Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Can any one help with the quiz QUESTION 1 By default, the options for strengthen

ID: 3741679 • Letter: C

Question

Can any one help with the quiz

QUESTION 1

By default, the options for strengthening the password policy in the Group Policy Management Editor are:

set at the minimum levels.

set at the maximum levels.

undefined until they are modified.

unable to be changed or modified.

10.00000 points   

QUESTION 2

Effective resource management:

locks out unauthorized access and can work to prevent changes to resources by internal users not qualified or authorized to have access.

applies read-only access to all folders for all users, with the exception of administrators and the organization’s management team.

enables a security administrator to control user and resource access from individual machines rather than from a central location.

dictates that guest users be placed in a secure network, isolated from the production network by firewall barriers.

10.00000 points   

QUESTION 3

Following precedent rules, the:

Domain Controller policies and local policies have no precedence within the domain.

Domain Controller policies and local policies have equal precedence.

local policies take precedence over any Domain Controller policies.

Domain Controller policies take precedence over any local policies.

10.00000 points   

QUESTION 4

In the lab, you applied read-only access to the LabDocuments folders for the ShopFloor group in order to:

prohibit all access to the subfolders.

allow ShopFloor members pass-through access to the subfolders.

provide HumanResources members permissions in the folder.

allow the HRManager to read/write files in the folder.

10.00000 points   

QUESTION 5

In the lab, you created a series of folders and assigned __________ to each folder by using the new global groups to secure those resources.

global security permissions

custom security permissions

unique password permissions

domain control

10.00000 points   

QUESTION 6

In the lab, you followed a given set of access control criteria to ensure authentication on the remote server by applying the new security groups to a set of:

nested folders.

global groups.

object editors.

administrators.

10.00000 points   

QUESTION 7

In the lab, you tested the configurations you made by logging on using the newly created user accounts and attempting to:

read files in the secured folders.

write files to the secured folders.

hack files in the secured folders.

modify the share changes that were made.

10.00000 points   

QUESTION 8

In the lab, you used __________ to create a series of user accounts and global security groups.

Group Policy Management Editor

Group Policy Object Editor

Security Settings

Active Directory

10.00000 points   

QUESTION 9

In the lab, you used the Group Policy Management Editor to set the minimum password length to __________ characters, to match the current best practices requirements.

four

six

eight

ten

10.00000 points   

QUESTION 10

It is important for security practitioners to take into consideration the __________ element when devising password security policies to ensure confidentiality.

unanticipated

human

repetition

availability

10.00000 points   

QUESTION 11

Microsoft has developed the Active Directory Domain structure so that a central authority, called the __________, is the repository for all domain security records.

Domain Controller

Windows Group Policy

Domain Editor

Access Controller

10.00000 points   

QUESTION 12

Typically best practices would dictate that a guest account would be placed in a(n) __________, isolated from the production network by ________.

access control group; policy

separate cubicle; a door

secure network; firewall barriers

location; fire doors

10.00000 points   

QUESTION 13

Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fingerprint or a retina scan) or something you possess (a smart card or a USB stick)?

Confidentiality

Authentication

Two-factor authentication

Third-party certificate system

10.00000 points   

QUESTION 14

Which of the following elements of the CIA triad refers to maintaining and assuring the accuracy of data over its life-cycle?

Confidentiality

Integrity

Availability

Authentication

10.00000 points   

QUESTION 15

Which of the following elements of the CIA triad refers to making sure data is available?

Confidentiality

Integrity

Availability

Authentication

10.00000 points   

QUESTION 16

Which of the following elements of the CIA triad refers to preventing the disclosure of secure information to unauthorized individuals or systems?

Confidentiality

Integrity

Availability

Authentication

10.00000 points   

QUESTION 17

Which of the following help departments organize unique access controls for access to folders and data files within a department or group so that only those employees who need access to confidential data are granted access?

Title-based access controls

Role-based access controls

Administrative access controls

Privacy-based access controls

10.00000 points   

QUESTION 18

Which of the following is a powerful, granular method for controlling machine and user access on the Windows desktop and network?

