CYB 140 Wk 3 – Practice: Quiz

0 items
CYB 140 Wk 3 - Practice: Quiz
CYB 140 Wk 3 – Practice: Quiz
$5.00
  • Description

CYB 140 Wk 3 – Practice: Quiz

  1. Question 1

4/4

Which of the following is a Windows Active Directory feature used to identify and control the execution of applications on various systems?

Hide answer choices

AppLocker

BitLocker

Software Restriction Policies (SRPs)

Desktop Central

  1. Question 2

4/4

Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?

Hide answer choices

Hash Rules

Path Rule

Certificate Rule

Internet Zone Rules

  1. Question 3

4/4

How can the Windows PUA (Potentially Unwanted Applications) protection feature be configured?

 

Using Bitlocker

Using AppLocker

Using Group Policy settings

Using Registry

 

  1. Question 4

4/4

Which of the following best describes how the form of access control called application blacklisting works?

Hide answer choices

Allows applications that are listed

Reduces application-related failures

Allows applications that are not listed

Executes untrusted or untested programs

  1. Question 5

4/4

Which of the following forms of access control is threat-centric?

Hide answer choices

Application whitelisting

Application patch management

Application sandboxing

Application blacklisting

 

  1. Question 6

4/4

Which of the following are integrated with Microsoft AD and group policy and are set by network defenders to restrict software from unauthorized usage?

Registry Editor

Potentially unwanted applications

ManageEngine Desktop Central

Software restriction policies

 

 

  1. Question 7

4/4

Which of the following SRP rules can allow users to access a specific folder, even if the system is blocked from all applications?

Hide answer choices

Hash rule

Internet zone rule

Certificate rule

Path rule

  1. Question 8

4/4

In which of the following cases would the SRP rules, called hash rules, no longer apply for whitelisting applications?

Hide answer choices

If the application is run by its location

If the application is renamed

If the application is moved

If the application is upgraded

  1. Question 9

4/4

Which of the following types of SRP rules for whitelisting applications is used to automatically trust software from trusted software vendors in a domain without user interference?

Hide answer choices

Internet zone rule

Path rule

Certificate rule

Hash rule

  1. Question 10

4/4

In a Windows system, which of the following can prevent the execution of apps that are excluded from a list of allowed apps?

Hide answer choices

Group policy settings

Registry Editor

AppLocker

Windows Defender Application Guard