Network Access Protection (NAP) is a Windows feature that provides which one of the following? A. Automatic Remediation B. Non-current Compliance C. Health State Invalidation D. None of the above ------CORRECT ANSWER---------------A. Automatic Remediation A Virtual Private Network allows two systems to connect over a public network and have the assurance of which of the following? A. Confidentiality B. Authentication C. Integrity D. All of the above ------CORRECT ANSWER---------------D. All of the above

Which one of the following can be audited using the Windows Security Auditing feature? A. Audit IPSec Extended Mode B. Audit Logoff C. Audit Network Policy Server D. All of the above ------CORRECT ANSWER---------------D. All of the above Which Internet Protocol Security (IPsec) protocol provides confidentiality by encrypting data? A. Internet Key Exchange (IKE) B. Authentication Header (AH) C. Encapsulating Security Payload (ESP) D. All of the above ------CORRECT ANSWER---------------C. Encapsulating Security Payload (ESP) Which one of the following default rights can be performed by a member of the Windows User Group? A. Increase a process working set B. Allow logons through the Remote Desktop Services C. Create global objects D. Load and unload device drivers ------CORRECT ANSWER---------------A. Increase a process working set Which one of the following is required for Windows BitLocker configuration?

A. Trusted Platform Module (TPM) B. Hardware Security Module C. UEFI (Unified Extensible Firmware Interface) D. None of the above ------CORRECT ANSWER---------------A. Trusted Platform Module (TPM) Which option is best for a server to connect to a network? A. Wired B. Wireless C. Virtual Private Network D. None of the above ------CORRECT ANSWER---------------A. Wired In a Kerberos Authentication process which one of the following sends a Ticket Granting Ticket secret key and a session key as a function? A. TGS_RESPONSE B. AS_RESPONSE C. TGS_REQ D. AP_RESPONSE ------CORRECT ANSWER---------------B. AS_RESPONSE Which Dynamic Access Control capability allows for "safety net" policies? A. Centralize Access Policies B. Data Classification

Security Templates provide a standardized way to organize and express and measure security related information. A. True B. False ------CORRECT ANSWER---------------B. False Which key command in PowerShell shows an objects methods and properties? A. Get-Help B. Get-Command C. Get-Member D. All of the above ------CORRECT ANSWER---------------C. Get-Member Which execution mode has unrestricted access to the underlying hardware? A. Kernel B. Operating System C. User D. Guest ------CORRECT ANSWER---------------A. Kernel Microsoft Security Configuration Wizard is a management tool that is based upon machine roles such as a file server a print server a domain controller etc. A. True B. False ------CORRECT ANSWER---------------A. True Which solution is best to avoid downloading an untrusted patch?

A. Disable automatic updates B. Check for updates on a trusted network C. Verify the source of the update D. All of the above ------CORRECT ANSWER---------------D. All of the above During which step of Microsofts recommended Update Management Process would an update be tested? A. Assess B. Identify C. Evaluate and Plan D. Deploy ------CORRECT ANSWER---------------C. Evaluate and Plan User Account Control (UAC) was introduced in Windows XP and Server

A. True B. False ------CORRECT ANSWER---------------B. False Which vulnerability allows remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file? A. Print Spooler - CVE- 2013 - 0011 B. Kernel Mode Driver - CVE- 2012 - 4786 C. Microsoft XML - CVE- 2013 - 0007 D. Use After Free - CVE- 2012 - 4969 ------CORRECT ANSWER--------------- B. Kernel Mode Driver - CVE- 2012 - 4786

C. Red Hat D. Gray Hat ------CORRECT ANSWER---------------D. Gray Hat Which one of the following DLL file handles the memory management? A. User32.dll B. Kernel32.dll C. Gdi32.dll D. None of the above ------CORRECT ANSWER---------------B. Kernel32.dll Which value in the PowerShell "execution policy" allows loading of all configuration files and scripts? A. AllSigned B. Unrestricted C. Undefined D. RemoteSigned ------CORRECT ANSWER---------------B. Unrestricted Which one of the following steps is not part of securing the Microsoft patch process? A. Always validate patches B. Apply patches while on the road C. Harden the WSUS server D. Ensure ALL software is patched not just Microsoft ------CORRECT ANSWER---------------B. Apply patches while on the road

