Secure Device & OS Management Flashcards

1
Q

Which type of security solution is Azure Bastion?
Instruction: Choose the option that best answers the question.
Answer Choices

Proxy server

Packet filtering firewall

Jump box

DDoS mitigation

A

Jump box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is required before a mobile device can be remotely wiped?
Instruction: Choose the option that best answers the question.
Answer Choices

User MFA must be enabled

Latest patches must be applied

PKI certificate authentication must be enabled

Enrollment in a mobile device management tool

A

Enrollment in a mobile device management tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Windows solution can be used to manage Microsoft updates?
Instruction: Choose the option that best answers the question.
Answer Choices

BitLocker

IIS

EFS

WSUS

A

WSUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be done to harden an iSCSI SAN?
Instruction: Choose all options that best answer the question.
Answer Choices

Configure a dedicated iSCSI VLAN

Enable iSCSI initiator authentication

Enable iSCSI target authentication

Patch network printers

A

Configure a dedicated iSCSI VLAN
Enable iSCSI target authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You would like to enroll a single Android smartphone with Microsoft Intune for centralized device management. What should you do?
Instruction: Choose the option that best answers the question.
Answer Choices

Install the Microsoft Authenticator app and configure an account

Enable device encryption

Enable user MFA

Install the Company Portal app on the device and run the configuration

A

Install the Company Portal app on the device and run the configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the term “VM sprawl” refer to?
Instruction: Choose the option that best answers the question.
Answer Choices

Deploying numerous virtual machines used by an internal line-of-business application

Multiple unused virtual machines

Virtual machines configured behind a load balancer

Virtual machines configured with a large number of virtual CPUs

A

Multiple unused virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When connecting to a network printer over HTTPS to manage it, you get a certificate error. Why is this happening?
Instruction: Choose the option that best answers the question.
Answer Choices

The certificate does not contain a private key

The certificate issuer is not trusted

The certificate has expired

The printer firmware is out of date

A

The certificate issuer is not trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When gathering digital forensic evidence, which type of evidence is the most volatile?
Instruction: Choose the option that best answers the question.
Answer Choices

Hard disk

RAM

CPU registers

Swap file

A

CPU registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which solution is best suited for the centralized management of mobile devices?
Instruction: Choose the option that best answers the question.
Answer Choices

MDM

SLA

APT

GDPR

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of managed identity is tied to the lifecycle of an Azure resource?
Instruction: Choose the option that best answers the question.
Answer Choices

User-assigned

System-assigned

Azure AD group

Service principal

A

System-assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol suite directly succeeds SSL?
Instruction: Choose the option that best answers the question.
Answer Choices

VPN

TLS

L2TP

IPSec

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which built-in Linux command can be used to wipe a storage device?
Instruction: Choose the option that best answers the question.
Answer Choices

chgrp

dd

chmod

ps

A

ps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You would like to use RADIUS authentication for connecting Wi-Fi clients. What should you enable on the Wi-Fi router?
Instruction: Choose the option that best answers the question.
Answer Choices

WPA

WEP

WPA2 Enterprise

SSID broadcasting

A

WPA2 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command updates group policy on a single device?
Instruction: Choose the option that best answers the question.
Answer Choices

ipconfig

netsh

gpupdate

cipher

A

gpupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly