Can any one help with the quiz QUESTION 1 By default, the options for strengthen
ID: 3741679 • Letter: C
Question
Can any one help with the quiz
QUESTION 1
By default, the options for strengthening the password policy in the Group Policy Management Editor are:
set at the minimum levels.
set at the maximum levels.
undefined until they are modified.
unable to be changed or modified.
10.00000 points
QUESTION 2
Effective resource management:
locks out unauthorized access and can work to prevent changes to resources by internal users not qualified or authorized to have access.
applies read-only access to all folders for all users, with the exception of administrators and the organization’s management team.
enables a security administrator to control user and resource access from individual machines rather than from a central location.
dictates that guest users be placed in a secure network, isolated from the production network by firewall barriers.
10.00000 points
QUESTION 3
Following precedent rules, the:
Domain Controller policies and local policies have no precedence within the domain.
Domain Controller policies and local policies have equal precedence.
local policies take precedence over any Domain Controller policies.
Domain Controller policies take precedence over any local policies.
10.00000 points
QUESTION 4
In the lab, you applied read-only access to the LabDocuments folders for the ShopFloor group in order to:
prohibit all access to the subfolders.
allow ShopFloor members pass-through access to the subfolders.
provide HumanResources members permissions in the folder.
allow the HRManager to read/write files in the folder.
10.00000 points
QUESTION 5
In the lab, you created a series of folders and assigned __________ to each folder by using the new global groups to secure those resources.
global security permissions
custom security permissions
unique password permissions
domain control
10.00000 points
QUESTION 6
In the lab, you followed a given set of access control criteria to ensure authentication on the remote server by applying the new security groups to a set of:
nested folders.
global groups.
object editors.
administrators.
10.00000 points
QUESTION 7
In the lab, you tested the configurations you made by logging on using the newly created user accounts and attempting to:
read files in the secured folders.
write files to the secured folders.
hack files in the secured folders.
modify the share changes that were made.
10.00000 points
QUESTION 8
In the lab, you used __________ to create a series of user accounts and global security groups.
Group Policy Management Editor
Group Policy Object Editor
Security Settings
Active Directory
10.00000 points
QUESTION 9
In the lab, you used the Group Policy Management Editor to set the minimum password length to __________ characters, to match the current best practices requirements.
four
six
eight
ten
10.00000 points
QUESTION 10
It is important for security practitioners to take into consideration the __________ element when devising password security policies to ensure confidentiality.
unanticipated
human
repetition
availability
10.00000 points
QUESTION 11
Microsoft has developed the Active Directory Domain structure so that a central authority, called the __________, is the repository for all domain security records.
Domain Controller
Windows Group Policy
Domain Editor
Access Controller
10.00000 points
QUESTION 12
Typically best practices would dictate that a guest account would be placed in a(n) __________, isolated from the production network by ________.
access control group; policy
separate cubicle; a door
secure network; firewall barriers
location; fire doors
10.00000 points
QUESTION 13
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fingerprint or a retina scan) or something you possess (a smart card or a USB stick)?
Confidentiality
Authentication
Two-factor authentication
Third-party certificate system
10.00000 points
QUESTION 14
Which of the following elements of the CIA triad refers to maintaining and assuring the accuracy of data over its life-cycle?
Confidentiality
Integrity
Availability
Authentication
10.00000 points
QUESTION 15
Which of the following elements of the CIA triad refers to making sure data is available?
Confidentiality
Integrity
Availability
Authentication
10.00000 points
QUESTION 16
Which of the following elements of the CIA triad refers to preventing the disclosure of secure information to unauthorized individuals or systems?
Confidentiality
Integrity
Availability
Authentication
10.00000 points
QUESTION 17
Which of the following help departments organize unique access controls for access to folders and data files within a department or group so that only those employees who need access to confidential data are granted access?
Title-based access controls
Role-based access controls
Administrative access controls
Privacy-based access controls
10.00000 points
QUESTION 18
Which of the following is a powerful, granular method for controlling machine and user access on the Windows desktop and network?