Domain Controller

Windows Group Policy

Access Editor

Access Controller

10.00000 points   

QUESTION 19

Which of the following refers to the database that provides centrally controlled managed access?

Active Directory

Access Directory

Default Domain Policy

Group Policy Management Editor

10.00000 points   

QUESTION 20

Which of the following statements is true regarding best practices for password selection?

Leave the administrator account named Administrator.

Repeat the user name in the password whenever possible.

Change passwords only infrequently once they are established.

Use a non-sequential set of numbers, uppercase and lowercase letters, and special characters.

set at the minimum levels.

set at the maximum levels.

undefined until they are modified.

unable to be changed or modified.

Explanation / Answer

1)Answer:

undefined until they are modified

Explanation:

By default, the options for strengthening the password policy in the Group Policy Management Editor are

undefined until they are modified.

2)Answer:

locks out unauthorized access and can work to prevent changes to resources by internal users not qualified or authorized to have access

Explanation:

Effective resource management locks out unauthorized access and can work to prevent changes to resources by internal users not qualified or authorized to have access.

3)Answer:

Domain Controller policies take precedence over any local policies

4)Answer:

allow ShopFloor members pass-through access to the subfolders

Explanation:

In the lab, you applied read-only access to the LabDocuments folders for the ShopFloor group in order to allow ShopFloor members pass-through access to the subfolders

5)Answer:

custom securitypermissions

Explanation:

In the lab, you created a series of folders and assigned custom securitypermissions to each folder by using the new global groups to secure those resources.

6)Answer:

Nested folder

Explanation:

You followed a given set of access control criteria to ensure authentication on the remote serverby applying the new security groups to a set of nested folders nestedfolders.

7)Answer:

write files to the secured folders

Explanation:

you tested the configurations you made by logging on using the newly created user accounts and attempting to write files to the secured folders

8)Answer:

Active Directory

Explanation:

In the lab, you used Active directory to create a series of user accounts and global security groups

9)Answer:

eight

Explanation:

you used the Group Policy Management Editor to set the minimum password length to eight characters, to match the current best practices requirements.

10)Answer:

human

Explanation:

It is important for security practitioners to take into consideration the human element when devising password security policies to ensure confidentiality.

11)Answer:

Domain Controller

Explanation:

Microsoft has developed the Active Directory Domain structure so that a central authority, called the Domain Controller, is the repository for all domain security records.

12)Answer:

secure network; Frewallbarriers

Explanation:

Typically best practices would dictate that a guest account would be placed in a(n) secure network; Frewallbarriers, isolated from the production network by

13)Answer:

Two-factor authentication

Explanation:

Two-factor authentication combines something you know, such as a password, with something you are (a biometric device such as a fingerprint or a retina scan) or something you possess (a smart card or a USB stick)

14)Answer:

Integrity

Explanation:

Integrity is the  elements of the CIA triad refers to maintaining and assuring the accuracy of data over its life-cycle.

15)Answer:

Availability

Explanation:

Availability is the elements of the CIA triad refers to making sure data is available

16)Answer:

Confidentiality

Explanation:

Confidentiality is the elements of the CIA triad refers to preventing the disclosure of secure information to unauthorized individuals or systems

17)Answer:

Role-based accesscontrols

Explanation:

Role-based accesscontrols was help departments organize unique access controls for access to folders and data files within a department or group so that only those employees who need access to confidential data are granted access

18)Answer:

Windows GroupPolicy

Explanation:

Windows GroupPolicy is a powerful, granular method for controlling machine and user access on the Windows desktop and network

19)Answer:

Active Directory

Explanation:

Active Directory  refers to the database that provides centrally controlled managed access.

20)Answer:

Use a non-sequential set of numbers, uppercase and lowercase letters, and special characters.

Explanation:

the following statements is true regarding best practices for password selection that is Use a non-sequential set of numbers, uppercase and lowercase letters, and special characters.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote