- Description
CYB 140 Wk 3 – Practice: Quiz
- Question 1
4/4
Which of the following is a Windows Active Directory feature used to identify and control the execution of applications on various systems?
Hide answer choices
AppLocker
BitLocker
Software Restriction Policies (SRPs)
Desktop Central
- Question 2
4/4
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
Hide answer choices
Hash Rules
Path Rule
Certificate Rule
Internet Zone Rules
- Question 3
4/4
How can the Windows PUA (Potentially Unwanted Applications) protection feature be configured?
Using Bitlocker
Using AppLocker
Using Group Policy settings
Using Registry
- Question 4
4/4
Which of the following best describes how the form of access control called application blacklisting works?
Hide answer choices
Allows applications that are listed
Reduces application-related failures
Allows applications that are not listed
Executes untrusted or untested programs
- Question 5
4/4
Which of the following forms of access control is threat-centric?
Hide answer choices
Application whitelisting
Application patch management
Application sandboxing
Application blacklisting
- Question 6
4/4
Which of the following are integrated with Microsoft AD and group policy and are set by network defenders to restrict software from unauthorized usage?
Registry Editor
Potentially unwanted applications
ManageEngine Desktop Central
Software restriction policies
- Question 7
4/4
Which of the following SRP rules can allow users to access a specific folder, even if the system is blocked from all applications?
Hide answer choices
Hash rule
Internet zone rule
Certificate rule
Path rule
- Question 8
4/4
In which of the following cases would the SRP rules, called hash rules, no longer apply for whitelisting applications?
Hide answer choices
If the application is run by its location
If the application is renamed
If the application is moved
If the application is upgraded
- Question 9
4/4
Which of the following types of SRP rules for whitelisting applications is used to automatically trust software from trusted software vendors in a domain without user interference?
Hide answer choices
Internet zone rule
Path rule
Certificate rule
Hash rule
- Question 10
4/4
In a Windows system, which of the following can prevent the execution of apps that are excluded from a list of allowed apps?
Hide answer choices
Group policy settings
Registry Editor
AppLocker
Windows Defender Application Guard