Which type of attacker has actions that are considered noble by the attacker but could cause more harm than good?
A. White Hat
B. Black Hat
C.
... [Show More] Red Hat
D. Gray Hat CORRECT ANSWER D. Gray Hat
During which step of Microsoft recommended Update Management Process would an update be tested?
A. Assess
B. Identify
C. Evaluate and Plan
D. Deploy CORRECT ANSWER C. Evaluate and Plan
Which execution mode has unrestricted access to the underlying hardware?
A. Kernel
B. Operating System
C. User
D. Guest CORRECT ANSWER A. Kernel
Which one of the following can be managed through group policies (GPO)?
A. Authentication settings
B. Software installation and update
C. IPsec connections
D. All of the above CORRECT ANSWER D. All of the above
The Windows Security Configuration Wizard can be used to configure the Windows Firewall with advanced security support.
A. True
B. False CORRECT ANSWER A. True
Which one of the following is a Windows Firewall advantage?
A. Can be configured with the Group Policy
B. Provides a very granular customization of applications
C. Can be configured with Netsh or PowerShell
D. All of the above CORRECT ANSWER B. Provides a very granular customization of applications
Many current network security tools such as Firewalls and Intrusion Detection Systems and Intrusion Prevention Systems are not 100% compatible with IPv6.
A. True
B. False CORRECT ANSWER A. True
Which one of the following default rights can be performed by a member of the Windows User Group?
A. Increase a process working set
B. Allow logons through the Remote Desktop Services
C. Create global objects
D. Load and unload device drivers CORRECT ANSWER A. Increase a process working set
Security Templates provide a standardized way to organize and express and measure security related information.
A. True
B. False CORRECT ANSWER B. False
Which one of the following is a cmdlet that is used to gather computer information?
A. Get-WmiObject
B. Get-ChildItems
C. Get-Service
D. None of the above CORRECT ANSWER A. Get-WmiObject
Network Access Protection (NAP) is a Windows feature that provides which one of the following?
A. Automatic Remediation
B. Non-current Compliance
C. Health State Invalidation
D. None of the above CORRECT ANSWER A. Automatic Remediation
What are the four service startup types?
A. Manual; Automatic; Disabled; Prompt
B. Manual; Automatic; Enabled; Disabled
C. Manual; Automatic; Scheduled; Disabled
D. Manual; Automatic; Automatic (Delayed); Disabled CORRECT ANSWER D. Manual; Automatic; Automatic (Delayed); Disabled
PowerShell is built on top of the .Net CRL and .Net Framework.
A. True
B. False CORRECT ANSWER A. True
Which solution is best to avoid downloading an untrusted patch?
A. Disable automatic updates
B. Check for updates on a trusted network
C. Verify the source of the update
D. All of the above CORRECT ANSWER D. All of the above
In a Kerberos Authentication process which one of the following sends a Ticket Granting Ticket secret key and a session key as a function?
A. TGS_RESPONSE
B. AS_RESPONSE
C. TGS_REQ
D. AP_RESPONSE CORRECT ANSWER B. AS_RESPONSE
An API is a set of functions that an application can call to allow the application to operate within Windows.
A. True
B. False CORRECT ANSWER A. True
Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates?
A. Certificate Enrolment Web Service
B. Online Responder
C. Certificate Enrolment Policy Web Service
D. Network Device Enrollment Service CORRECT ANSWER D. Network Device Enrollment Service
Which value in the PowerShell "execution policy" allows loading of all configuration files and scripts?
A. AllSigned
B. Unrestricted
C. Undefined
D. RemoteSigned CORRECT ANSWER B. Unrestricted
In which multi-tasking mode can an operating system take control of the processor without consent from the task?
A. Non-preemptive multi-tasking
B. Preemptive multi-tasking
C. Multi-threading
D. Multi-programming CORRECT ANSWER B. Preemptive multi-tasking
Which Dynamic Access Control capability allows for "safety net" policies?
A. Centralize Access Policies
B. Data Classification
C. Centralized Auditing
D. Rights Management Service CORRECT ANSWER A. Centralize Access Policies
Which one of the following is a benefit of Dynamic Access Control?
A. Improves productivity
B. Data is protected at the appropriate level
C. Content owners have control over their data
D. All of the above CORRECT ANSWER D. All of the above [Show Less]