Security Fundamentals v1.0

Page:    1 / 12   
Exam contains 172 questions

Account lockout policies are used to prevent which type of security attack?

  • A. Brute force attacks
  • B. Users sharing passwords
  • C. Social engineering
  • D. Passwords being reused immediately


Answer : A

What is the standard or basic collection of NTFS permissions?

  • A. Read and execute, read, write, full control, modify, list folder contents
  • B. Change permissions, read permissions, write permissions
  • C. Read attributes, list folder/read data, traverse folder/execute file
  • D. Create files/write data, create folders/append data, take ownership


Answer : A

Reference:
http://technet.microsoft.com/en-us/library/bb727008.aspx

Which is the minimum requirement to create BitLocker-To-Go media on a client computer?

  • A. Windows XP Professional Service Pack 3
  • B. Windows Vista Enterprise Edition
  • C. Windows 7 Enterprise Edition
  • D. Windows 2000 Professional Service Pack 4


Answer : A

Which enables you to change the permissions on a folder?

  • A. Take ownership
  • B. Extended attributes
  • C. Auditing
  • D. Modify


Answer : D

A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.
What should you do first?

  • A. Disable folder sharing
  • B. Hide the folder
  • C. Change the owner
  • D. Block inheritance


Answer : A

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:




Answer :

Explanation:
Biometric devices, such as finger scanners consist of a reader or scanning device, Software that converts the scanned information into digital form and compares match points, and a database that stores the biometric data for comparison. To prevent identity theft, biometric data is usually encrypted when it is gathered.

What are three examples of two-factor authentication? (Choose three.)

  • A. A fingerprint and a pattern
  • B. A password and a smart card
  • C. A username and a password
  • D. A password and a pin number
  • E. A pin number and a debit card


Answer : ABE

Explanation:
At minimum two-factor authentication requires two out of three regulatory-approved authentication variables such as:
-> Something you know (like the PIN on your bank card or email password).
-> Something you have (the physical bank card or a authenticator token).
-> Something you are (biometrics like your finger print or iris pattern).

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:




Answer :

You need to limit the programs that can run on client computers to a specific list.
Which technology should you implement?

  • A. Windows Security Center
  • B. Security Accounts Manager
  • C. System Configuration Utility
  • D. AppLocker group policies


Answer : A

The purpose of User Account Control (UAC) is to:

  • A. Encrypt the user's account
  • B. Limit the privileges of software
  • C. Secure your data from corruption
  • D. Facilitate Internet filtering


Answer : B

Explanation:
User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows machines. It aims to improve the security of Microsoft
Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system.

What does implementing Windows Server Update Services (WSUS) allow a company to manage?

  • A. Shared private encryption key updates
  • B. Updates to Group Policy Objects
  • C. Active Directory server replication
  • D. Windows updates for workstations and servers


Answer : D

The purpose of Microsoft Baseline Security Analyzer is to:

  • A. List system vulnerabilities.
  • B. Apply all current patches to a server.
  • C. Set permissions to a default level.
  • D. Correct a company's security state.


Answer : A

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:




Answer :

The Graphic Design Institute hires you to help them set up a server for their 20-person team.
As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)

  • A. Disable the guest account.
  • B. Rename the admin account.
  • C. Remove the account lockout policy.
  • D. Format partitions with FAT32.


Answer : AB

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

  • A. An image contained in the message
  • B. Spelling and grammar errors
  • C. Threats of losing service
  • D. Use of bold and italics


Answer : BC

Reference:
http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx

Page:    1 / 12   
Exam contains 172 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy