Computer Network Defense Part 2
The Latest Version A+ Study Guide
CYB 140 Entire Course Link
https://www.onlinehelp123.com/cyb-140
CYB 140 Wk 3 - Practice: Quiz
1. Question 1
4/4
Which of the following is a Windows Active Directory feature used to identify and control the execution of applications on various systems? Hide answer choices 1.
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
4/4
How can the Windows PUA (Potentially Unwanted Applications) protection feature be configured?
1.
Using Bitlocker
2.
Using AppLocker
3.
Using Group Policy settings
4.
Using Registry
4. Question 4
4/4
Which of the following best describes how the form of access control called application blacklisting works?
Hide answer choices
1.
Allows applications that are listed
2.
Reduces application-related failures
3.
Allows applications that are not listed
4. Executes untrusted or untested programs
5. Question 5
4/4
Which of the following forms of access control is threat-centric?
Hide answer choices
1.
Application whitelisting
2.
Application patch management
3.
Application sandboxing
4.
Application blacklisting
6. Question 6
4/4
Which of the following are integrated with Microsoft AD and group policy and are set by network defenders to restrict software from unauthorized usage?
1.
Registry Editor
2.
Potentially unwanted applications
3.
ManageEngine Desktop Central
4. Software restriction policies
7. Question 7
4/4
Which of the following SRP rules can allow users to access a specific folder, even if the system is blocked from all applications?
Hide answer choices
1. Hash rule
2. Internet zone rule
3. Certificate rule
4. Path rule
8. Question 8
4/4
In which of the following cases would the SRP rules, called hash rules, no longer apply for whitelisting applications?
Hide answer choices
1.
If the application is run by its location
2.
If the application is renamed
3.
If the application is moved
4.
If the application is upgraded
9. Question 9
4/4
Which of the following types of SRP rules for whitelisting applications is used to automatically trust software from trusted software vendors in a domain without user interference?
Hide answer choices
1.
Internet zone rule
2. Path rule
3.
Certificate rule
4. Hash rule
10. Question 10
4/4
In a Windows system, which of the following can prevent the execution of apps that are excluded from a list of allowed apps?
Hide answer choices
1.
Group policy settings
2.
Registry Editor
3.
AppLocker
4.
Windows Defender Application Guard