CompTIA A+ Core 2 Objective 2.5 – Security – Security Settings

Posted by:

|

On:

|

,

Security Settings

1 / 19

For security reasons, your organization needs to restrict users from running unauthorized applications on company computers. Which Windows feature should you utilize to enforce this policy?

2 / 19

A team needs elevated privileges to run specific legacy applications without granting full administrative rights. Which account type should you use to balance security and functionality?

3 / 19

To enhance security, your organization requires that all user passwords must include uppercase and lowercase letters, numbers, and symbols. Which Group Policy setting should you configure to enforce this password policy on a domain-joined Windows 10 workstation?

4 / 19

You are organizing a project directory and need to ensure that subfolders and files within a main folder inherit specific NTFS permissions. How do you configure this?

5 / 19

You are setting up a new user account for a user the IT department, the user needs to be able to download software and make changes on the PC. Which account type should you assign to ensure they have the necessary permissions to manage the system and network settings?

6 / 19

To streamline access to various corporate resources and applications, your organization decides to implement Single Sign-On (SSO) for all Windows 10 users. Which feature should you configure to enable SSO?

7 / 19

To protect computers from unauthorized changes, you’ve been asked to configure User Account Control (UAC) settings on all Windows 10 company computers. How should you set the UAC level?

8 / 19

To secure data on external USB drives used by employees for work-related documents, you decide to implement encryption. Which tool should you use for this purpose?

9 / 19

You are organizing a project folder on a Windows 10 system that should be accessible by the project team members with the ability to read, write, and modify files. However, you must prevent them from deleting any files. Which NTFS permission should you assign to the project team?

10 / 19

You have installed a new application that requires internet access, but users report that it cannot connect to its online service. You suspect Windows Firewall is blocking it. How do you ensure the application has internet access on all user PCs in a Windows 10 environment?

11 / 19

As part of your role in IT support, you have been tasked with ensuring that a specific application used by your company’s finance team can communicate with its cloud-based server without being blocked by the Windows Firewall. Which of the following steps is the most appropriate to achieve this?

12 / 19

Your organization wants to enhance security by implementing biometric sign-in options for Windows 10 devices. Which feature should you configure to allow users to sign in using facial recognition?

13 / 19

In a Windows 10 environment, you are tasked with setting up a new user account for an intern. The intern will need access to various network resources but should not have the ability to install software or make system changes. Which type of account should you create?

14 / 19

You are a system administrator for a small company. One of your responsibilities is to ensure that all Windows 10 computers are protected from malware. You need to make sure that Defender Antivirus is actively protecting all systems and has the latest definitions. How can you achieve this?

15 / 19

As part of maintaining security on company computers, you need to ensure that Windows Defender Antivirus performs a full scan of each system every week. Which tool would you use to configure scheduled scans?

16 / 19

You are setting up a server that will host a web application accessible from the internet. Which Windows Firewall rule should you configure to allow incoming web traffic?

17 / 19

Your company has implemented a new policy requiring that all data stored on external drives must be encrypted. As the IT manager, you decide to use BitLocker To Go for this purpose on Windows 10 devices. What step must you take to implement this policy effectively?

18 / 19

Your team is working on a collaborative project using a shared folder on a Windows 10 machine. You need to ensure that all team members can add, modify, and read files within the folder but cannot delete any files. What is the best way to configure the shared folder permissions?

19 / 19

You need to ensure that specific sensitive documents stored on a shared computer are only accessible by the finance team. What is the most effective way to secure these documents?

Your score is

Exit