2) Which term describes the central component of an operating system? A) Kernel
3) What are the two run modes for Windows programs? D) Kernel mode and user mode
4) Which of the following Windows components resides in memory to provide the core operating system services? B) Microkernel
5) What is the name of the process which proves you are who you say you are? D) Authentication
6) Which type of authentication is a smart card? B) Type II
7) Which access control method relates data classification to user clearance? A) MAC
8) What value uniquely identifies a user or group in Windows? C) SID
9) If the same user is created on three separate Windows computers, which value is the same on all three computers? C) Username
10) Which Windows feature allows users and groups to be “shared” among machines? D) Active Directory
11) What defines the limit of how many computers share users and groups? C) Domain
12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.
13) When possible, what is the best way to mitigate vulnerability in a specific service? A) Remove the service
14) When monitoring a Windows system, with what do you compare current system performance to test for security compliance? C) A stated baseline
15) Why should you immediately test your system for security compliance after making a configuration change? C) Configuration changes may introduce new vulnerabilities.