Time Left: 00:00

HNS Module 3 Exam: Software Protection

Instruction: Select the correct answer from the given choice. You have given 1 Minute for each question. Each question carries 2 points.

1. What is the definition of User Access Control (UAC)?

2. How does User Account Control (UAC) primarily help in preventing damage to a PC?

3. What are "legacy apps" in the context of UAC?

4. What are the three main components of User Access Control (UAC)?

5. Which of the following is NOT an identifier used for object access in UAC identification policies?

6. Which type of account name is explicitly discouraged for identification policies?

7. What type of authentication is based on "some physical characteristic or biometric identification"?

8. In the UAC process, what is the relationship between parent and child processes regarding access tokens?

9. What defines a "low" integrity application in Windows, according to the document?

10. When an administrator logs on to a Windows computer with UAC enabled, how many access tokens are created?

11. Which process is identified as the parent process from which all other user-initiated processes inherit their access token in Windows?

12. What is the recommended and more secure method of running Windows 10 or Windows 11 in a managed environment?

13. Which UAC prompt is presented when an administrator in Admin Approval Mode attempts to perform a task requiring administrative access?

14. Which UAC prompt is presented when a standard user attempts to perform a task requiring administrative access?

15. UAC elevation prompts are color-coded based on which factor?

16. What are security policy settings primarily used for?

17. Which type of Account Policy determines the conditions and length of time that an account will be locked out of the system?

18. What do stricter password policies dictate regarding password content?

19. What is multifactor authentication?

20. According to the document, which authentication method is considered the most secure and reliable?

21. What is the broader term used to refer to "destructive software" as defined in the document?

22. Which of the following describes a computer virus?