Questions Dump - Students
Questions Dump - Students
A. authorization
B. auditing
C. administration
D. authentication
Answer : B
2. When users attempt to access an application or a service, …………controls their level of access.
A. authorization
B. auditing
C. administration
D. authentication
Answer : A
3. …………….. a file makes the data in the file readable and usable to viewers that have the
appropriate key.
A. Archiving
B. Compressing
C. Deduplicating
D. Encrypting
Answer : D
Answer : A
5. Verifying the authenticity of a digitally signed document requires the public key of the signer.
A. True
B. False
Answer : A
6. Verifying the authenticity of a digitally signed document requires the private key of the signer.
A. True
B. False
Answer: B
7. …………………… requires additional verification, such as a verification code sent to a mobile phone.
A. Multi-factor authentication (MFA)
B. Pass-through authentication
C. Password writeback
D. Single sign-on (SSO)
Answer: A
8. Tamper protection is a capability in Microsoft Defender for Endpoint that helps protect certain
system settings, such as registry and system32 files, from being changed.
A. True
B. False
Answer: B
9. DirectAccess allows connectivity for remote users to organization network resources without the
need for traditional Virtual Private Network (VPN) connections.
A. True
B. False
Answer: A
10. Man-in-the-Middle (MitM) Attacks can be used as a way for initial access
A. True
B. False
Answer: A
Answer : C
Answer : B
13. A Group Policy (GPO) can be configured at which level (the higher):
A. Forest
B. Domain
C. OU
D. Object
Answer : B
Answer : D
16. Account lockout policy can be configured to enable a disabled user account after a certain
duration.
A. True
B. False
Answer: B
Answer: A
Answer: A
Answer: C
Answer: B
21. What Options for VPN tunneling protocol that supports mobility of users ?
A. PPTP
B. L2TP
C. SSTP
D. IKEv2
Answer: D
Answer: C
23. Which protocol and port number combination is commonly associated with Remote Desktop
Protocol (RDP) and needs to be allowed through Windows Firewall for remote access to a
Windows system?
A. Protocol: TCP, Port: 3389
B. Protocol: UDP, Port: 80
C. Protocol: TCP, Port: 80
D. Protocol: UDP, Port: 3389
Answer: A
Answer: B
25. Which of the following tools in Active Directory can be used to track changes made to user
accounts, including modifications to attributes and group memberships?
A. Active Directory Users and Computers (ADUC)
B. Active Directory Administrative Center (ADAC)
C. Security Configuration Wizard (SCW)
D. Active Directory Audit Policy
Answer: D
26. What does the term "Account Lockout Threshold" refer to in Active Directory auditing?
A. The maximum number of login attempts before an account is disabled
B. The number of password changes required for an account to reset
C. The frequency at which account password expiration notifications are sent
D. The number of failed login attempts before an account is locked
Answer: D
27. Which of the following authentication methods is NOT supported by Web Application Proxy for
publishing internal web applications to external users?
A. Windows Integrated Authentication
B. Forms-based authentication
C. Single Sign-On
D. Two-factor authentication
Answer: B
28. What is the purpose of using Registry Auditing in Windows for security purposes?
A. It prevents unauthorized changes to registry settings.
B. It encrypts sensitive registry keys to protect them from unauthorized access.
C. It monitors and logs changes made to registry keys for security analysis.
D. It automatically repairs registry errors and inconsistencies.
Answer: C
29. What is the primary objective of a Pass-the-Hash attack targeting Active Directory?
A. Extracting plaintext passwords from the Active Directory database
B. Obtaining and exploiting password hashes to gain unauthorized access
C. Initiating a Distributed Denial of Service (DDoS) attack on Active Directory servers
D. Intercepting LDAP queries between domain controllers
Answer: B
30. What is the primary risk associated with week account lockout password policies?
A. Brute-forcing user account passwords
B. Extracting sensitive information about Active Directory objects
C. Initiating a denial-of-service attack on domain controllers
D. Exploiting vulnerabilities in DNS servers
Answer: A
31. What does Server-Side Template Injection (SSTI) primarily exploit in web applications?
A. Vulnerabilities in user input validation
B. Weaknesses in server-side scripting languages
C. Misconfigurations in network firewalls
D. Issues with client-side JavaScript frameworks
Answer: B
Answer: C
33. What is the highest level of access in the Windows operating system that grants full control over
the system?
A. User
B. Administrator
C. Guest
D. System
Answer: D
34. What security in Windows protects the system from the usage of vulnerable drivers for malicious
activities?
A. Microsoft vulnerable driver blocklist
B. Windows Defender Application Control policy (WDAC)
C. AppLocker
Answer: A
35. Which function of Mimikatz is commonly used to perform Pass-the-Hash (PtH) attacks in
Windows environments?
A. sekurlsa::logonpasswords
B. lsadump::sam
C. privilege::debug
D. sekurlsa::pth
Answer: D
36. What command to use to start BITS service on server SRV01 from command line?
A. sc.exe start BITS @srv01
B. sc.exe \\srv01 start BITS
C. net \\srv01 start BITS
D. net start BITS @srv01
Answer: B
Answer : C
Answer: D
39. What tool that can be used to find interesting attacks paths using objects mapping?
A. SharpHound
B. BloodHound
C. Mimikatz
D. Rubeus
Answer: B
40. In Windows environments, what feature is commonly used to securely store and manage
sensitive user credentials, such as passwords?
A. Credential Guard
B. Password Lockbox
C. Secure Password Vault
D. Access Control Lists (ACLs)
Answer: A