You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?
Cybersecurity Midterm

Quiz
•
Computers
•
9th - 12th Grade
•
Easy
Joseph Gilliam
Used 36+ times
FREE Resource
93 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Configure account lockout in Group Policy.
Configure account policies in Group Policy.
Configure account expiration in the user accounts.
Configure day/time restrictions in the user accounts.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Microsoft tool can be used to review a system's security configuration against recommended settings?
Microsoft Security Compliance Toolkit
Registry Editor
Microsoft Internet Explorer
Windows Defender
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of update should be prioritized even outside of a normal patching window?
Microsoft updates
Security updates
Critical updates
Monthly updates
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following makes this documentation more useful? (select 3)
Have a printed hard copy kept in a secure location.
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)
WSUS
Security Templates
Group Policy
Security Configuration and Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a configuration baseline?
A list of common security settings that a group or all devices share
A collection of security settings that can be automatically applied to a device
A set of performance statistics that identifies normal operating performance
The minimum services required for a server to function
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By definition, what is the process of reducing security exposure and tightening security controls?
Hardening
Passive reconnaissance
Social engineering
Active scanning
Create a free account and access millions of resources
Similar Resources on Quizizz
92 questions
A+Core 1 (200-300)#3

Quiz
•
10th Grade - University
90 questions
Mid Assessment Benchmark

Quiz
•
9th - 12th Grade
89 questions
Grade 10 ICT. third term test

Quiz
•
12th Grade
93 questions
CN-I SAMPLE PART -A 2K23 BATCH

Quiz
•
12th Grade
88 questions
CCNA NETACAD 14-15 EXAM PREP

Quiz
•
9th - 12th Grade
93 questions
PYTHON JAVA WEB K3LH PKWU DESAIN DPPLG RPL SMK KELAS 10 PTS PAS

Quiz
•
10th Grade
90 questions
Computer System

Quiz
•
11th Grade
89 questions
Computer Network Systems

Quiz
•
10th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University