Ch 1: Microsoft Windows and the Threat Landscape
Ch 2: Security in the Microsoft Windows Operating System
Ch 3: Access Controls in Microsoft Windows
Ch 4: Microsoft Windows Encryption Tools and Technologies
Ch 5: Protecting Microsoft Windows against Malware
100

This attack tricks users into clicking links or opening files that launch attacks.

What is phishing?

100

This is the strongest authentication method.

What is multifactor authentication?

100

This principle provides necessary access while denying unnecessary access.

What is the principle of least privilege?

100

This algorithm uses the same key to encrypt and decrypt data.

What is a symmetric algorithm 

100

This is malicious software that infiltrates a computer/

What is malware?

200
A kind of malware that requires user action to spread.
What is a virus?
200

When considering access control, this is the resource being accessed.

What is an object?

200

This term describes what a user can do to an object.

What is permission?

200

This delivers a trusted public key to verify ownership.

What is a digital certificate?

200

This type of malware appears to be a useful program but is actually malicious.

What is a Trojan horse?

300

Mobile devices, PCs, and laptops are examples of this.

What is a client?

300

A security strategy that requires multiple controls be compromised to exploit any vulnerability is referred to as this.

What is defense in depth?

300

This identifier is stored in the Security Access Token (SAT).

What is a Security identifier (SID)?

300

This is the built-in Windows tool for encrypting entire volumes.

What is BitLocker?

300

An attack where no fix is available yet

What is a zero-day attack?

400

This action/attack collects network traffic messages.

What is packet sniffing?

400

Non-kernel programs run in this mode.

What is user mode?

400

This infrastructure model protects data in transit in Windows.

What is Public Key Infrastructure (PKI)?

400

Who a certificate request is submitted to. 

What is a Registration authority (RA)?

400

This anti-malware component scans incoming data in real time.

What is a shield?

500

This device provides specific services to client applications directly or indirectly.

What is a server?

500

This microkernel process relates to program/process management?

What is CPU scheduling?

500

This Windows Server feature allows auditors to discover who accessed sensitive data.

What is dynamic access control (DAC)?

500

Which Windows tool encrypts removable drives like USBs or external disks.

What is BitLocker To Go?

500

The antivirus software type that relies on identifying malware based on previous experience.

What is heuristic antivirus software?

M
e
n
u