Search Header Logo

Cybersecurity Midterm

Authored by Joseph Gilliam

Computers

9th - 12th Grade

Used 36+ times

Cybersecurity Midterm
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

93 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?

Configure account lockout in Group Policy.

Configure account policies in Group Policy.

Configure account expiration in the user accounts.

Configure day/time restrictions in the user accounts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?

Microsoft Security Compliance Toolkit

Registry Editor

Microsoft Internet Explorer

Windows Defender

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of update should be prioritized even outside of a normal patching window?

Microsoft updates

Security updates

Critical updates

Monthly updates

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following makes this documentation more useful? (select 3)

Have a printed hard copy kept in a secure location.

Identify the choke points on the network.

Automate administration as much as possible.

Identify who is responsible for each device.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)

WSUS

Security Templates

Group Policy

Security Configuration and Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a configuration baseline?

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

A set of performance statistics that identifies normal operating performance

The minimum services required for a server to function

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By definition, what is the process of reducing security exposure and tightening security controls?

Hardening

Passive reconnaissance

Social engineering

Active scanning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?