Home » Flashcards » Windows 10 Security Features

Windows 10 Security Features

   Send article as PDF   

The local security policy is part of a larger Windows management system known as which of the following?

Group Policy

Which of the following is considered one of the biggest sources of malware (malicious software)?

the Internet

What type of encryption algorithm uses the same key to encrypt data and decrypt data?

symmetric

Account policies settings are located in which of the following?

local security policy

In Windows 10, advanced audit policies can only be edited at a command-line.

False

Match each item with a statement below.

* An encryption technology for individual files and folders that can be enabled by users

* Malicious software designed to perform unauthorized acts on your computer

* The security process that records the occurrence of specific operating system events in the Security log

* A feature in Windows 10 that elevates user privileges only when required

* A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification

* A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed

* A collection of settings to control password characteristics such as length and complexity

* Anti-malware software included with Windows 10

* A command-line tool that is used to apply, export, or analyze security templates

Encrypting File System (EFS) Malware Auditing User Account Control (UAC) BitLocker Drive Encryption Hashing algorithm Password policy Windows Defender Secedit

Which policy controls password characteristics for local user accounts?

password

NTFS permissions can be easily circumvented when you have physical access to a computer.

True

Which of the following is a threat to privacy and is sometimes installed when you visit a website?

Spyware

Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following?

Application Compatibility Toolkit

The most common use for AppLocker is malware prevention.

True

Which policy allows you to configure an account to be temporarily disabled after a number of incorrect log-on attempts?

account lockout

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?

privilege use

To address the risks to data stored on computers and laptops, which encryption technology is available in Windows 10?

BitLocker Drive Encryption

Which of the following can be used to define which programs are allowed or disallowed in the system?

AppLocker

What type of encryption algorithm uses two keys to encrypt and decrypt data?

asymmetric

Which type of permissions are considered the most basic level of data security in Windows 10?

NTFS

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

hash

What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior?

Spyware

Which rule condition identifies software by file location?

path

Which security process records the occurrence of specific operating system events in the Security log?

Auditing

Every object in Windows 10 has audit events related to it.

True

The Account Policies in the Local Security Policy can be used to control domain accounts.

False

Newer Windows applications use which of the following to describe the structure of an application?

manifest

Which part of the motherboard in your computer is used to store encryption keys and certificates?

TPM

What is the default value for the "Maximum password age" setting in the Password Policy?

42 Days

The process of taking data and making it unreadable is known as which of the following? (Choose all that apply)

Obfuscation CorrectIncorrect Encryption

Scroll to Top