1. Which of the following is the strongest reason why operating system access controls are insufficient to secure objects?
It’s possible to boot into another operating system and format the disk.
Strong passwords longer that 24 characters are not common.
It’s possible to boot into another operating system and bypass access controls.
It is often possible to find a user’s password written down.
2. What piece of information is necessary to encrypt and decrypt data?
Key
Salt
TPM
Recovery agent
3. Which Windows feature allows you to encrypt entire volumes?
EFS
Veracrypt
BitLocker
AppLocker
4. Which Windows feature uses keys based on a user’s password?
EFS
Veracrypt
BitLocker
AppLocker
5. Where does BitLocker store encryption keys for transparent mode?
USB key
Recovery file
EFS
TPM
6. Which operating system does not have BitLocker enabled by default?
Windows Server 2019
Windows XP
Windows 10 Professional
Windows 10 Home
7. Which of the following services does communication encryption not provide?
Confidentiality
Nonrepudiation
Integrity
Availability
8. Which protocol commonly provides a secure channel for HTTPS?
TLS/SSL
PPTP
S-PPTP
L2TP
9. Which VPN protocol has the fewest issues with NATs and firewalls?
L2TP
SSTP
IPSec
PPTP
10. Which of the following is the weakest wireless protocol (and should never be used)?
WPA
PSK
WEP
SSID
11. Which type of encryption algorithm uses two related keys?
Symmetric
Balanced
Private
Asymmetric
12. Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?
Digital signature
Digital certificate
Certificate authority
Private key
13. What is a general approach for handling keys using trusted entities and digital certificates?
PKI
IPSec
WPA-PSK
SSTP
14. Which common folder should be encrypted for all users?
Windows
Program Files
My Documents
My Secure Files
15. Why is it recommended to encrypt folders instead of files?
Individual files are written to disk unencrypted before being encrypted.
Folder encryption is faster.
Folder encryption results in less disk usage.
Individual files are encrypted first and then written to disk.
3.145.179.85