A+ 1202 Windows OS Security Settings

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:08 PM on 9/11/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

54 Terms

1
New cards

How do you activate Microsoft Defender Antivirus on a Windows system?

Go to Windows Security > Virus & threat protection > Manage settings > Turn on Real-time protection.

2
New cards

How do you deactivate Microsoft Defender Antivirus temporarily?

Turn off Real-time protection under Virus & threat protection settings.

3
New cards

How do you manually update Microsoft Defender Antivirus definitions?

Go to Virus & threat protection > Check for updates > Update.

4
New cards

How do you activate the Windows Firewall?

Go to Control Panel > Windows Defender Firewall > Turn Windows Defender Firewall on or off.

<p>Go to Control Panel &gt; Windows Defender Firewall &gt; Turn Windows Defender Firewall on or off.</p><p></p>
5
New cards

How do you deactivate the Windows Firewall for a specific network profile?

Choose the network (Private or Public) under Firewall settings and turn it off.

<p>Choose the network (Private or Public) under Firewall settings and turn it off.</p>
6
New cards

How do you allow or block a specific port through the Windows Firewall?

Advanced settings > Inbound/Outbound Rules > New Rule > Port.

<p>Advanced settings &gt; Inbound/Outbound Rules &gt; New Rule &gt; Port. </p>
7
New cards

How do you control application access through the Windows Firewall?

Go to Firewall settings > Allow an app or feature through Windows Defender Firewall > Choose app.

<p>Go to Firewall settings &gt; Allow an app or feature through Windows Defender Firewall &gt; Choose app.</p>
8
New cards

How do you check if a user account is a local account or a Microsoft account?

Settings > Accounts > Your Info will show "Local account" or email address for Microsoft account.

<p>Settings &gt; Accounts &gt; Your Info will show "Local account" or email address for Microsoft account. </p>
9
New cards

How do you create a standard user account on Windows?

Settings > Accounts > Family & other users > Add someone else to this PC > Assign Standard account.

10
New cards

How do you make a user an administrator?

11
New cards

How do you enable or disable the Guest user account?

net user Guest /active:yes or no

12
New cards

How do you assign Power User privileges to an account?

Use Local Users and Groups (lusrmgr.msc) > Add to group > Power Users.

<p>Use Local Users and Groups (lusrmgr.msc) &gt; Add to group &gt; Power Users.</p>
13
New cards

What is the difference between a local account and a Microsoft account?

A local account is stored only on the computer, while a Microsoft account connects to online services and syncs settings across devices.

14
New cards

What is a standard user account in Windows?

An account with limited permissions that can use most software but cannot make system-wide changes.

15
New cards

Your company requires all employees to change their passwords every 60 days. A user reports they're locked out after multiple failed attempts. What steps would you take to resolve this issue and ensure compliance with the policy?

In group policy I would change the Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Password Policy setting so that passwords expire after 60 days. As for account lock outs I would increase the number of attempts via group policy as well. Perhaps give users 2 extra attempts.

16
New cards

An employee complains they can’t use their Windows Hello PIN after a recent password change. What could be causing this issue, and how would you resolve it?

17
New cards

You’ve been asked to configure fingerprint login for a team using laptops with fingerprint readers. What are the key steps you’d take to implement this securely?

18
New cards

After setting up facial recognition, a user reports it fails to recognize them consistently in low-light conditions. What troubleshooting steps would you take?

19
New cards

Your organization uses Azure AD for SSO. A user says they have to log in separately to Outlook and Teams. What might be misconfigured?

20
New cards

Your IT department wants to move toward a passwordless environment using Windows Hello. What configurations and prerequisites must be met on both the client and server sides?

21
New cards

A user reports they cannot modify a file on a shared drive even though they have full share permissions. What NTFS attributes could be affecting their access?

22
New cards

You move a file into a folder with restrictive NTFS permissions, but the user who had access to the file before can still open it. Why might that be happening?

23
New cards

A user cannot install an application they need. They’re logged in with a standard account. How would you approach granting them the required access securely?

