Question: Which Windows kernel mode component allows user mode programs to interact with the operating system? Question 1 0 options: A ) Hardware Abstraction Layer (
Which Windows kernel mode component allows user mode programs to interact with the operating system?
Question options:
A
Hardware Abstraction Layer HAL
B
Kernel mode drivers
C
Microkernel
D
Executive
Question point
Which of the following is a legacy commandline tool used to display or modify access control lists ACLs for files and folders, and was first introduced with Windows
Question options:
A
Robocopy.exe
B
Icacls.exe
C
Cacls.exe
D
ACL.exe
Question point
Which of the following is used to uniquely identify objects such as computers, web browsers, and database records?
Question options:
A
Globally unique identifier GUID
B
Universally unique identifier UUID
C
Class identifier CLSID
D
System identifier SID
Question point
Which term describes what a user can do to an object on a computer?
Question options:
A
Rights
B
Permissions
C
Authentication
D
Access control
Question point
Which Microsoft Windows access control method is used to systematically nest individual user accounts in groups to make securing objects more general, and involves Accounts, Global groups, Universal groups, Local groups, and Permissions?
Question options:
A
PLUGA
B
AGULP
C
APGUL
D
PALUG
Question point
Which of the following stores all user and computer Kerberos master keys?
Question options:
A
Access control entry ACE
B
User account control UAC
C
Dynamic access control DAC
D
Key distribution center KDC
Question point
Which of the following best describes BitLocker Drive Encryption selectivity?
Question options:
A
BitLocker can selectively encrypt files and folders.
B
BitLocker can selectively encrypt folders but not individual files.
C
BitLocker can only be turned on or off for a volume.
D
BitLocker can only be turned on or off for a hard drive.
Question point
Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?
Question options:
A
Digital certificate
B
Internet Protocol IP
C
Secure Socket Tunneling Protocol SSTP
D
Cipher
Question point
Of the following, which is true of a virtual private network VPN
Question options:
A
It is generally limited to transporting data for a single application.
B
It may transport data from many different applications.
C
A server must initiate a VPN connection.
D
The most common VPN protocol is HTTPS
Question point
Which of the following is an algorithm that uses the same key to encrypt and decrypt data?
Question options:
A
Asymmetric algorithm
B
Symmetric algorithm
C
Cipher
D
Security certificate
Question point
Which of the following does Windows provide to protect data in transit?
Question options:
A
BitLocker
B
Encrypting File System EFS
C
Public key infrastructure
D
Multifactor authentication
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
