MS-09-P1 Microsoft Endpoint Security Flashcards

1
Q

Scrambles computer information

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used to encrypt (scramble) and decrypt (unscramble) data

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Utilizes many available algorithms and methods

A

Symmetric (shared key) and asymmetric (public/private key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pre installed in windows 10 and provides disk encryption method for OS, uses key lengths of 128 and 256, provides pre-boot protection, network unlock, GUI and Powershell managment

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

used for bitlocker key protection

A

TPM - Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A microcontroller embedded in the system and generates cryptographic keys

A

TPM - Trust Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An application that allows restricting multiple apps with a single rule. helps administrators control which apps and files users can run, including executable files, scripts, dynamic-link libraries (DLLs),and others.

A

AppLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a policy used to identify applications

A

Application Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T or F: Policy should be set to automatic for any AppLocker usage

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

.exe

A

Executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

.msi, .msp, .mst

A

Windows Installer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

.ps1, .bat, .cmd, .vbs, .js

A

Script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Make sure files function properly

A

AppLocker Default Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Uses the app’s digital signature for identification

A

Publisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uses the app’s location in the file system for identification

A

Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identifies a file by a generated hash

17
Q

Ptovides network traffic protection and enables program integration

A

Windows Firewall

18
Q

Enabls exception configuration

A

Windows Firewall

19
Q

Rules that manage incoming traffic`

A

Inbound rules

20
Q

manage traffic generated in the system and sent out of the system

A

Outbound Rules

21
Q

This section focuses on file sharing in the Windows environment

A

Server Message Block (SMB)

22
Q

a shared resource over the network requires authentication and permission-based authorization.

A

Access Process

23
Q

permissions(or authorization)determine the type of access users have to the shared folder across the network.

A

Sharing-level

24
Q

Security permissions are used to manage access to files and folders stored in the local NTFS file system.

A

security permissions(or simply permissions) and share permissions

25
s another advanced feature of NTFS. NTFS maintains a detailed log of disk changes, failures, and errors.
Fault tolerance
26
File or folder access can be denied by explicitly adjusting settings to deny certain users. Deny permission overrides granted permissions.
Deny Permission
27
is the process of scrambling data in order to convert it into a non-human-readable format.
Host Encryption
28
employ the use of one key for both the encryption and decryption of data.
Symmetric ciphers