1.Which of the following Windows commands can be used to see
processes that are
running and the TCP port that is being used as well? (Choose one answer)
a. psinfo
b. net session
c. ipconfig
d. netstat
running and the TCP port that is being used as well? (Choose one answer)
a. psinfo
b. net session
c. ipconfig
d. netstat
2. What protocol
can you use on a Windows machine to allow for secure remote
access? (Choose one answer)
a. Bash
b. CMD
c. RSH
d. Telnet
access? (Choose one answer)
a. Bash
b. CMD
c. RSH
d. Telnet
e. SSH
3. As a security administrator for your Windows networked environment, you have been
notified that your systems might have been breached by malware that has modified entries in
the HOSTS file. Which service can be affected by this breach? (Choose one answer)
a.ARP
b. DNS
c. LMHOSTS
d. NetBIOS
4. Which protocol commonly provides the underlying secure authentication in a Windows
Active Directory environment? (Choose one answer)
a. Kerberos
b. LDAP
c. RADIUS
d. TACACS+
5. You are tasked with changing the password policy across all Windows PCs in the
company? Which would be the BEST way for performing this task with the least amount of
overhead? (Choose one answer)
a. Certificate revocation
b. Key escrow
c. Group policy
d. Security group
b. DNS
c. LMHOSTS
d. NetBIOS
4. Which protocol commonly provides the underlying secure authentication in a Windows
Active Directory environment? (Choose one answer)
a. Kerberos
b. LDAP
c. RADIUS
d. TACACS+
5. You are tasked with changing the password policy across all Windows PCs in the
company? Which would be the BEST way for performing this task with the least amount of
overhead? (Choose one answer)
a. Certificate revocation
b. Key escrow
c. Group policy
d. Security group
5. You receive a call that a Windows-based computer is infected with malware and is running
too slowly to boot and run a malware scanner. Which of the following is the BEST way to run
the malware scanner? (Choose one answer)
a. Kill all system processes
b. Enable the firewall
c. Boot from CD/USB
d. Disable the network connection
6. What utility should be used to access the registry on a Windows 7 PC? (Choose one
answer)
a. edit
b. hexedit
c. ifconfig
d. msconfig
e. regedit
7. What command is used to open a command line interpreter within Windows? (Choose
one answer)
a. cmd
b. putty
c. shell
d. term
8. How do you
switch between logged-in user accounts in Windows 7? (Choose one answer)
a. Choose Start -> All Programs -> Switch User
b. Reboot
c. Windows 7 does not support multiple users
d. ctl-alt-del, then choose 'Switch User'
9. Performance Monitor (PerfMon) is used for what in the Windows 7 OS? (Choose one
answer)
a. To log inbound TCP connection performance
b. To monitor system and program performance
c. To manage user access and permissions which can negatively impact system performance
d. To set memory limits for hosted services
a. Choose Start -> All Programs -> Switch User
b. Reboot
c. Windows 7 does not support multiple users
d. ctl-alt-del, then choose 'Switch User'
9. Performance Monitor (PerfMon) is used for what in the Windows 7 OS? (Choose one
answer)
a. To log inbound TCP connection performance
b. To monitor system and program performance
c. To manage user access and permissions which can negatively impact system performance
d. To set memory limits for hosted services
Ans:
1. D
2.e
3.b
4.a
5. c
6.e
7.a
8. d
9.b
8. d
9.b