Domain Controller
Windows Group Policy
Access Editor
Access Controller
10.00000 points
QUESTION 19
Which of the following refers to the database that provides centrally controlled managed access?
Active Directory
Access Directory
Default Domain Policy
Group Policy Management Editor
10.00000 points
QUESTION 20
Which of the following statements is true regarding best practices for password selection?
Leave the administrator account named Administrator.
Repeat the user name in the password whenever possible.
Change passwords only infrequently once they are established.
Use a non-sequential set of numbers, uppercase and lowercase letters, and special characters.
set at the minimum levels.
set at the maximum levels.
undefined until they are modified.
unable to be changed or modified.
Explanation / Answer
1)Answer:
undefined until they are modified
Explanation:
By default, the options for strengthening the password policy in the Group Policy Management Editor are
undefined until they are modified.
2)Answer:
locks out unauthorized access and can work to prevent changes to resources by internal users not qualified or authorized to have access
Explanation:
Effective resource management locks out unauthorized access and can work to prevent changes to resources by internal users not qualified or authorized to have access.
3)Answer:
Domain Controller policies take precedence over any local policies
4)Answer:
allow ShopFloor members pass-through access to the subfolders
Explanation:
In the lab, you applied read-only access to the LabDocuments folders for the ShopFloor group in order to allow ShopFloor members pass-through access to the subfolders
5)Answer:
custom securitypermissions
Explanation:
In the lab, you created a series of folders and assigned custom securitypermissions to each folder by using the new global groups to secure those resources.
6)Answer:
Nested folder
Explanation:
You followed a given set of access control criteria to ensure authentication on the remote serverby applying the new security groups to a set of nested folders nestedfolders.
7)Answer:
write files to the secured folders
Explanation:
you tested the configurations you made by logging on using the newly created user accounts and attempting to write files to the secured folders
8)Answer:
Active Directory
Explanation:
In the lab, you used Active directory to create a series of user accounts and global security groups
9)Answer:
eight
Explanation:
you used the Group Policy Management Editor to set the minimum password length to eight characters, to match the current best practices requirements.
10)Answer:
human
Explanation:
It is important for security practitioners to take into consideration the human element when devising password security policies to ensure confidentiality.
11)Answer:
Domain Controller
Explanation:
Microsoft has developed the Active Directory Domain structure so that a central authority, called the Domain Controller, is the repository for all domain security records.
12)Answer:
secure network; Frewallbarriers
Explanation:
Typically best practices would dictate that a guest account would be placed in a(n) secure network; Frewallbarriers, isolated from the production network by
13)Answer:
Two-factor authentication
Explanation:
Two-factor authentication combines something you know, such as a password, with something you are (a biometric device such as a fingerprint or a retina scan) or something you possess (a smart card or a USB stick)
14)Answer:
Integrity
Explanation:
Integrity is the elements of the CIA triad refers to maintaining and assuring the accuracy of data over its life-cycle.
15)Answer:
Availability
Explanation:
Availability is the elements of the CIA triad refers to making sure data is available
16)Answer:
Confidentiality
Explanation:
Confidentiality is the elements of the CIA triad refers to preventing the disclosure of secure information to unauthorized individuals or systems
17)Answer:
Role-based accesscontrols
Explanation:
Role-based accesscontrols was help departments organize unique access controls for access to folders and data files within a department or group so that only those employees who need access to confidential data are granted access
18)Answer:
Windows GroupPolicy
Explanation:
Windows GroupPolicy is a powerful, granular method for controlling machine and user access on the Windows desktop and network
19)Answer:
Active Directory
Explanation:
Active Directory refers to the database that provides centrally controlled managed access.
20)Answer:
Use a non-sequential set of numbers, uppercase and lowercase letters, and special characters.
Explanation:
the following statements is true regarding best practices for password selection that is Use a non-sequential set of numbers, uppercase and lowercase letters, and special characters.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.