0% found this document useful (0 votes)
87 views7 pages

Final Quiz 1 - Attempt Review

This document contains a review of answers to 20 multiple choice questions from a final quiz on IT security topics. The review shows that the user answered 8 questions correctly and 12 questions incorrectly, with scores marked for each question. Key topics covered include Encrypting File System (EFS), Software Restriction Policies (SRP), Group Policy, BitLocker Drive Encryption, and AppLocker.

Uploaded by

Almar Aguilar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views7 pages

Final Quiz 1 - Attempt Review

This document contains a review of answers to 20 multiple choice questions from a final quiz on IT security topics. The review shows that the user answered 8 questions correctly and 12 questions incorrectly, with scores marked for each question. Key topics covered include Encrypting File System (EFS), Software Restriction Policies (SRP), Group Policy, BitLocker Drive Encryption, and AppLocker.

Uploaded by

Almar Aguilar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

4/16/23, 1:17 PM Final Quiz 2: Attempt review

Use the hidden Notes Over-flow Slide as page two of the Notes Page if you have too much Notes
content linked with one slide to fit in one Notes Page.

Select one:
True 
False

Question 2

Correct

Mark 1 out of 1

Encrypting File System (EFS) is the built-in file enNew EFS

Select one:
True 
False

Question 3
Correct

Mark 1 out of 1

SRP was created to assist businesses in controlling unknown code, whether malicious or not, not merely
for compatibility reasons.

Select one:
True 
False

https://trimestral.amaesonline.com/2223A/mod/quiz/review.php?attempt=350450&cmid=59020 1/7
4/16/23, 1:17 PM Final Quiz 2: Attempt review

Question 4

Incorrect

Mark 0 out of 1

IT managers can utilize Group Policy to automate one-to-one control of users and workstations.

Select one:
True 
False

Question 5
Incorrect

Mark 0 out of 1

The built-in file encryption tool Encrypting File System (EFS) does not require the necessary
cryptographic (symmetric) key to read the encrypted data.

Select one:
True 
False

Question 6
Correct

Mark 1 out of 1

Local Group Policy and local machine settings are always in effect for local and domain users.

Select one:
True 
False

https://trimestral.amaesonline.com/2223A/mod/quiz/review.php?attempt=350450&cmid=59020 2/7
4/16/23, 1:17 PM Final Quiz 2: Attempt review

Question 7

Incorrect

Mark 0 out of 1

The integrity of the login procedure is ensured by Windows BitLocker Drive Encryption.

Select one:
True 
False

Question 8
Incorrect

Mark 0 out of 1

User preferences are applied at login and subsequently at irregular intervals, whereas computer
preferences are applied at start-up and then at irregular intervals.

Select one:
True 
False

Question 9
Incorrect

Mark 0 out of 1

Limited authentication is provided by TPM mode.

Select one:
True 
False

https://trimestral.amaesonline.com/2223A/mod/quiz/review.php?attempt=350450&cmid=59020 3/7
4/16/23, 1:17 PM Final Quiz 2: Attempt review

Question 10

Incorrect

Mark 0 out of 1

The second layer is a Local Group Policy object that can contain both computer and user settings.

Select one:
True 
False

Question 11
Incorrect

Mark 0 out of 1

This slide must not be printed, as indicated by the blue line. Do not add material to this slide or change
it in any way in an actual module. The Notes Page is the only place where you can add content.

Select one:
True 
False

Question 12
Incorrect

Mark 0 out of 1

The following limited users are allowed to run files in the default Program Files directory by default
rules. You can select a folder that includes the.exe files.

Select one:
True 
False

https://trimestral.amaesonline.com/2223A/mod/quiz/review.php?attempt=350450&cmid=59020 4/7
4/16/23, 1:17 PM Final Quiz 2: Attempt review

Question 13

Correct

Mark 1 out of 1

The computer operating system and data stored on the operating system volume are encrypted using
Windows BitLocker Drive Encryption.

Select one:
True 
False

Question 14
Correct

Mark 1 out of 1

TPM mode prevents the computer from starting until the user enters a personal PIN or inserts a USB
device with a BitLocker startup key.

Select one:
True 
False

Question 15
Correct

Mark 1 out of 1

The third layer, User-specific Local Group Policy, is implemented last and only applies to one unique
user on the local machine.

Select one:
True 
False

https://trimestral.amaesonline.com/2223A/mod/quiz/review.php?attempt=350450&cmid=59020 5/7
4/16/23, 1:17 PM Final Quiz 2: Attempt review

Question 16

Correct

Mark 1 out of 1

The Action Center is a central area for seeing system messages and the beginning point for diagnosing
and resolving server problems.

Select one:
True 
False

Question 17
Incorrect

Mark 0 out of 1

AppLocker is a new security feature in Windows 6 that allows IT administrators to control exactly what
can run on user computers.

Select one:
True 
False

Question 18
Incorrect

Mark 0 out of 1

A 24-digit password used to open a system in recovery mode is known as a BitLocker Recovery
Password.

Select one:
True 
False

https://trimestral.amaesonline.com/2223A/mod/quiz/review.php?attempt=350450&cmid=59020 6/7
4/16/23, 1:17 PM Final Quiz 2: Attempt review

Question 19

Incorrect

Mark 0 out of 1

Windows 7 supports only one mode of operation.

Select one:
True 
False

Question 20
Correct

Mark 1 out of 1

BitLocker can be enabled in three ways:


• From the Control Panel's System and Settings
• In Windows Explorer, right-click the encrypted volume and pick the Turn on BitLocker menu option.
• Use the manage-bde.wsf command-line tool.

Select one:
True 
False

https://trimestral.amaesonline.com/2223A/mod/quiz/review.php?attempt=350450&cmid=59020 7/7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy