Question: Which Windows kernel mode component allows user mode programs to interact with the operating system? Question 1 0 options: A ) Hardware Abstraction Layer (

Which Windows kernel mode component allows user mode programs to interact with the operating system?
Question 10 options:
A)
Hardware Abstraction Layer (HAL)
B)
Kernel mode drivers
C)
Microkernel
D)
Executive
Question 11(1 point)
Which of the following is a legacy command-line tool used to display or modify access control lists (ACLs) for files and folders, and was first introduced with Windows 2000?
Question 11 options:
A)
Robocopy.exe
B)
Icacls.exe
C)
Cacls.exe
D)
ACL.exe
Question 12(1 point)
Which of the following is used to uniquely identify objects such as computers, web browsers, and database records?
Question 12 options:
A)
Globally unique identifier (GUID)
B)
Universally unique identifier (UUID)
C)
Class identifier (CLSID)
D)
System identifier (SID)
Question 13(1 point)
Which term describes what a user can do to an object on a computer?
Question 13 options:
A)
Rights
B)
Permissions
C)
Authentication
D)
Access control
Question 14(1 point)
Which Microsoft Windows access control method is used to systematically nest individual user accounts in groups to make securing objects more general, and involves Accounts, Global groups, Universal groups, Local groups, and Permissions?
Question 14 options:
A)
PLUGA
B)
AGULP
C)
APGUL
D)
PALUG
Question 15(1 point)
Which of the following stores all user and computer Kerberos master keys?
Question 15 options:
A)
Access control entry (ACE)
B)
User account control (UAC)
C)
Dynamic access control (DAC)
D)
Key distribution center (KDC)
Question 16(1 point)
Which of the following best describes BitLocker Drive Encryption selectivity?
Question 16 options:
A)
BitLocker can selectively encrypt files and folders.
B)
BitLocker can selectively encrypt folders but not individual files.
C)
BitLocker can only be turned on or off for a volume.
D)
BitLocker can only be turned on or off for a hard drive.
Question 17(1 point)
Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?
Question 17 options:
A)
Digital certificate
B)
Internet Protocol (IP)
C)
Secure Socket Tunneling Protocol (SSTP)
D)
Cipher
Question 18(1 point)
Of the following, which is true of a virtual private network (VPN)?
Question 18 options:
A)
It is generally limited to transporting data for a single application.
B)
It may transport data from many different applications.
C)
A server must initiate a VPN connection.
D)
The most common VPN protocol is HTTPS.
Question 19(1 point)
Which of the following is an algorithm that uses the same key to encrypt and decrypt data?
Question 19 options:
A)
Asymmetric algorithm
B)
Symmetric algorithm
C)
Cipher
D)
Security certificate
Question 20(1 point)
Which of the following does Windows provide to protect data in transit?
Question 20 options:
A)
BitLocker
B)
Encrypting File System (EFS)
C)
Public key infrastructure
D)
Multifactor authentication

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!