Cybersecurity Midterm

Quiz
•
Computers
•
9th - 12th Grade
•
Easy
Joseph Gilliam
Used 36+ times
FREE Resource
93 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?
Configure account lockout in Group Policy.
Configure account policies in Group Policy.
Configure account expiration in the user accounts.
Configure day/time restrictions in the user accounts.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Microsoft tool can be used to review a system's security configuration against recommended settings?
Microsoft Security Compliance Toolkit
Registry Editor
Microsoft Internet Explorer
Windows Defender
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of update should be prioritized even outside of a normal patching window?
Microsoft updates
Security updates
Critical updates
Monthly updates
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following makes this documentation more useful? (select 3)
Have a printed hard copy kept in a secure location.
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)
WSUS
Security Templates
Group Policy
Security Configuration and Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a configuration baseline?
A list of common security settings that a group or all devices share
A collection of security settings that can be automatically applied to a device
A set of performance statistics that identifies normal operating performance
The minimum services required for a server to function
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By definition, what is the process of reducing security exposure and tightening security controls?
Hardening
Passive reconnaissance
Social engineering
Active scanning
Create a free account and access millions of resources
Similar Resources on Wayground
92 questions
AICE Comp Sci Units 1-3

Quiz
•
10th Grade
96 questions
Year 10 GCSE CS revision - topics taught

Quiz
•
9th Grade
93 questions
CN-I SAMPLE PART -A 2K23 BATCH

Quiz
•
12th Grade
88 questions
CCNA NETACAD 14-15 EXAM PREP

Quiz
•
9th - 12th Grade
90 questions
Domain 2.1-4 Test

Quiz
•
9th Grade
93 questions
PYTHON JAVA WEB K3LH PKWU DESAIN DPPLG RPL SMK KELAS 10 PTS PAS

Quiz
•
10th Grade
98 questions
OCR GCSE Computer Science Revision Paper 1- Saim C :D

Quiz
•
8th - 12th Grade
89 questions
Computer Network Systems

Quiz
•
10th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
6 questions
RL.10.1 Cite Evidence

Quiz
•
10th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
14 questions
Algebra 1 SOL Review #1

Quiz
•
9th Grade