Appendix A. Answer Key

CHAPTER 1 Microsoft Windows and the Threat Landscape

  1. B

  2. A

  3. D

  4. C

  5. A

  6. D

  7. A

  8. C

  9. B

  10. A

  11. B

  12. D

  13. C

  14. A

  15. B

CHAPTER 2 Security in the Microsoft Windows Operating System

  1. C

  2. A

  3. D

  4. B

  5. D

  6. B

  7. A

  8. C

  9. C

  10. D

  11. C

  12. B

  13. A

  14. C

  15. C

CHAPTER 3 Access Controls in Microsoft Windows

  1. C

  2. A

  3. B

  4. C

  5. A

  6. A

  7. C

  8. D

  9. A

  10. B

  11. B

  12. C

  13. A

  14. C

  15. D

CHAPTER 4 Microsoft Windows Encryption Tools and Technologies

  1. C

  2. A

  3. C

  4. A

  5. D

  6. A

  7. D

  8. A

  9. B

  10. C

  11. D

  12. B

  13. A

  14. C

  15. A

CHAPTER 5 Protecting Microsoft Windows Against Malware

  1. A

  2. C

  3. D

  4. B

  5. A

  6. D

  7. B

  8. A

  9. C

  10. D

  11. A

  12. D

  13. Buffer overflow

  14. A

  15. D

CHAPTER 6 Group Policy Control in Microsoft Windows

  1. A

  2. 90–120

  3. C

  4. B

  5. A

  6. B

  7. Active Directory

  8. B

  9. GUID

  10. A

  11. B

  12. B

  13. D

  14. RSOP

  15. C

CHAPTER 7 Microsoft Windows Security Profile and Audit Tools

  1. B

  2. Snapshot

  3. A

  4. C

  5. MMC

  6. A

  7. C

  8. A

  9. B

  10. D

  11. B

  12. C

  13. B

  14. Minimum

  15. C

CHAPTER 8 Microsoft Windows Backup and Recovery Tools

  1. B

  2. A and C

  3. C

  4. Increases

  5. Decreases

  6. B

  7. A

  8. B

  9. A

  10. B

  11. D

  12. B

  13. Bare metal recovery

  14. B

CHAPTER 9 Microsoft Windows Network Security

  1. Metropolitan Area Network (MAN) ...

Get Security Strategies in Windows Platforms and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.