1. Which core part of an operating system provides essential services?
a. Service
b. Driver
c. Kernel $
d. Module
2. Which among the following is the process of proving that provided identity credentials are valid and correct?
a. Identification
b. Authentication $
c. Authorization
d. Nonrepudiation
3. The ability to run a backup is an example of which Windows feature?
a. Permission
b. ACL
c. Capability
d. Right $
4. Which among the following is the best reason to define security groups while configuring access rights for users in a network?
a. You can only define ACLs by group.
b. Groups define collections of local users.
c. Groups streamline defining ACLs. $
d. Active Directory pre-defines common groups.
5. Which of the following is the best reason to use Active Directory?
a. A user has a single SID across all computers in a domain. $
b. A user has a unique SID for each computer in a domain.
c. All domain users inherit Microsoft-Active Directory secure profiles.
d. Active Directory is included in all Microsoft operating systems.
6. Which of the following statements best describes the principle of least privilege?
a. Denying access to objects with a lower classification than the subject’s clearance
b. Ensuring no single person can complete a business critical task
c. Providing just the access necessary to complete a task and nothing more $
d. Reducing a user or group’s privilege to a point they do not overlap with any other user or
e. group
7. In which process would a user be asked to enter a token-generated password?
a. Authentication $
b. Authorization
c. Nonrepudiation
d. Validation
8. Which structure do Windows use to store access control rules for objects?
a. Active Directory
b. Access Control List $
c. Security Access Token
d. Security Identifier
9. Which Microsoft feature enables administrators to define access controls in a centralized location?
a. Active Directory $
b. Access Control List
c. Security