Choose Correct Options for Windows 7 Security Flashcards

Chapter 7 Windows 7 Security Features

29 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
  1. Which security feature in Windows 7 prevents malware by limiting user privilege levels?
  2. a. Windows Defender
  3. b. User Account Control (UAC)
  4. c. Microsoft Security Essentials
  5. d. Service SIDs
b. User Account Control (UAC)
  1. The default privilege level for services is LocalSystem. True or False?
False
  1. When compared to Windows XP, which networking features have been updated or added in Windows 7 to enhance security? (Choose all that apply.)
  2. a. TCP/IPv4
  3. b. Network Access Protection (NAP)
  4. c. Point-to-Point tunneling Protocol (PPTP)
  5. d. Internet Connection Sharing
  6. e. Windows Firewall
b. Network Access Protection (NAP)
e. Windows Firewall
  1. Which data protection feature is new in Windows 7?
  2. a. Local security policy
  3. b. BitLocker Drive Encryption
  4. c. EFS
  5. d. BitLocker To Go
  6. e. Network Access Protection
d. BitLocker To Go
  1. Which of the following passwords meet complexity requirements? (Choose all that apply.)
  2. a. passw0rd$
  3. b. ##$$@@
  4. c. ake1vyue
  5. d. a1batro$$
  6. e. A%5j
A. passw0rd$
  1. e. A%5j
  1. Which password policy setting should you use to prevent users from reusing their passwords too quickly?
  2. a. Maximum password age
  3. b. Minimum password age
  4. c. Minimum password length
  5. d. Password must meet complexity requirements
  6. e. Store passwords using reversible encryption
b. Minimum password age
  1. Which account lockout policy setting is used to configure the time frame in which incorrect logon attempts must be conducted before an account is locked out?
  2. a. Account lockout duration
  3. b. Account lockout threshold
  4. c. Reset account lockout counter after
  5. d. Password must meet complexity requirements
  6. e. Store passwords using reversible encryption
c. Reset account lockout counter after
  1. The _____ local policy controls the tasks users are allowed to perform.
User Rights Assigment
  1. Which type of AppLocker rule condition can uniquely identify any file regardless of its location?
  2. a. Publisher
  3. b. Hash
  4. c. Network zone
  5. d. Path

b. Hash
  1. How would you create AppLocker rules if you wanted to avoid updating the rules when most software is installed?
  2. a. Manually create rules for each application
  3. b. Automatically generate rules
  4. c. Create default rules
  5. d. Download rule templates
c. Create default rules
  1. Evaluating DLL files for software restrictions has a minimal performance impact because of caching. True or False?
False
  1. Which utilities can be used to compare the settings in a security template against a computer configuration? (Choose all that apply.)
  2. a. Secedit
  3. b. Windows Defender
  4. c. Security Templates snap-in
  5. d. Group Policy Object Editor
  6. e. Security Configuration and Analysis tool
a. Secedit
e. Security Configuration and Analysis tool
  1. To which event log are audit events written?
  2. a. Application
  3. b. Security
  4. c. System
  5. d.Audit
  6. e. Advanced Audit
b. Security
  1. An _____ is used to describe the structure of an application and trigger UAC when required.
Application Manifest
  1. What are you disabling when you configure UAC to not dim the desktop?
  2. a. Admin Approval Mode
  3. b. File and Registry Virtualization
  4. c. user-initiated prompts
  5. d. secure desktop

d. Secure Desktop