Which Network Access Protection (NAP) client collects and maintains a system health status? A. System Health Agent B. NAP Agent C. NAP Enforcement Client D. None of the above ------CORRECT ANSWER---------------B. NAP Agent Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion Prevention Systems are not 100% compatible with IPv6. A. True B. False ------CORRECT ANSWER---------------A. True In which multi tasking mode can an operating system take control of the processor without consent from the task? A. Non-preemptive multi-tasking B. Preemptive multi-tasking C. Multi-threading D. Multi-programming ------CORRECT ANSWER---------------B. Preemptive multi-tasking The Windows Security Configuration Wizard can be used to configure the Windows Firewall with advanced security support. A. True B. False ------CORRECT ANSWER---------------A. True

Microsoft Security Configuration Wizard is a management tool that is based upon machine roles such as a file server a print server a domain controller etc. ------CORRECT ANSWER---------------True Which option is best for a server to connect to a network? ------CORRECT ANSWER---------------Wired Authenticode is a means of code signing that allows users to verify the source and author of the signed software. ------CORRECT ANSWER--------- ------False Which type of permissions are created by default on non child objects or based by user assignment? ------CORRECT ANSWER---------------Explicit Which one of the following could be categorized as a misconfiguration? -----

  • CORRECT ANSWER---------------All of the above Which one of the following is a Windows Firewall advantage? ------ CORRECT ANSWER---------------B. Provides a very granular customization of applications C. Can be configured with Netsh or PowerShell What are the four service startup types? ------CORRECT ANSWER----------- ----Manual; Automatic; Automatic (Delayed); Disabled

Which method can start PowerShell in Windows 8? ------CORRECT ANSWER---------------Charm > Search > type PowerShell > click Windows PowerShell The Windows Security Configuration Wizard can be used to configure the Windows Firewall with advanced security support. ------CORRECT ANSWER---------------True Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion Prevention Systems are not 100% compatible with IPv6. ------CORRECT ANSWER---------------True Which one of the following creates and manages and exports (for deployment) security policies across multiple Windows operating systems roles and Microsoft applications? ------CORRECT ANSWER--------------- Microsoft Security Compliance Manager In a Hardening Process which method uses plaintext files containing software and driver installation configuration settings? ------CORRECT ANSWER---------------A. Security Templates D. Group Policy Security Templates provide a standardized way to organize and express and measure security related information. ------CORRECT ANSWER--------- ------False

Which description best defines a Hotfix? ------CORRECT ANSWER----------- ----An update to fix a very specific issue In which multi tasking mode can an operating system take control of the processor without consent from the task? ------CORRECT ANSWER--------- ------Preemptive multi-tasking A Virtual Private Network allows two systems to connect over a public network and have the assurance of which of the following? ------CORRECT ANSWER---------------All of the above Which one of the following default rights can be performed by a member of the Windows User Group? ------CORRECT ANSWER---------------Increase a process working set Which vulnerability allows remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file? ------CORRECT ANSWER--------------- Kernel Mode Driver - CVE- 2012 - 4786 An API is a set of functions that an application can call to allow the application to operate within Windows. ------CORRECT ANSWER------------- --True Which one of the following is a benefit of Dynamic Access Control? ------ CORRECT ANSWER---------------All of the above

Which built-in Windows security feature prevents users from loading unauthorized and unapproved applications? ------CORRECT ANSWER------ ---------Windows AppLocker Which Dynamic Access Control capability allows for "safety net" policies? -- ----CORRECT ANSWER---------------Centralize Access Policies PowerShell is built on top of the .Net CRL and .Net Framework. ------ CORRECT ANSWER---------------True Which method scans systems to identify common security misconfigurations and missing security updates? ------CORRECT ANSWER---------------Microsoft Baseline Security Analyzer In the Windows Registry what is a collection of discrete files called? ------ CORRECT ANSWER---------------Hives A logical Patch Management process is a one-time process that businesses should establish to ensure success. ------CORRECT ANSWER- --------------False Which Network Access Protection (NAP) client collects and maintains a system health status? ------CORRECT ANSWER---------------NAP Agent Which solution is best to avoid downloading an untrusted patch? ------ CORRECT ANSWER---------------All of the above