CYB 140 Wk 3 - Practice Quiz

Page 1

Computer Network Defense Part 2

The Latest Version A+ Study Guide

CYB 140 Entire Course Link

https://www.onlinehelp123.com/cyb-140

CYB 140 Wk 3 - Practice: Quiz

1. Question 1

4/4

Which of the following is a Windows Active Directory feature used to identify and control the execution of applications on various systems? Hide answer choices 1.

Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?

CYB/140
**********************************************
**********************************************
AppLocker
BitLocker
Software
Desktop
2.
3.
Restriction Policies (SRPs) 4.
Central 2. Question 2 4/4
Hash
Path
Certificate
Internet
Hide answer choices 1.
Rules 2.
Rule 3.
Rule 4.
Zone Rules
3. Question 3

4/4

How can the Windows PUA (Potentially Unwanted Applications) protection feature be configured?

1.

Using Bitlocker

2.

Using AppLocker

3.

Using Group Policy settings

4.

Using Registry

4. Question 4

4/4

Which of the following best describes how the form of access control called application blacklisting works?

Hide answer choices

1.

Allows applications that are listed

2.

Reduces application-related failures

3.

Allows applications that are not listed

4. Executes untrusted or untested programs

5. Question 5

4/4

Which of the following forms of access control is threat-centric?

Hide answer choices

1.

Application whitelisting

2.

Application patch management

3.

Application sandboxing

4.

Application blacklisting

6. Question 6

4/4

Which of the following are integrated with Microsoft AD and group policy and are set by network defenders to restrict software from unauthorized usage?

1.

Registry Editor

2.

Potentially unwanted applications

3.

ManageEngine Desktop Central

4. Software restriction policies

7. Question 7

4/4

Which of the following SRP rules can allow users to access a specific folder, even if the system is blocked from all applications?

Hide answer choices

1. Hash rule

2. Internet zone rule

3. Certificate rule

4. Path rule

8. Question 8

4/4

In which of the following cases would the SRP rules, called hash rules, no longer apply for whitelisting applications?

Hide answer choices

1.

If the application is run by its location

2.

If the application is renamed

3.

If the application is moved

4.

If the application is upgraded

9. Question 9

4/4

Which of the following types of SRP rules for whitelisting applications is used to automatically trust software from trusted software vendors in a domain without user interference?

Hide answer choices

1.

Internet zone rule

2. Path rule

3.

Certificate rule

4. Hash rule

10. Question 10

4/4

In a Windows system, which of the following can prevent the execution of apps that are excluded from a list of allowed apps?

Hide answer choices

1.

Group policy settings

2.

Registry Editor

3.

AppLocker

4.

Windows Defender Application Guard

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
CYB 140 Wk 3 - Practice Quiz by bobby kenny - Issuu