24
New cards

An application always triggers a UAC prompt even though it's from a trusted publisher. The user wants to avoid this. What are the secure options to manage this behavior?

25
New cards

You’re asked to deploy BitLocker across all company laptops. What steps do you take to ensure data is encrypted and recovery keys are properly stored?

26
New cards

An employee loses a USB drive containing confidential files. You had configured BitLocker-To-Go on the device. What would your next steps be, and what protections are in place?

27
New cards

A user encrypts files with EFS and then reimages their computer without backing up their certificate. Now they can’t access their files. What went wrong and how can this be avoided in the future?

28
New cards

A new workstation needs to be joined to the domain, but it fails during the process. What could be the causes, and how would you troubleshoot it?

29
New cards

You want to map a shared network drive for users upon login. How would you configure a log-in script in Active Directory to achieve this?

30
New cards

You need to apply different GPOs to sales and marketing teams. How would moving users to separate OUs help, and what considerations are involved?

31
New cards

ou are tasked with creating home folders for each user that redirect to a file server. How do you assign these using Active Directory?

32
New cards

Users in a specific OU need restricted control panel access. What steps would you take to create and apply a GPO that enforces this restriction?

33
New cards

You want to grant a group of users access to a secure folder on the network. How do you configure and apply the correct security group settings?

34
New cards

Your organization wants to redirect “Documents” folders to a network share for backup purposes. How would you configure folder redirection using Group Policy?

35
New cards

A user is a member of two groups: one with "Full Control" on a folder and another with "Deny Write" permission. The user cannot modify files. Why is this happening, and how would you resolve it?

36
New cards

You suspect a user’s access to a folder is incorrect due to complex group memberships. How would you verify their effective NTFS permissions?

37
New cards

You set up a secure folder and want it to have completely custom permissions, not inherited from its parent. What steps would you take to configure this properly?

38
New cards

You believe unauthorized users are accessing confidential documents in a folder. How would you use NTFS permissions and auditing to monitor this activity?

39
New cards

You modify permissions on a top-level folder and expect all subfolders to have the same permissions, but they don't. What might be the issue, and how do you enforce the change?

40
New cards

A user moved a folder from one location to another and lost access. Why might this happen, and how do NTFS permissions behave during file or folder moves?

41
New cards

You notice a folder has a “CREATOR OWNER” permission entry. What does this mean, and how does it affect access control in a shared environment?

42
New cards

You want to give a user access to a folder for one week only. How can you manage this with NTFS permissions and ensure it's removed automatically or easily?

43
New cards

You need to allow a backup service account to read and back up all files, including those the account normally wouldn’t have access to. What NTFS permissions or special settings are required?

44
New cards

You need to allow a backup service account to read and back up all files, including those the account normally wouldn’t have access to. What NTFS permissions or special settings are required?

45
New cards

You give a user "Read" permission on an executable file (.exe), but they can't run it. What does the "Read" permission allow, and what permission is needed to run the file?

46
New cards

You give a user "Modify" permission on a folder. What actions can the user perform on the files inside that folder? Can they delete files?

47
New cards

You assign only "Write" permission to a user on a folder. Can they open and read existing files? Why or why not?

If a user has write permissions on a folder they can only ad files or create new files/folders under it. They cannot read or open files since that would require the read permisison.

48
New cards

A user with "Modify" permission can delete files, but cannot change the folder’s permissions. What additional actions does "Full Control" grant that "Modify" does not?

49
New cards

You give a user only the "List folder contents" permission on a directory. Can they open files within it? What does this permission specifically control?

50
New cards

What does the "Take ownership" permission allow a user to do, and why should this permission be assigned carefully?

51
New cards

You want a user to manage who can access a folder but not allow them to delete or modify files. Which specific NTFS permission do they need to do this, and what are the risks?

52
New cards

You need to allow a user to delete files but not modify them. Which special NTFS permissions must you configure to achieve this?

53
New cards

A user can delete files inside a folder but not the folder itself. Which permission are they likely missing?

54
New cards

You set "Read" permission on a parent folder. A new file is added by another user. What permissions will apply to the new file, and why?